tag:blogger.com,1999:blog-30781326626084257292024-03-13T13:28:21.119-07:00TRICKSTERUnknownnoreply@blogger.comBlogger124125tag:blogger.com,1999:blog-3078132662608425729.post-2698267132239718442016-05-28T14:08:00.001-07:002016-05-28T14:08:17.549-07:00 Ad Blocking<div dir="ltr" style="text-align: left;" trbidi="on">
<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimQV7oVLqHnBgJ1qZhiWRF4_gp2gBpavV8x7kJdarlVpJ7FPYR6QzKeNb0yFcF20CABRCjG3ueMEhJuXjpn-18H_AbGlsoiKPutjJUO6mT9rI7kDx1Y3W7bWR0EIHP5NwK2B66En1XWfM/s1600/ad-free-5.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimQV7oVLqHnBgJ1qZhiWRF4_gp2gBpavV8x7kJdarlVpJ7FPYR6QzKeNb0yFcF20CABRCjG3ueMEhJuXjpn-18H_AbGlsoiKPutjJUO6mT9rI7kDx1Y3W7bWR0EIHP5NwK2B66En1XWfM/s1600/ad-free-5.gif" /></a></div>
<br />
<div style="margin-bottom: .0001pt; margin: 0in;">
<div class="MsoNormal" style="background: white; line-height: 15.0pt; margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-family: "adobe myungjo std m" , serif; font-size: 14.0pt;">Adblocking is a technology, which allows for blocking ads before they are loaded by the webbrowser. That means that you are saving bandwidth and the page is rendered faster within your browser. For a detailed description please visit: <a href="http://en.wikipedia.org/wiki/Adblock">http://en.wikipedia.org/wiki/Adblock</a><o:p></o:p></span></div>
<div class="MsoNormal" style="background: white; line-height: 15.0pt; margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-family: "adobe myungjo std m" , serif; font-size: 14.0pt;"><br /></span> <iframe allowfullscreen="" frameborder="0" height="315" src="https://www.youtube.com/embed/AbgLCt-XiUk" width="560"></iframe> <span style="font-family: "adobe myungjo std m" , serif; font-size: 14.0pt;"><br /></span><br />
<br /></div>
</div>
<div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 15.0pt;">
<b><span style="font-family: "adobe myungjo std m" , serif; font-size: 16.0pt;">Why remove ads?<o:p></o:p></span></b><br />
<b><span style="font-family: "adobe myungjo std m" , serif; font-size: 16.0pt;"><br /></span></b></div>
<div class="MsoNormal" style="background: white; line-height: 15.0pt; margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-family: "adobe myungjo std m" , serif; font-size: 14.0pt;">There are many reasons why people choose to remove ads. Some of the most frequent arguments are:<br />- People do not want to be manipulated by online advertising<br />- Online advertising imposes a security risk for the internet user, as the third-party banner ads may introduce security breaches to the site<br />- Advertising often uses heavy graphics, which slows the page loading<br />- Advertising is annoying<o:p></o:p></span></div>
<div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 15.0pt;">
<b><span style="font-family: "adobe myungjo std m" , serif; font-size: 16.0pt;"><br /></span></b></div>
<div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 15.0pt;">
<b><span style="font-family: "adobe myungjo std m" , serif; font-size: 16.0pt;"><br /></span></b></div>
</div>
<blockquote class="twitter-tweet" data-lang="en">
<div dir="ltr" lang="en">
Do you use ad-blockers permanently? If yes, which ones? (Please retweet for better results.)</div>
— Smashing Magazine (@smashingmag) <a href="https://twitter.com/smashingmag/status/695910337913167873">February 6, 2016</a></blockquote>
<br />
<script>!function(d,s,id){var js,fjs=d.getElementsByTagName(s)[0],p=/^http:/.test(d.location)?'http':'https';if(!d.getElementById(id)){js=d.createElement(s);js.id=id;js.src=p+"://platform.twitter.com/widgets.js";fjs.parentNode.insertBefore(js,fjs);}}(document,"script","twitter-wjs");</script>
<div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 15.0pt;">
<b><span style="font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt; mso-bidi-font-size: 12.0pt;">Working
Of AdBlock (Adblock Plus)<o:p></o:p></span></b></div>
<div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 15.0pt;">
<b><span style="font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt; mso-bidi-font-size: 12.0pt;"><br /></span></b></div>
<div class="MsoNormal" style="background: white; line-height: 15.0pt; margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-family: "Adobe Myungjo Std M",serif; font-size: 14.0pt; mso-bidi-font-size: 12.0pt;">Adblock Plus itself has no
functionality; it doesn't block anything until you "tell" it what to
block by adding external filter lists. Filter lists are essentially an
extensive set of rules that tell Adblock Plus which elements of a website to
block. You can add any filter list you want. For example, block tracking or malware.
You can also create your own filter lists. Almost all filters are open
source, therefore many filter lists have been created by Internet users.<o:p></o:p></span></div>
<div class="MsoNormal" style="background: white; line-height: 15.0pt; margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-family: "Adobe Myungjo Std M",serif; font-size: 14.0pt; mso-bidi-font-size: 12.0pt;">Filter lists enabled by default
include:<o:p></o:p></span></div>
<ul style="margin-top: 0in;" type="disc">
<li class="MsoNormal" style="background: white; line-height: 15.0pt; margin-bottom: .0001pt; margin-bottom: 0in; mso-list: l0 level1 lfo1; tab-stops: list .5in;"><span style="font-family: "Adobe Myungjo Std M",serif; font-size: 14.0pt; mso-bidi-font-size: 12.0pt;">An
ad-blocking list selected based on your language (EasyList)<o:p></o:p></span></li>
<li class="MsoNormal" style="background: white; line-height: 15.0pt; margin-bottom: .0001pt; margin-bottom: 0in; mso-list: l0 level1 lfo1; tab-stops: list .5in;"><span style="font-family: "Adobe Myungjo Std M",serif; font-size: 14.0pt; mso-bidi-font-size: 12.0pt;">The
Acceptable Ads list<o:p></o:p></span></li>
</ul>
<div class="MsoNormal" style="background: white; line-height: 15.0pt; margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-family: "Adobe Myungjo Std M",serif; font-size: 14.0pt; mso-bidi-font-size: 12.0pt;">These are enabled to get you started.
You can remove them or add others - it's up to you.<o:p></o:p></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnyR5oAOGbYzSqUjq6idizoJoXr2Xw15UBsvBe-zsh7-BaN60WeuFKISZXSo5k3KaE50o8-wP68K-DtVzPnHLr5dYvezI6XghXhvOz9hubmMhQil7Km4uCsdr7HsjqPaCMS939yFp0W04/s1600/how-adblock-plus-works.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnyR5oAOGbYzSqUjq6idizoJoXr2Xw15UBsvBe-zsh7-BaN60WeuFKISZXSo5k3KaE50o8-wP68K-DtVzPnHLr5dYvezI6XghXhvOz9hubmMhQil7Km4uCsdr7HsjqPaCMS939yFp0W04/s1600/how-adblock-plus-works.png" /></a></div>
<div class="MsoNormal" style="background: white; line-height: 15.0pt; margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-family: "Adobe Myungjo Std M",serif; font-size: 14.0pt; mso-bidi-font-size: 12.0pt;"><br /></span></div>
<div class="MsoNormal" style="background: white; line-height: 15.0pt; margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-family: "Adobe Myungjo Std M",serif; font-size: 14.0pt; mso-bidi-font-size: 12.0pt;">EasyList corresponds to your browser
language and is aimed at disabling ads that are considered to be intrusive by
our community of users. Eyeo GmbH <b>did not</b> draft EasyList and
therefore has no right to, or control over, its content. Visit the <a href="https://easylist.github.io/">EasyList Community</a> for more
information.<o:p></o:p></span></div>
<div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 15.0pt;">
</div>
<div class="MsoNormal" style="background: white; line-height: 15.0pt; margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-family: "Adobe Myungjo Std M",serif; font-size: 14.0pt; mso-bidi-font-size: 12.0pt;">The Acceptable Ads list displays ads
that comply with the acceptable ads criteria agreed upon by our community of
users. The list is maintained by Eyeo GmbH.<o:p></o:p></span></div>
<div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 15.0pt;">
<b><span style="font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt; mso-bidi-font-size: 12.0pt;"><br /></span></b></div>
<div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 15.0pt;">
<b><span style="font-family: "adobe myungjo std m" , serif; font-size: 16.0pt;">Publishers VS Adblock <o:p></o:p></span></b></div>
<div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 15.0pt;">
<b><span style="font-family: "adobe myungjo std m" , serif; font-size: 16.0pt;"><br /></span></b></div>
<div class="MsoNormal" style="background: white; line-height: 15.0pt; margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-family: "adobe myungjo std m" , serif; font-size: 14.0pt;">Ad-blockers jumped to the top of the App Store when Apple allowed them in September -- but Till Faida had already been obliterating ads for years. "Most of our users are not against ads," says the CEO of Eyeo, the German startup behind the Adblock Plus extension. "They're just annoyed by the banners and pop-ups."<o:p></o:p></span></div>
<div class="MsoNormal" style="background: white; line-height: 15.0pt; margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="background: white; line-height: 15.0pt; margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-family: "adobe myungjo std m" , serif; font-size: 14.0pt;">The problem: with around 198 million active ad-blocker users worldwide -- according to a report this August by ad-blocker-tracking startup PageFair -- the cost to the publishing industry is estimated to reach $22 billion (£13.9bn) this year.<o:p></o:p></span></div>
<div class="MsoNormal" style="background: white; line-height: 15.0pt; margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-family: "adobe myungjo std m" , serif; font-size: 14.0pt;"><br /></span></div>
<div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 15.0pt;">
<b><span style="font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt; mso-bidi-font-size: 12.0pt;">Websites know you're using
ad-blockers, and they're coming for you<o:p></o:p></span></b></div>
<div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 15.0pt;">
<b><span style="font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt; mso-bidi-font-size: 12.0pt;"><br /></span></b></div>
<div class="MsoNormal" style="background: white; line-height: 15.0pt; margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-family: "adobe myungjo std m" , serif; font-size: 14.0pt;">The <a href="file:///F:/Desktop/forbes.com">Forbes</a> publisher last week started blocking access to the site to some users of ad-blocking software. Visitors using desktop browser ad blockers are greeted with a polite but firm message on the “welcome screen” ad page Forbes serves prior to landing on its site.<o:p></o:p></span></div>
<div class="MsoNormal" style="background: white; line-height: 15.0pt; margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-family: "adobe myungjo std m" , serif; font-size: 14.0pt;"><br /></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjIK-pPeJWnUkhiA_owZO1L3BkdaIwxkhyphenhyphen-8sfqEfUoyl6pFXeaSUQgO83lU7b5KyvzB6eOTw3NqBLu3sdF-yOYyLMw6dEne81kZeu9FtSIYtfc1TbFCQaR2PmfkmfT4E1cpthWSgwbvyA/s1600/forbesadblock2-744x345.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjIK-pPeJWnUkhiA_owZO1L3BkdaIwxkhyphenhyphen-8sfqEfUoyl6pFXeaSUQgO83lU7b5KyvzB6eOTw3NqBLu3sdF-yOYyLMw6dEne81kZeu9FtSIYtfc1TbFCQaR2PmfkmfT4E1cpthWSgwbvyA/s1600/forbesadblock2-744x345.png" /></a></div>
<div class="MsoNormal" style="background: white; line-height: 15.0pt; margin-bottom: .0001pt; margin-bottom: 0in;">
<div class="MsoNormal" style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; line-height: 15pt; margin-bottom: 0.0001pt;">
<span style="font-family: "Adobe Myungjo Std M",serif; font-size: 14.0pt; mso-bidi-font-size: 12.0pt;">The <i><a href="http://washingtonpost.com/" target="_blank">Washington Post</a></i> is
stepping up its defenses by actively striking back at ad blockers. The
newspaper is testing out a feature that stops readers with ad blockers enabled
from viewing an article until they agree to sign up for an email newsletter or
subscribe.<o:p></o:p></span></div>
<div class="MsoNormal" style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; line-height: 15pt; margin-bottom: 0.0001pt;">
<span style="font-family: "Adobe Myungjo Std M",serif; font-size: 14.0pt; mso-bidi-font-size: 12.0pt;"><br /></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgPYhb2GKsOoKSjTR3Tp2KMY3WKcYggHD861jmleMHSH62Ykn4eE9DyM90q_njv0OhPOhGRuBfgzVOPp40bXTEjvvXIwVqIP9qJlZi3QkkVVv-56KEy_6w8QyN_JQrgJEqB6zjpOVF48ww/s1600/http---mashable.com-wp-content-uploads-2015-09-Screen-Shot-2015-09-09-at-11.54.14-AM-640x275.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgPYhb2GKsOoKSjTR3Tp2KMY3WKcYggHD861jmleMHSH62Ykn4eE9DyM90q_njv0OhPOhGRuBfgzVOPp40bXTEjvvXIwVqIP9qJlZi3QkkVVv-56KEy_6w8QyN_JQrgJEqB6zjpOVF48ww/s1600/http---mashable.com-wp-content-uploads-2015-09-Screen-Shot-2015-09-09-at-11.54.14-AM-640x275.png" /></a></div>
<div class="MsoNormal" style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; line-height: 15pt; margin-bottom: 0.0001pt;">
<span style="font-family: "Adobe Myungjo Std M",serif; font-size: 14.0pt; mso-bidi-font-size: 12.0pt;"><br /></span></div>
<div class="MsoNormal" style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; line-height: 15pt; margin-bottom: 0.0001pt;">
<span style="font-family: "Adobe Myungjo Std M",serif; font-size: 14.0pt; mso-bidi-font-size: 12.0pt;">Other sites, including <i>the
Atlantic</i>, <i>The Guardian</i>, <i>Mother Jones</i> and the
NFL sites have taken a gentler approach, prodding visitors to instead make a
donation, subscribe to the publication or whitelist the site.<o:p></o:p></span></div>
<div class="MsoNormal" style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; line-height: 15pt; margin-bottom: 0.0001pt;">
<span style="font-family: "Adobe Myungjo Std M",serif; font-size: 14.0pt; mso-bidi-font-size: 12.0pt;"><br /></span></div>
<div class="MsoNormal" style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; line-height: 15pt; margin-bottom: 0.0001pt;">
<span style="font-family: "Adobe Myungjo Std M",serif; font-size: 14.0pt; mso-bidi-font-size: 12.0pt;">Ad block users have also claimed that
other video sites like Hulu and the CW bar ad block users from streaming,
though Hulu seems to have since found a way to circumvent the blockers.<o:p></o:p></span></div>
<div class="MsoNormal" style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; line-height: 15pt; margin-bottom: 0.0001pt;">
<span style="font-family: "Adobe Myungjo Std M",serif; font-size: 14.0pt; mso-bidi-font-size: 12.0pt;"><br /></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhH2PzP3b3mObtv79MIkwvoTG4Dl4KUP-PIlbJ9QgakL3AYzlLRamUZww8ESA3rUhIpJemDWb7K3F4WBiHA1aZDhRd_ASEQ0MQ1-YKuRFYmJIwCDoo7P9POUPHF-togqrPz92hV9Hjg8eg/s1600/http---mashable.com-wp-content-uploads-2015-09-Screen-Shot-2015-09-10-at-6.37.33-PM-640x307.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhH2PzP3b3mObtv79MIkwvoTG4Dl4KUP-PIlbJ9QgakL3AYzlLRamUZww8ESA3rUhIpJemDWb7K3F4WBiHA1aZDhRd_ASEQ0MQ1-YKuRFYmJIwCDoo7P9POUPHF-togqrPz92hV9Hjg8eg/s1600/http---mashable.com-wp-content-uploads-2015-09-Screen-Shot-2015-09-10-at-6.37.33-PM-640x307.png" /></a></div>
<div class="MsoNormal" style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; line-height: 15pt; margin-bottom: 0.0001pt;">
<span style="font-family: "Adobe Myungjo Std M",serif; font-size: 14.0pt; mso-bidi-font-size: 12.0pt;"><br /></span></div>
<span style="font-family: "adobe myungjo std m" , serif; font-size: 14.0pt;"><a class="twitter-timeline" data-widget-id="729842205628731392" href="https://twitter.com/hashtag/adblock" style="font-family: 'Times New Roman'; font-size: medium; line-height: normal;">#adblock Tweets</a></span><br />
<br />
<div class="MsoNormal" style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; line-height: 15pt; margin-bottom: 0.0001pt;">
<span style="font-family: "Adobe Myungjo Std M",serif; font-size: 14.0pt; mso-bidi-font-size: 12.0pt;"><b>New Adblock Plus service lets you pay
websites after removing ads</b> - AdBlock Plus, the extension that has been the
bane of web creators, is offering a potential solution — <a href="https://flattrplus.com/" target="_blank">Flattr Plus</a>. AdBlock Plus
teamed up with microdonation platform Flattr to come up with a system that cuts
out the advertising middleman, offering users the choice to remove ads in favor
of setting up selective payments only to the websites they visit.<o:p></o:p></span></div>
</div>
</div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3078132662608425729.post-40100520775698484822016-05-27T12:19:00.000-07:002016-05-27T12:19:11.702-07:00Android Device Manager<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgXvlUTy29dwzWbSkrbsWV_ovN-weq4zPnRdseTdwsDhkcqQ94w9quvdPZBoKV5GDL-66qxcu0R4aNm1JVXVAJJvlpT190lcx7jcnzAZIsA-VWdXj75Iz9p2cBY8lasT76OcGV4XF8AazQ/s1600/Screenshot_2016-05-24-22-36-03.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="425" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgXvlUTy29dwzWbSkrbsWV_ovN-weq4zPnRdseTdwsDhkcqQ94w9quvdPZBoKV5GDL-66qxcu0R4aNm1JVXVAJJvlpT190lcx7jcnzAZIsA-VWdXj75Iz9p2cBY8lasT76OcGV4XF8AazQ/s640/Screenshot_2016-05-24-22-36-03.jpg" width="640" /></a></div>
<blockquote class="tr_bq">
<div class="MsoNormal">
<span style="font-family: "adobe myungjo std m" , serif; font-size: 14.0pt; line-height: 107%;">While we hope you'll
never need to use it, Android has a great native tool to help locate and remote
wipe a lost or stolen phone. It's called Android Device Manager, and all you
need is a Google account to set it up on your phone, and you can use any other
online device to track it down or wipe it.</span></div>
</blockquote>
<br />
<div style="text-align: center;">
<a href="https://support.google.com/accounts/answer/6160491?hl=en" target="_blank"> <b><span style="font-family: "adobe myungjo std m" , serif; font-size: 19.0pt; line-height: 107%;">Find your device using Android Device Manager</span></b></a></div>
<h3 style="background: white; line-height: 24.0pt; margin-bottom: 3.0pt; margin-left: 0in; margin-right: 0in; margin-top: 27.0pt;">
<div class="MsoNormal" style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; margin-bottom: 0.0001pt;">
<b><span style="font-family: "adobe myungjo std m" , serif; font-size: 16.0pt;">Locate a lost device using Android Device Manager:<o:p></o:p></span></b></div>
</h3>
<div>
<div class="MsoListParagraph" style="background: white; line-height: 15.0pt; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<!--[if !supportLists]--><span style="color: #999999;"><span style="font-family: "symbol"; font-size: 14.0pt;">·<span style="font-family: "times new roman"; font-size: 7pt; font-stretch: normal; line-height: normal;"> </span></span><!--[endif]--><span style="font-family: "adobe myungjo std m" , serif; font-size: 14.0pt;">Use the Android Device Manager website:</span></span></div>
<div class="MsoNormal" style="background: white; line-height: 15.0pt; margin-bottom: 3.0pt; margin-left: 15.0pt; margin-right: 0in; margin-top: 3.0pt; mso-list: l0 level1 lfo1; tab-stops: list .5in; text-indent: -.25in; vertical-align: baseline;">
<!--[if !supportLists]--><span style="font-family: "adobe myungjo std m" , serif; font-size: 14.0pt;">1.<span style="font-family: "times new roman"; font-size: 7pt; font-stretch: normal; line-height: normal;"> </span></span><!--[endif]--><span style="font-family: "adobe myungjo std m" , serif; font-size: 14.0pt;">Sign in to your Google Account on <a href="http://www.android.com/devicemanager" target="_blank"><span style="color: windowtext; text-decoration: none; text-underline: none;">android.com/devicemanager</span></a>.<o:p></o:p></span></div>
<div class="MsoNormal" style="background: white; line-height: 15.0pt; margin-bottom: 3.0pt; margin-left: 15.0pt; margin-right: 0in; margin-top: 3.0pt; mso-list: l0 level1 lfo1; tab-stops: list .5in; text-indent: -.25in; vertical-align: baseline;">
<!--[if !supportLists]--><span style="font-family: "adobe myungjo std m" , serif; font-size: 14.0pt;">2.<span style="font-family: "times new roman"; font-size: 7pt; font-stretch: normal; line-height: normal;"> </span></span><!--[endif]--><span style="font-family: "adobe myungjo std m" , serif; font-size: 14.0pt;">If you have more than one device, click the arrow next to the device name to select a different device.<o:p></o:p></span></div>
<div class="MsoListParagraph" style="background: white; line-height: 15.0pt; mso-list: l0 level1 lfo1; text-indent: -.25in;">
</div>
<div class="MsoNormal" style="background: white; line-height: 15.0pt; margin-bottom: 3.0pt; margin-left: 15.0pt; margin-right: 0in; margin-top: 3.0pt; mso-list: l0 level1 lfo1; tab-stops: list .5in; text-indent: -.25in; vertical-align: baseline;">
<!--[if !supportLists]--><span style="font-family: "adobe myungjo std m" , serif; font-size: 14.0pt;">3.<span style="font-family: "times new roman"; font-size: 7pt; font-stretch: normal; line-height: normal;"> </span></span><!--[endif]--><span style="font-family: "adobe myungjo std m" , serif; font-size: 14.0pt;">Android Device Manager will show you the approximate location of the device selected.</span></div>
<div class="MsoNormal" style="background: white; line-height: 15.0pt; margin-bottom: 3.0pt; margin-left: 15.0pt; margin-right: 0in; margin-top: 3.0pt; mso-list: l0 level1 lfo1; tab-stops: list .5in; text-indent: -.25in; vertical-align: baseline;">
<br />
screenshots:<br />
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEineSN_OB93QTXbxwDu5kOMukbdd9W9wE8pdp6SOkWgtP3KhCsos-jSWYlIgD0DMhDABSaPe1UufIrjGUnuoagfq8IqispwtY7afgJHj8ZG_QbLctmxeimqIB5jYlSqpMsjOvtlu2MHNBs/s1600/1.PNG" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEineSN_OB93QTXbxwDu5kOMukbdd9W9wE8pdp6SOkWgtP3KhCsos-jSWYlIgD0DMhDABSaPe1UufIrjGUnuoagfq8IqispwtY7afgJHj8ZG_QbLctmxeimqIB5jYlSqpMsjOvtlu2MHNBs/s1600/1.PNG" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">After SIGN-IN to google account</td></tr>
</tbody></table>
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3XgTO3eg7GWJ3jtM9Hv4HIpgb7ls0_pyF71EA3NcihC4o6thLv459iF02MZZfC4roaRPL4Rm18l84z9jvX9qZ2Jrdmw90qOGEuaf4K42aGD4xnT0lSYFag-mGwSFqCqNteoAcEh6ndCg/s1600/3.PNG" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3XgTO3eg7GWJ3jtM9Hv4HIpgb7ls0_pyF71EA3NcihC4o6thLv459iF02MZZfC4roaRPL4Rm18l84z9jvX9qZ2Jrdmw90qOGEuaf4K42aGD4xnT0lSYFag-mGwSFqCqNteoAcEh6ndCg/s1600/3.PNG" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">Dashboard</td></tr>
</tbody></table>
<br />
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhshOan9Ok9-I9cy6cy2mea9Efqz-zEZVL1b0iZjrE-lViCamGRSiygrtGuELjw961dzzZaaRq0F1gSoN8S7NZu3UFjag4Bg6NEt1JeMDLUM-12BZBSAo7sZCYJ6yU3-qwWrD58qNCv1DA/s1600/2.PNG" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhshOan9Ok9-I9cy6cy2mea9Efqz-zEZVL1b0iZjrE-lViCamGRSiygrtGuELjw961dzzZaaRq0F1gSoN8S7NZu3UFjag4Bg6NEt1JeMDLUM-12BZBSAo7sZCYJ6yU3-qwWrD58qNCv1DA/s1600/2.PNG" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">Ring your selected device</td></tr>
</tbody></table>
<br />
<br />
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhsIajRyFnf0WyIA2m1pXsabenFBvufsFQMn5rwKZyNAO4HUKxDnDy5H_EJ7ojhJm1TmtdytklTz0TvUas_Ae5ccrZIT8_iAsWpSHF-nVD-Ab2YYyhwaCrsP6Swl38lB7igsLsyWMb5gY4/s1600/4.PNG" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhsIajRyFnf0WyIA2m1pXsabenFBvufsFQMn5rwKZyNAO4HUKxDnDy5H_EJ7ojhJm1TmtdytklTz0TvUas_Ae5ccrZIT8_iAsWpSHF-nVD-Ab2YYyhwaCrsP6Swl38lB7igsLsyWMb5gY4/s1600/4.PNG" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">Lock your device</td></tr>
</tbody></table>
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh44dgk1uvfanZx-s4WSNJgK7dw9PsOl_tlSdG6FQdpPkuJp0VnwCiUkC4NfXSHz6qdlT5abkM4aTwXwsrnXkdDThlOjMCWyzYimGYyUdeoJoUj83otJ15UZlT1Fj9uSrSHnzxNGy3odAQ/s1600/CjSJxtSWgAArvHg.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" height="640" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh44dgk1uvfanZx-s4WSNJgK7dw9PsOl_tlSdG6FQdpPkuJp0VnwCiUkC4NfXSHz6qdlT5abkM4aTwXwsrnXkdDThlOjMCWyzYimGYyUdeoJoUj83otJ15UZlT1Fj9uSrSHnzxNGy3odAQ/s640/CjSJxtSWgAArvHg.jpg" width="358" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">Locked Device</td></tr>
</tbody></table>
<br />
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdqJNCyRXeB_Warh9ic0Vmau4_VUnzz2fUSV2w4N25XV10yVz0-kkX5Z7aOl7672Hn-8-7oSVn8xw3fLq55AR4MphrawAg9jWwLOsZwvS95TmL6quSUpRL7gK_K3R-_QPwPH8jGBzz8JQ/s1600/5.PNG" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdqJNCyRXeB_Warh9ic0Vmau4_VUnzz2fUSV2w4N25XV10yVz0-kkX5Z7aOl7672Hn-8-7oSVn8xw3fLq55AR4MphrawAg9jWwLOsZwvS95TmL6quSUpRL7gK_K3R-_QPwPH8jGBzz8JQ/s1600/5.PNG" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">Erase the device</td></tr>
</tbody></table>
<br />
<div class="separator" style="clear: both; text-align: center;">
</div>
<br />
<br /></div>
<div class="MsoNormal" style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; line-height: 15pt; margin-bottom: 0.0001pt;">
<span style="font-family: "adobe myungjo std m" , serif; font-size: 14pt;"><span style="background-color: white;"><span style="color: #999999;">Use the Android Device Manager app:</span></span><span style="background-color: white;"><o:p></o:p></span></span></div>
<div style="background: white; line-height: 15.0pt; margin-bottom: 9.0pt; margin-left: 0in; margin-right: 0in; margin-top: 3.0pt;">
<span style="font-family: "adobe myungjo std m" , serif; font-size: 14.0pt;">If you have another mobile device, you can use the Android Device Manager app to locate your lost device. You need to have the <a href="https://play.google.com/store/apps/details?id=com.google.android.apps.adm" target="_blank"><span style="color: windowtext; text-decoration: none; text-underline: none;">Android Device Manager app</span></a> installed on the device that you plan to use.<o:p></o:p></span></div>
<div class="MsoNormal" style="background: white; line-height: 15.0pt; margin-bottom: 3.0pt; margin-left: 15.0pt; margin-right: 0in; margin-top: 3.0pt; mso-list: l0 level1 lfo1; tab-stops: list .5in; text-indent: -.25in; vertical-align: baseline;">
<!--[if !supportLists]--><span style="font-family: "adobe myungjo std m" , serif; font-size: 14.0pt;">1.<span style="font-family: "times new roman"; font-size: 7pt; font-stretch: normal; line-height: normal;"> </span></span><!--[endif]--><span style="font-family: "adobe myungjo std m" , serif; font-size: 14.0pt;">On the device that you have with you, open the Android Device Manager app </span><span style="font-family: "adobe myungjo std m" , serif; font-size: 14.0pt;"><v:shapetype coordsize="21600,21600" filled="f" id="_x0000_t75" o:preferrelative="t" o:spt="75" path="m@4@5l@4@11@9@11@9@5xe" stroked="f"> <v:stroke joinstyle="miter"> <v:formulas> <v:f eqn="if lineDrawn pixelLineWidth 0"> <v:f eqn="sum @0 1 0"> <v:f eqn="sum 0 0 @1"> <v:f eqn="prod @2 1 2"> <v:f eqn="prod @3 21600 pixelWidth"> <v:f eqn="prod @3 21600 pixelHeight"> <v:f eqn="sum @0 0 1"> <v:f eqn="prod @6 1 2"> <v:f eqn="prod @7 21600 pixelWidth"> <v:f eqn="sum @8 21600 0"> <v:f eqn="prod @7 21600 pixelHeight"> <v:f eqn="sum @10 21600 0"> </v:f></v:f></v:f></v:f></v:f></v:f></v:f></v:f></v:f></v:f></v:f></v:f></v:formulas> <v:path gradientshapeok="t" o:connecttype="rect" o:extrusionok="f"> <o:lock aspectratio="t" v:ext="edit"> </o:lock></v:path></v:stroke></v:shapetype><v:shape alt="https://lh4.ggpht.com/PInSBUiTI9doFGlGbcTBVKAUocxH3GfTW2Jar4PUlxqGe5I7QkDDqsx6lK7vRQ=w20" id="Picture_x0020_1" o:spid="_x0000_i1025" style="height: 15pt; mso-wrap-style: square; visibility: visible; width: 15pt;" type="#_x0000_t75"> <v:imagedata o:title="PInSBUiTI9doFGlGbcTBVKAUocxH3GfTW2Jar4PUlxqGe5I7QkDDqsx6lK7vRQ=w20" src="file:///C:/Users/rutu/AppData/Local/Temp/msohtmlclip1/01/clip_image001.png"> </v:imagedata></v:shape></span><span style="font-family: "adobe myungjo std m" , serif; font-size: 14.0pt;">.<o:p></o:p></span></div>
<div class="MsoNormal" style="background: white; line-height: 15.0pt; margin-bottom: 3.0pt; margin-left: 15.0pt; margin-right: 0in; margin-top: 3.0pt; mso-list: l0 level1 lfo1; tab-stops: list .5in; text-indent: -.25in; vertical-align: baseline;">
<!--[if !supportLists]--><span style="font-family: "adobe myungjo std m" , serif; font-size: 14.0pt;">2.<span style="font-family: "times new roman"; font-size: 7pt; font-stretch: normal; line-height: normal;"> </span></span><!--[endif]--><span style="font-family: "adobe myungjo std m" , serif; font-size: 14.0pt;">Sign in to your Google Account.<o:p></o:p></span></div>
<div class="MsoNormal" style="background: white; line-height: 15.0pt; margin-bottom: 3.0pt; margin-left: 15.0pt; margin-right: 0in; margin-top: 3.0pt; mso-list: l0 level1 lfo1; tab-stops: list .5in; text-indent: -.25in; vertical-align: baseline;">
<!--[if !supportLists]--><span style="font-family: "adobe myungjo std m" , serif; font-size: 14.0pt;">3.<span style="font-family: "times new roman"; font-size: 7pt; font-stretch: normal; line-height: normal;"> </span></span><!--[endif]--><span style="font-family: "adobe myungjo std m" , serif; font-size: 14.0pt;">Change the device displayed:<o:p></o:p></span></div>
<div class="MsoNormal" style="background: white; line-height: 15.0pt; margin-bottom: 3.0pt; margin-left: 15.0pt; margin-right: 0in; margin-top: 3.0pt; mso-list: l0 level2 lfo1; tab-stops: list 1.0in; text-indent: -.25in; vertical-align: baseline;">
<!--[if !supportLists]--><span style="font-family: "symbol"; font-size: 10.0pt;">·<span style="font-family: "times new roman"; font-size: 7pt; font-stretch: normal; line-height: normal;"> </span></span><!--[endif]--><b><span style="font-family: "adobe myungjo std m" , serif; font-size: 14.0pt;">On your phone:</span></b><span style="font-family: "adobe myungjo std m" , serif; font-size: 14.0pt;"> Swipe along the bottom of the screen to see your devices.<o:p></o:p></span></div>
<div class="MsoNormal" style="background: white; line-height: 15.0pt; margin-bottom: 3.0pt; margin-left: 15.0pt; margin-right: 0in; margin-top: 3.0pt; mso-list: l0 level2 lfo1; tab-stops: list 1.0in; text-indent: -.25in; vertical-align: baseline;">
<!--[if !supportLists]--><span style="font-family: "symbol"; font-size: 10.0pt;">·<span style="font-family: "times new roman"; font-size: 7pt; font-stretch: normal; line-height: normal;"> </span></span><!--[endif]--><b><span style="font-family: "adobe myungjo std m" , serif; font-size: 14.0pt;">On your tablet:</span></b><span style="font-family: "adobe myungjo std m" , serif; font-size: 14.0pt;"> Touch the arrow next to the device to select a device.<o:p></o:p></span></div>
<div class="MsoNormal" style="background: white; line-height: 15.0pt; margin-bottom: .0001pt; margin-bottom: 0in;">
</div>
<div class="MsoNormal" style="background: white; line-height: 15.0pt; margin-bottom: 3.0pt; margin-left: 15.0pt; margin-right: 0in; margin-top: 3.0pt; mso-list: l0 level1 lfo1; tab-stops: list .5in; text-indent: -.25in; vertical-align: baseline;">
<!--[if !supportLists]--><span style="font-family: "adobe myungjo std m" , serif; font-size: 14.0pt;">4.<span style="font-family: "times new roman"; font-size: 7pt; font-stretch: normal; line-height: normal;"> </span></span><!--[endif]--><span style="font-family: "adobe myungjo std m" , serif; font-size: 14.0pt;">Android Device Manager will show you the approximate location of the device selected.<o:p></o:p></span></div>
<div class="MsoNormal" style="background: white; line-height: 15.0pt; margin-bottom: 3.0pt; margin-left: 15.0pt; margin-right: 0in; margin-top: 3.0pt; mso-list: l0 level1 lfo1; tab-stops: list .5in; text-indent: -.25in; vertical-align: baseline;">
<span style="font-family: "adobe myungjo std m" , serif; font-size: 14.0pt;"><br /></span></div>
<div class="MsoNormal" style="background: white; line-height: 15.0pt; margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-family: "adobe myungjo std m" , serif; font-size: 14.0pt;"><span style="color: #666666;">Use your Android Wear device:</span><o:p></o:p></span></div>
<div style="background: white; line-height: 15.0pt; margin-bottom: 9.0pt; margin-left: 0in; margin-right: 0in; margin-top: 3.0pt;">
<span style="font-family: "adobe myungjo std m" , serif; font-size: 14.0pt;">For Android Wear users, you can also <a href="https://support.google.com/androidwear/answer/6166506" target="_blank"><span style="color: windowtext; text-decoration: none; text-underline: none;">use your watch to find your device</span></a> if it's connected by Bluetooth.</span></div>
</div>
<div style="text-align: center;">
<br /></div>
<div class="MsoNormal" style="text-align: center;">
<b><span style="font-family: "adobe myungjo std m" , serif; font-size: 19.0pt; line-height: 107%;"><a href="https://support.google.com/accounts/answer/3265955?hl=en" target="_blank">Turn Android Device Manager on or off</a><o:p></o:p></span></b></div>
<div class="MsoNormal" style="text-align: center;">
<b><br /></b></div>
<div class="MsoNormal" style="background: white; line-height: 15.0pt; margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-family: "adobe myungjo std m" , serif; font-size: 15.0pt;"><span style="color: #999999;">If you lose your Android device, you can use Android Device Manager to:</span><o:p></o:p></span></div>
<div class="MsoNormal" style="background: white; line-height: 15.0pt; margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-family: "adobe myungjo std m" , serif; font-size: 15.0pt;"><br /></span></div>
<ul style="margin-top: 0in;" type="disc">
<li class="MsoNormal" style="background: white; line-height: 15.0pt; margin-bottom: .0001pt; margin-bottom: 0in; mso-list: l0 level1 lfo1; tab-stops: list .5in;"><b><span style="font-family: "adobe myungjo std m" , serif; font-size: 14.0pt;"><a href="https://support.google.com/accounts/answer/6160491">Find your device:</a> </span></b><span style="font-family: "adobe myungjo std m" , serif; font-size: 14.0pt;">Use Android Device Manager to show your device's location.<o:p></o:p></span></li>
<li class="MsoNormal" style="background: white; line-height: 15.0pt; margin-bottom: .0001pt; margin-bottom: 0in; mso-list: l0 level1 lfo1; tab-stops: list .5in;"><b><span style="font-family: "adobe myungjo std m" , serif; font-size: 14.0pt;"><a href="https://support.google.com/accounts/answer/6160500">Ring, lock, or erase a lost device:</a></span></b><span style="font-family: "adobe myungjo std m" , serif; font-size: 14.0pt;"> Use Android Device Manager to remotely ring or lock your device, erase everything on it, or add a phone number to the lock screen.<o:p></o:p></span></li>
</ul>
<div>
<div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 15.0pt;">
<b><span style="font-family: "adobe myungjo std m" , serif; font-size: 16.0pt;">Set up Android Device Manager:<o:p></o:p></span></b></div>
<div class="MsoNormal" style="background: white; line-height: 15.0pt; margin-bottom: .0001pt; margin-bottom: 0in;">
<b><span style="font-family: "adobe myungjo std m" , serif; font-size: 14.0pt;"><br /></span></b></div>
<div class="MsoNormal" style="background: white; line-height: 15.0pt; margin-bottom: .0001pt; margin-bottom: 0in;">
<a href="https://draft.blogger.com/null" name="ADM"><b><span style="font-family: "adobe myungjo std m" , serif; font-size: 14.0pt;">Step 1: </span></b></a><span style="font-family: "adobe myungjo std m" , serif; font-size: 14.0pt;">Switch Android Device Manager on or off</span><span style="font-family: "adobe myungjo std m" , serif; font-size: 14.0pt;"><o:p></o:p></span></div>
<div class="MsoNormal" style="background: white; line-height: 15.0pt; margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-family: "adobe myungjo std m" , serif; font-size: 14.0pt;">Before you can use Android Device Manager, you need to make sure it's turned on and that your device is associated with your Google Account. If you have a tablet with more than one user, only the tablet owner can control this setting.<o:p></o:p></span></div>
<div class="MsoNormal" style="background: white; line-height: 15.0pt; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: .5in; margin-right: 0in; margin-top: 0in; mso-list: l1 level1 lfo1; tab-stops: list .5in; text-indent: -.25in;">
<!--[if !supportLists]--><span style="font-family: "adobe myungjo std m" , serif; font-size: 14.0pt;">1.<span style="font-family: "times new roman"; font-size: 7pt; font-stretch: normal; line-height: normal;"> </span></span><!--[endif]--><span style="font-family: "adobe myungjo std m" , serif; font-size: 14.0pt;">Find "Google Settings" in one of these places (depending on your device):<o:p></o:p></span></div>
<div class="MsoNormal" style="background: white; line-height: 15.0pt; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 1.0in; margin-right: 0in; margin-top: 0in; mso-list: l1 level2 lfo1; tab-stops: list 1.0in; text-indent: -.25in;">
<!--[if !supportLists]--><span style="font-family: "symbol"; font-size: 10.0pt;">·<span style="font-family: "times new roman"; font-size: 7pt; font-stretch: normal; line-height: normal;"> </span></span><!--[endif]--><span style="font-family: "adobe myungjo std m" , serif; font-size: 14.0pt;">Open a separate app called <b>Google Settings</b> </span><span style="font-family: "adobe myungjo std m" , serif; font-size: 14.0pt;"><v:shapetype coordsize="21600,21600" filled="f" id="_x0000_t75" o:preferrelative="t" o:spt="75" path="m@4@5l@4@11@9@11@9@5xe" stroked="f"> <v:stroke joinstyle="miter"> <v:formulas> <v:f eqn="if lineDrawn pixelLineWidth 0"> <v:f eqn="sum @0 1 0"> <v:f eqn="sum 0 0 @1"> <v:f eqn="prod @2 1 2"> <v:f eqn="prod @3 21600 pixelWidth"> <v:f eqn="prod @3 21600 pixelHeight"> <v:f eqn="sum @0 0 1"> <v:f eqn="prod @6 1 2"> <v:f eqn="prod @7 21600 pixelWidth"> <v:f eqn="sum @8 21600 0"> <v:f eqn="prod @7 21600 pixelHeight"> <v:f eqn="sum @10 21600 0"> </v:f></v:f></v:f></v:f></v:f></v:f></v:f></v:f></v:f></v:f></v:f></v:f></v:formulas> <v:path gradientshapeok="t" o:connecttype="rect" o:extrusionok="f"> <o:lock aspectratio="t" v:ext="edit"> </o:lock></v:path></v:stroke></v:shapetype><v:shape alt="Google Settings" id="Picture_x0020_7" o:spid="_x0000_i1026" style="height: 12pt; mso-wrap-style: square; visibility: visible; width: 12pt;" type="#_x0000_t75"> <v:imagedata o:title="Google Settings" src="file:///C:/Users/rutu/AppData/Local/Temp/msohtmlclip1/01/clip_image001.png"> </v:imagedata></v:shape></span><span style="font-family: "adobe myungjo std m" , serif; font-size: 14.0pt;"><o:p></o:p></span></div>
<div class="MsoNormal" style="background: white; line-height: 15.0pt; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 1.0in; margin-right: 0in; margin-top: 0in; mso-list: l1 level2 lfo1; tab-stops: list 1.0in; text-indent: -.25in;">
<!--[if !supportLists]--><span style="font-family: "symbol"; font-size: 10.0pt;">·<span style="font-family: "times new roman"; font-size: 7pt; font-stretch: normal; line-height: normal;"> </span></span><!--[endif]--><span style="font-family: "adobe myungjo std m" , serif; font-size: 14.0pt;">In your main <b>Settings</b> app, scroll down and tap <b>Google</b><o:p></o:p></span></div>
<div class="MsoNormal" style="background: white; line-height: 15.0pt; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: .5in; margin-right: 0in; margin-top: 0in; mso-list: l1 level1 lfo1; tab-stops: list .5in; text-indent: -.25in;">
<!--[if !supportLists]--><span style="font-family: "adobe myungjo std m" , serif; font-size: 14.0pt;">2.<span style="font-family: "times new roman"; font-size: 7pt; font-stretch: normal; line-height: normal;"> </span></span><!--[endif]--><span style="font-family: "adobe myungjo std m" , serif; font-size: 14.0pt;">Tap <b>Security</b>.<o:p></o:p></span></div>
<div class="MsoNormal" style="background: white; line-height: 15.0pt; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: .5in; margin-right: 0in; margin-top: 0in; mso-list: l1 level1 lfo1; tab-stops: list .5in; text-indent: -.25in;">
<!--[if !supportLists]--><span style="font-family: "adobe myungjo std m" , serif; font-size: 14.0pt;">3.<span style="font-family: "times new roman"; font-size: 7pt; font-stretch: normal; line-height: normal;"> </span></span><!--[endif]--><span style="font-family: "adobe myungjo std m" , serif; font-size: 14.0pt;">Under "Android Device Manager," switch <b>Remotely locate this device</b> and <b>Allow remote lock and erase</b> on or off. <o:p></o:p></span></div>
<div class="MsoNormal" style="background: white; line-height: 15.0pt; margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="background: white; line-height: 15.0pt; margin-bottom: .0001pt; margin-bottom: 0in;">
<a href="https://draft.blogger.com/null" name="location"><b><span style="font-family: "adobe myungjo std m" , serif; font-size: 14.0pt;">Step 2: </span></b></a><span style="font-family: "adobe myungjo std m" , serif; font-size: 14.0pt;">Make sure location access is on</span><span style="font-family: "adobe myungjo std m" , serif; font-size: 14.0pt;"><o:p></o:p></span></div>
<div class="MsoNormal" style="background: white; line-height: 15.0pt; margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-family: "adobe myungjo std m" , serif; font-size: 14.0pt;">To use Android Device Manager, you have to have location access turned on. If you’ve turned it off, here’s how to turn it back on:<o:p></o:p></span></div>
<div class="MsoNormal" style="background: white; line-height: 15.0pt; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: .5in; margin-right: 0in; margin-top: 0in; mso-list: l0 level1 lfo2; tab-stops: list .5in; text-indent: -.25in;">
<!--[if !supportLists]--><span style="font-family: "adobe myungjo std m" , serif; font-size: 14.0pt;">1.<span style="font-family: "times new roman"; font-size: 7pt; font-stretch: normal; line-height: normal;"> </span></span><!--[endif]--><span style="font-family: "adobe myungjo std m" , serif; font-size: 14.0pt;">Open your device's <b>Settings</b> app </span><span style="font-family: "adobe myungjo std m" , serif; font-size: 14.0pt;"><v:shape alt="Settings" id="Picture_x0020_6" o:spid="_x0000_i1025" style="height: 13.5pt; mso-wrap-style: square; visibility: visible; width: 13.5pt;" type="#_x0000_t75"> <v:imagedata o:title="Settings" src="file:///C:/Users/rutu/AppData/Local/Temp/msohtmlclip1/01/clip_image002.png"> </v:imagedata></v:shape></span><span style="font-family: "adobe myungjo std m" , serif; font-size: 14.0pt;">.<o:p></o:p></span></div>
<div class="MsoNormal" style="background: white; line-height: 15.0pt; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: .5in; margin-right: 0in; margin-top: 0in; mso-list: l0 level1 lfo2; tab-stops: list .5in; text-indent: -.25in;">
<!--[if !supportLists]--><span style="font-family: "adobe myungjo std m" , serif; font-size: 14.0pt;">2.<span style="font-family: "times new roman"; font-size: 7pt; font-stretch: normal; line-height: normal;"> </span></span><!--[endif]--><span style="font-family: "adobe myungjo std m" , serif; font-size: 14.0pt;">Scroll down and tap <b>Location.</b><o:p></o:p></span></div>
<div class="MsoNormal" style="background: white; line-height: 15.0pt; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: .5in; margin-right: 0in; margin-top: 0in; mso-list: l0 level1 lfo2; tab-stops: list .5in; text-indent: -.25in;">
<!--[if !supportLists]--><span style="font-family: "adobe myungjo std m" , serif; font-size: 14.0pt;">3.<span style="font-family: "times new roman"; font-size: 7pt; font-stretch: normal; line-height: normal;"> </span></span><!--[endif]--><span style="font-family: "adobe myungjo std m" , serif; font-size: 14.0pt;">At the top, tap <b>Off</b> to switch to <b>On</b>.<o:p></o:p></span></div>
<div class="MsoNormal" style="background: white; line-height: 15.0pt; margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-family: "adobe myungjo std m" , serif; font-size: 14.0pt;">Learn more about <a href="https://support.google.com/accounts/answer/3118687">managing your account's location settings</a>.<o:p></o:p></span></div>
<div class="MsoNormal" style="background: white; line-height: 15.0pt; margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-family: "adobe myungjo std m" , serif; font-size: 14.0pt;"><br /></span></div>
<div class="MsoNormal" style="background: white; line-height: 15.0pt; margin-bottom: .0001pt; margin-bottom: 0in;">
<a href="https://draft.blogger.com/null" name="check"><b><span style="font-family: "adobe myungjo std m" , serif; font-size: 14.0pt;">Step 3: </span></b></a><span style="font-family: "adobe myungjo std m" , serif; font-size: 14.0pt;">Check that Android Device Manager can locate your device</span><span style="font-family: "adobe myungjo std m" , serif; font-size: 14.0pt;"><o:p></o:p></span></div>
<div class="MsoNormal" style="background: white; line-height: 15.0pt; margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-family: "adobe myungjo std m" , serif; font-size: 14.0pt;">After you turn on Android Device Manager, check to make sure that it's working properly. Sign in to your Google Account on <a href="http://www.android.com/devicemanager" target="_blank">android.com/devicemanager</a> and check to see if your device shows up.<o:p></o:p></span></div>
<div class="MsoNormal" style="background: white; line-height: 15.0pt; margin-bottom: .0001pt; margin-bottom: 0in;">
</div>
<div class="MsoNormal" style="background: white; line-height: 15.0pt; margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="background: white; line-height: 15.0pt; margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="background: white; line-height: 15.0pt; margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
</div>
<div class="MsoNormal">
<b><span style="font-family: "adobe myungjo std m" , serif; font-size: 19.0pt; line-height: 107%;"><o:p></o:p></span></b></div>
</div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3078132662608425729.post-65302393465326676742015-11-29T04:20:00.002-08:002015-12-03T08:12:22.050-08:00Encryption<div dir="ltr" style="text-align: left;" trbidi="on">
<div dir="ltr" style="text-align: left;" trbidi="on">
<div dir="ltr" style="text-align: left;" trbidi="on">
<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgANGRY7K8lsChiWyCCSlAgRFmQvAgEU6xN-S4AALeOBew41T5aDpz1WjCOTmVfv_PgurkvFamg1ssKae4dxRZYjAc94drDWXXR-6CC6uh4FQF4eBO3L6Cug7PJtbFXXf09Y2U_8ksp7GU/s1600/Cryptography.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="370" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgANGRY7K8lsChiWyCCSlAgRFmQvAgEU6xN-S4AALeOBew41T5aDpz1WjCOTmVfv_PgurkvFamg1ssKae4dxRZYjAc94drDWXXR-6CC6uh4FQF4eBO3L6Cug7PJtbFXXf09Y2U_8ksp7GU/s640/Cryptography.png" width="640" /></a></div>
<span style="font-family: "open sans" , sans-serif; mso-ansi-language: EN-GB; mso-bidi-font-size: 8.0pt; mso-bidi-language: AR-SA;"><br /></span> <span style="font-family: "open sans" , sans-serif; mso-ansi-language: EN-GB; mso-bidi-font-size: 8.0pt; mso-bidi-language: AR-SA;">There's been a lot of talk about encryption in the media lately. In the aftermath of Paris terror attacks, there are questions and some answers. Some reports began to link encrypted communication platforms with how terrorists planned their attacks — including the PlayStation Network, which boasts 110 million registered members. But there is no proof of that theory, encryption continues to dominate the conversation.</span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "open sans" , sans-serif; mso-ansi-language: EN-GB; mso-bidi-font-size: 8.0pt; mso-bidi-language: AR-SA;"> Before we start let’s see how encryption and cryptography related. Cryptography is the science of secret communication, while encryption refers to one component of that science. Basically Cryptography is a method of storing and transmitting data in a particular form using encryption so that only those for whom it is intended can read and process it. While encryption is a way to enhance the security of a message or file by scrambling the contents so that it can be read only by someone who has the right encryption key to unscramble it.</span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "open sans" , sans-serif; mso-ansi-language: EN-GB; mso-bidi-font-size: 8.0pt; mso-bidi-language: AR-SA;"> In cryptography, encryption is the process of encoding messages or information in such a way that only authorized parties can read it.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "open sans" , sans-serif; mso-ansi-language: EN-GB; mso-bidi-font-size: 8.0pt; mso-bidi-language: AR-SA;"><br /></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "open sans" , sans-serif; mso-ansi-language: EN-GB; mso-bidi-font-size: 8.0pt; mso-bidi-language: AR-SA;"><br /></span></div>
</div>
<div style="text-align: center;">
<iframe allowfullscreen="" frameborder="0" height="315" src="https://www.youtube.com/embed/r4HQ8Bp-pfw" width="560"></iframe>
</div>
<div style="text-align: center;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "open sans" , sans-serif; mso-ansi-language: EN-GB; mso-bidi-font-size: 8.0pt; mso-bidi-language: AR-SA;"><br /></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "open sans" , sans-serif; mso-ansi-language: EN-GB; mso-bidi-font-size: 8.0pt; mso-bidi-language: AR-SA;"><b>History of Encryption:</b></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
</div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "open sans" , sans-serif; mso-ansi-language: EN-GB; mso-bidi-font-size: 8.0pt; mso-bidi-language: AR-SA;">The concept of encryption is not new. In fact, it started with the Spartans in 500 BC; they would rearrange the position of letters within a text. Through the years, this process has become more sophisticated, which brings us to Advanced Encryption Standard, or AES, which is what we use today. This standard is based on computing bits, basic units of information.</span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<a href="http://computercheckup.aol.com/articles/infographics/history-of-encryption/"><img alt="A History of Encryption by AOL Computer Checkup" border="0" src="http://o.aolcdn.com/os/paid_services/web/img/ccu/articles/history-of-encryption.png" height="1600" width="750" /></a><br />
<hr />
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "open sans" , sans-serif; mso-ansi-language: EN-GB; mso-bidi-font-size: 8.0pt; mso-bidi-language: AR-SA;"><br /></span> <span style="font-family: "open sans" , sans-serif; mso-ansi-language: EN-GB; mso-bidi-font-size: 8.0pt; mso-bidi-language: AR-SA;"><b>Type of Encryption:</b><o:p></o:p></span></div>
<div class="MsoListParagraphCxSpFirst" style="margin-bottom: 0.0001pt; text-indent: -18pt;">
<div style="text-align: left;">
<span style="font-family: "wingdings"; mso-ansi-language: EN-GB; mso-bidi-font-family: Wingdings; mso-bidi-font-size: 8.0pt; mso-bidi-language: AR-SA; mso-fareast-font-family: Wingdings;">Ø<span style="font-family: "times new roman"; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="font-family: "open sans" , sans-serif; mso-ansi-language: EN-GB; mso-bidi-font-size: 8.0pt; mso-bidi-language: AR-SA;">Symmetric Encryption<o:p></o:p></span></div>
</div>
<div class="MsoListParagraphCxSpMiddle" style="margin-bottom: 0.0001pt; text-indent: -18pt;">
<div style="text-align: left;">
<span style="font-family: "wingdings"; mso-ansi-language: EN-GB; mso-bidi-font-family: Wingdings; mso-bidi-font-size: 8.0pt; mso-bidi-language: AR-SA; mso-fareast-font-family: Wingdings;">Ø<span style="font-family: "times new roman"; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="font-family: "open sans" , sans-serif; mso-ansi-language: EN-GB; mso-bidi-font-size: 8.0pt; mso-bidi-language: AR-SA;">Asymmetric Encryption</span></div>
<div style="text-align: left;">
<span style="font-family: "wingdings"; mso-ansi-language: EN-GB; mso-bidi-font-family: Wingdings; mso-bidi-font-size: 8.0pt; mso-bidi-language: AR-SA; mso-fareast-font-family: Wingdings;">Ø<span style="font-family: "times new roman"; font-size: 7pt; font-stretch: normal;"> </span></span><span style="font-family: "open sans" , sans-serif; mso-ansi-language: EN-GB; mso-bidi-font-size: 8.0pt; mso-bidi-language: AR-SA;">Hashing</span></div>
</div>
<hr />
<div class="MsoListParagraphCxSpLast" style="margin-bottom: 0.0001pt; text-indent: -18pt;">
<br />
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNrp2zR3EJ3c3URvjzHk1ljQ_Oht0FvZtBltH7_SHooDuTxIAKT6J6nvyFIa0SR1oAwP5R3tISTdi6Jpk0Jc5NhMfx4BkXFwjTbEbe1ECF3GCUAG3nCz7cb8XVkh71GRL4SoyLtzeTJ8Y/s1600/Encryption+GuideV4--04230700.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" height="480" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNrp2zR3EJ3c3URvjzHk1ljQ_Oht0FvZtBltH7_SHooDuTxIAKT6J6nvyFIa0SR1oAwP5R3tISTdi6Jpk0Jc5NhMfx4BkXFwjTbEbe1ECF3GCUAG3nCz7cb8XVkh71GRL4SoyLtzeTJ8Y/s640/Encryption+GuideV4--04230700.jpg" width="640" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">Types of Encryption</td></tr>
</tbody></table>
<span style="font-family: "open sans" , sans-serif; mso-ansi-language: EN-GB; mso-bidi-font-size: 8.0pt; mso-bidi-language: AR-SA;"><br /></span>
<br />
<div class="MsoListParagraph" style="margin-bottom: 0.0001pt; text-indent: -18pt;">
<!--[if !supportLists]--><b><span style="font-family: "wingdings"; mso-ansi-language: EN-GB; mso-bidi-font-family: Wingdings; mso-bidi-font-size: 8.0pt; mso-bidi-language: AR-SA; mso-fareast-font-family: Wingdings;">Ø<span style="font-family: "times new roman"; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--></b><span style="font-family: "open sans" , sans-serif; mso-ansi-language: EN-GB; mso-bidi-font-size: 8.0pt; mso-bidi-language: AR-SA;"><b>Symmetric Encryption</b><o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "open sans" , sans-serif; mso-ansi-language: EN-GB; mso-bidi-font-size: 8.0pt; mso-bidi-language: AR-SA;"> Symmetric encryption’s job is to take readable data (“plaintext” in crypto parlance), scramble it to make it unreadable (protecting it from prying eyes while it’s being stored on a disk or transmitted over a network), then unscramble it again when it’s needed. It’s generally fast, and there are lots of good encryption methods to choose from. The most important thing to remember about symmetric encryption is that both sides—the encrypter, and the decrypter—need access to the same key.</span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "open sans" , sans-serif; mso-ansi-language: EN-GB; mso-bidi-font-size: 8.0pt; mso-bidi-language: AR-SA;"> A key, for symmetric encryption purposes, is a string of data that is fed to the encrypter in order to scramble the data and make it encrypted. It’s best if this key is completely random, but there are ways to derive keys from (hopefully really good) passwords as well. The tricky part about using symmetric encryption is how to store the key and make it available only to the software that needs it.</span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "open sans" , sans-serif; mso-ansi-language: EN-GB; mso-bidi-font-size: 8.0pt; mso-bidi-language: AR-SA;"><b>Drawbacks of symmetric encryption:</b><o:p></o:p></span></div>
<div class="MsoListParagraphCxSpFirst" style="margin-bottom: 0.0001pt; text-indent: -18pt;">
<!--[if !supportLists]--><span style="font-family: "courier new"; mso-ansi-language: EN-GB; mso-bidi-font-size: 8.0pt; mso-bidi-language: AR-SA; mso-fareast-font-family: "Courier New";">o<span style="font-family: "times new roman"; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="font-family: "open sans" , sans-serif; mso-ansi-language: EN-GB; mso-bidi-font-size: 8.0pt; mso-bidi-language: AR-SA;">If it comes from a password, then someone needs to type that password every time the software starts up—this is the basis of how disk encryption on personal computers, like Mac OS X’s FileVault 2, works.<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="margin-bottom: 0.0001pt; text-indent: -18pt;">
<!--[if !supportLists]--><span style="font-family: "courier new"; mso-ansi-language: EN-GB; mso-bidi-font-size: 8.0pt; mso-bidi-language: AR-SA; mso-fareast-font-family: "Courier New";">o<span style="font-family: "times new roman"; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="font-family: "open sans" , sans-serif; mso-ansi-language: EN-GB; mso-bidi-font-size: 8.0pt; mso-bidi-language: AR-SA;">If you have to store the key on a disk or a device (e.g. in an app), or if you transmit it unprotected over a network, then once an attacker gains access to that key, your encryption is useless.<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpLast" style="margin-bottom: 0.0001pt; text-indent: -18pt;">
<!--[if !supportLists]--><span style="font-family: "courier new"; mso-ansi-language: EN-GB; mso-bidi-font-size: 8.0pt; mso-bidi-language: AR-SA; mso-fareast-font-family: "Courier New";">o<span style="font-family: "times new roman"; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="font-family: "open sans" , sans-serif; mso-ansi-language: EN-GB; mso-bidi-font-size: 8.0pt; mso-bidi-language: AR-SA;">It’s also important to remember that even if your data is encrypted, software needs access to the unencrypted data to do its job. This means that if the software or platform itself is compromised, the encryption once again becomes useless. The only way you can effectively protect against this is to design your services in such a way that data is encrypted when it leaves the user’s computer, leaving the key exclusively in the user’s possession and storing only unreadable encrypted data. But that, of course, reduces the usefulness of many systems that may need to read the unencrypted data to function.</span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "open sans" , sans-serif; mso-ansi-language: EN-GB; mso-bidi-font-size: 8.0pt; mso-bidi-language: AR-SA;"><b>Uses of symmetric encryption:</b></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "open sans" , sans-serif; mso-ansi-language: EN-GB; mso-bidi-font-size: 8.0pt; mso-bidi-language: AR-SA;"> Symmetric encryption is best used:<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpFirst" style="margin-bottom: 0.0001pt; text-indent: -18pt;">
<!--[if !supportLists]--><span style="font-family: "courier new"; mso-ansi-language: EN-GB; mso-bidi-font-size: 8.0pt; mso-bidi-language: AR-SA; mso-fareast-font-family: "Courier New";">o<span style="font-family: "times new roman"; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="font-family: "open sans" , sans-serif; mso-ansi-language: EN-GB; mso-bidi-font-size: 8.0pt; mso-bidi-language: AR-SA;">In services that store encrypted data on behalf of a user (like cloud backup services) when those services leave the decryption key in the hands of the user<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="margin-bottom: 0.0001pt; text-indent: -18pt;">
<!--[if !supportLists]--><span style="font-family: "courier new"; mso-ansi-language: EN-GB; mso-bidi-font-size: 8.0pt; mso-bidi-language: AR-SA; mso-fareast-font-family: "Courier New";">o<span style="font-family: "times new roman"; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="font-family: "open sans" , sans-serif; mso-ansi-language: EN-GB; mso-bidi-font-size: 8.0pt; mso-bidi-language: AR-SA;">To encrypt computer or device storage (One particularly neat property of a well-encrypted device is that it can be really quickly erased: just make sure the key is destroyed. The resulting encrypted data still stored on the device is then useless to anyone.)<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="margin-bottom: 0.0001pt; text-indent: -18pt;">
<!--[if !supportLists]--><span style="font-family: "courier new"; mso-ansi-language: EN-GB; mso-bidi-font-size: 8.0pt; mso-bidi-language: AR-SA; mso-fareast-font-family: "Courier New";">o<span style="font-family: "times new roman"; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="font-family: "open sans" , sans-serif; mso-ansi-language: EN-GB; mso-bidi-font-size: 8.0pt; mso-bidi-language: AR-SA;">To create a secure channel between two network endpoints, provided there’s a separate scheme for securely exchanging the key. </span></div>
<div class="MsoListParagraphCxSpMiddle" style="margin-bottom: 0.0001pt; text-indent: -18pt;">
<span style="font-family: "open sans" , sans-serif; text-indent: -18pt;"> Properly used, it’s very valuable, but the key needs to be protected even while it’s being shared among the parties that legitimately need it.</span></div>
<div class="MsoListParagraphCxSpMiddle" style="margin-bottom: 0.0001pt; text-indent: -18pt;">
<span style="font-family: "open sans" , sans-serif; text-indent: -18pt;"><br /></span></div>
<hr />
<div class="MsoListParagraph" style="margin-bottom: 0.0001pt; text-indent: -18pt;">
<!--[if !supportLists]--><span style="font-family: "wingdings"; mso-ansi-language: EN-GB; mso-bidi-font-family: Wingdings; mso-bidi-font-size: 8.0pt; mso-bidi-language: AR-SA; mso-fareast-font-family: Wingdings;">Ø<span style="font-family: "times new roman"; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="font-family: "open sans" , sans-serif; mso-ansi-language: EN-GB; mso-bidi-font-size: 8.0pt; mso-bidi-language: AR-SA;"><b>Asymmetric Encryption</b><o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "open sans" , sans-serif; mso-ansi-language: EN-GB; mso-bidi-font-size: 8.0pt; mso-bidi-language: AR-SA;"> Asymmetric encryption also takes readable data, scrambles it, and unscrambles it again at the other end, but there’s a twist: a different key is used for each end. Encrypters use a public key to scramble the data, and decrypters use the matching private (secret) key on the other end to unscramble it again.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "open sans" , sans-serif; mso-ansi-language: EN-GB; mso-bidi-font-size: 8.0pt; mso-bidi-language: AR-SA;"> The public key is just that, public; it can and should be published. (This is why asymmetric encryption is also often referred to as public-key cryptography.) But the private key must be kept private, protected much like the key for symmetric encryption. The good news is that this is easier, since only one party ever needs access to it: the party that needs to decrypt the messages.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "open sans" , sans-serif; mso-ansi-language: EN-GB; mso-bidi-font-size: 8.0pt; mso-bidi-language: AR-SA;"> Some (but not all!) asymmetric encryption systems have one additional important capability: the ability to cryptographically sign data. In this system, the private key is used to make the signature, and the public key is used to verify it. You can thus prove, if you have data with a signature and the matching public key, that it was signed with the private key.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: "open sans" , sans-serif; mso-ansi-language: EN-GB; mso-bidi-font-size: 8.0pt; mso-bidi-language: AR-SA;">Problems with asymmetric encryption:<o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "open sans" , sans-serif; mso-ansi-language: EN-GB; mso-bidi-font-size: 8.0pt; mso-bidi-language: AR-SA;"> This all sounds too good to be true, right? Well, there are, of course, caveats. The biggest issue with public-key cryptography is making sure you can trust the public key you have. A man-in-the-middle attack is a common way to compromise asymmetric encryption: you are given a public key to use to securely communicate with someone or some service, and dutifully use it, thinking you’re protected. In fact, through network trickery, you’re communicating with another party entirely, who is sitting between you and the other end.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "open sans" , sans-serif; mso-ansi-language: EN-GB; mso-bidi-font-size: 8.0pt; mso-bidi-language: AR-SA;"> This party gives you their own public key, and gives the other end another public key, pretending it is yours. They can thus decrypt your data meant for the other end, re-encrypting with the real public key it before sending it on, and use a similar process in the other direction to gain full access to the unencrypted data. Protecting against this is accomplished by making sure we always have the right public keys, either by distributing them in trusted software, or by having entities we already trust cryptographically sign new keys we need to use. This is why you need to get a certificate for your HTTPS site from a certificate authority—web browsers trust these authorities to sign keys, allowing websites to send signed public keys on to the browsers that they can then trust to secure the connection.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: "open sans" , sans-serif; mso-ansi-language: EN-GB; mso-bidi-font-size: 8.0pt; mso-bidi-language: AR-SA;">Uses of asymmetric encryption:<o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "open sans" , sans-serif; mso-ansi-language: EN-GB; mso-bidi-font-size: 8.0pt; mso-bidi-language: AR-SA;"> Asymmetric encryption is pervasive on the Internet; in fact, it’s not a stretch to say the Internet wouldn’t work securely without it. For example:<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpFirst" style="margin-bottom: 0.0001pt; text-indent: -18pt;">
<!--[if !supportLists]--><span style="font-family: "courier new"; mso-ansi-language: EN-GB; mso-bidi-font-size: 8.0pt; mso-bidi-language: AR-SA; mso-fareast-font-family: "Courier New";">o<span style="font-family: "times new roman"; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="font-family: "open sans" , sans-serif; mso-ansi-language: EN-GB; mso-bidi-font-size: 8.0pt; mso-bidi-language: AR-SA;">It’s used with TLS (née SSL) to secure connections between browser and website as well as other network services.<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="margin-bottom: 0.0001pt; text-indent: -18pt;">
<!--[if !supportLists]--><span style="font-family: "courier new"; mso-ansi-language: EN-GB; mso-bidi-font-size: 8.0pt; mso-bidi-language: AR-SA; mso-fareast-font-family: "Courier New";">o<span style="font-family: "times new roman"; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="font-family: "open sans" , sans-serif; mso-ansi-language: EN-GB; mso-bidi-font-size: 8.0pt; mso-bidi-language: AR-SA;">It’s used with SSH to secure login sessions to remote servers as well as authorize (through the use of signing) users without using passwords.<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="margin-bottom: 0.0001pt; text-indent: -18pt;">
<!--[if !supportLists]--><span style="font-family: "courier new"; mso-ansi-language: EN-GB; mso-bidi-font-size: 8.0pt; mso-bidi-language: AR-SA; mso-fareast-font-family: "Courier New";">o<span style="font-family: "times new roman"; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="font-family: "open sans" , sans-serif; mso-ansi-language: EN-GB; mso-bidi-font-size: 8.0pt; mso-bidi-language: AR-SA;">It’s used to sign software updates so that computers and devices can know that they’re getting code that originated from a trusted party.<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpLast" style="margin-bottom: 0.0001pt; text-indent: -18pt;">
<!--[if !supportLists]--><span style="font-family: "courier new"; mso-ansi-language: EN-GB; mso-bidi-font-size: 8.0pt; mso-bidi-language: AR-SA; mso-fareast-font-family: "Courier New";">o<span style="font-family: "times new roman"; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="font-family: "open sans" , sans-serif; mso-ansi-language: EN-GB; mso-bidi-font-size: 8.0pt; mso-bidi-language: AR-SA;">It’s also possible to use asymmetric encryption for email with systems like OpenPGP or S/MIME, but regrettably, this happens very rarely because the software is often difficult to use.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoListParagraph" style="margin-bottom: 0.0001pt; text-indent: -18pt;">
<!--[if !supportLists]--><span style="font-family: "wingdings"; mso-ansi-language: EN-GB; mso-bidi-font-family: Wingdings; mso-bidi-font-size: 8.0pt; mso-bidi-language: AR-SA; mso-fareast-font-family: Wingdings;">Ø<span style="font-family: "times new roman"; font-size: 7pt; font-stretch: normal;"><b> </b></span></span><!--[endif]--><span style="font-family: "open sans" , sans-serif; mso-ansi-language: EN-GB; mso-bidi-font-size: 8.0pt; mso-bidi-language: AR-SA;"><b>Hashing</b><o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "open sans" , sans-serif; mso-ansi-language: EN-GB; mso-bidi-font-size: 8.0pt; mso-bidi-language: AR-SA;"> Hashing is what is actually happening when you hear about passwords being “encrypted”. Strictly speaking, hashing is not a form of encryption, though it does use cryptography. Hashing takes data and creates a hash out of it, a string of data with three important properties:<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpFirst" style="margin-bottom: 0.0001pt; text-indent: -18pt;">
<!--[if !supportLists]--><span style="font-family: "courier new"; mso-ansi-language: EN-GB; mso-bidi-font-size: 8.0pt; mso-bidi-language: AR-SA; mso-fareast-font-family: "Courier New";">o<span style="font-family: "times new roman"; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="font-family: "open sans" , sans-serif; mso-ansi-language: EN-GB; mso-bidi-font-size: 8.0pt; mso-bidi-language: AR-SA;">the same data will always produce the same hash<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="margin-bottom: 0.0001pt; text-indent: -18pt;">
<!--[if !supportLists]--><span style="font-family: "courier new"; mso-ansi-language: EN-GB; mso-bidi-font-size: 8.0pt; mso-bidi-language: AR-SA; mso-fareast-font-family: "Courier New";">o<span style="font-family: "times new roman"; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="font-family: "open sans" , sans-serif; mso-ansi-language: EN-GB; mso-bidi-font-size: 8.0pt; mso-bidi-language: AR-SA;">it’s impossible to reverse it back to the original data<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpLast" style="margin-bottom: 0.0001pt; text-indent: -18pt;">
<!--[if !supportLists]--><span style="font-family: "courier new"; mso-ansi-language: EN-GB; mso-bidi-font-size: 8.0pt; mso-bidi-language: AR-SA; mso-fareast-font-family: "Courier New";">o<span style="font-family: "times new roman"; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="font-family: "open sans" , sans-serif; mso-ansi-language: EN-GB; mso-bidi-font-size: 8.0pt; mso-bidi-language: AR-SA;">given knowledge of only the hash, it’s infeasible to create another string of data that will create the same hash (called a “collision” in crypto parlance)<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: "open sans" , sans-serif; mso-ansi-language: EN-GB; mso-bidi-font-size: 8.0pt; mso-bidi-language: AR-SA;">Uses of hashing:<o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "open sans" , sans-serif; mso-ansi-language: EN-GB; mso-bidi-font-size: 8.0pt; mso-bidi-language: AR-SA;"> The most important use of hashing is, of course, protecting passwords. If a system stores a password hash instead of a password, it can check an incoming password by hashing that and seeing if the hashes match. It’s not possible to use the hash to authenticate. The system increases its security by only knowing the password in the brief moments it needs to when changing it or verifying it.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "open sans" , sans-serif; mso-ansi-language: EN-GB; mso-bidi-font-size: 8.0pt; mso-bidi-language: AR-SA;"> Another common use of a hash is to authenticate otherwise clearly-transmitted data using a shared secret (effectively, a key.) The hash is generated from the data and this secret, so that only the data and the hash are visible; the shared secret is not transmitted and it thus becomes infeasible to modify either the data or the hash without such modification being detected.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: "open sans" , sans-serif; mso-ansi-language: EN-GB; mso-bidi-font-size: 8.0pt; mso-bidi-language: AR-SA;">Weaknesses of hashing:<o:p></o:p></span></b></div>
<div class="MsoListParagraphCxSpMiddle" style="margin-bottom: 0.0001pt; text-indent: -18pt;">
</div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "open sans" , sans-serif; mso-ansi-language: EN-GB; mso-bidi-font-size: 8.0pt; mso-bidi-language: AR-SA;"> It was impossible to reverse a hash, and that’s true. But it is possible, with access to the hashes and lots of resources (fewer if there’s an implementation weakness in the way hashing is used), to find data that hashes the same as the password—a collision—and this may even be the password itself.</span><br />
<span style="font-family: "open sans" , sans-serif; mso-ansi-language: EN-GB; mso-bidi-font-size: 8.0pt; mso-bidi-language: AR-SA;"><br /></span>
<br />
<hr />
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "open sans" , sans-serif; mso-ansi-language: EN-GB; mso-bidi-font-size: 8.0pt; mso-bidi-language: AR-SA;"><b>Encryption Backdoor:</b><o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "open sans" , sans-serif; mso-ansi-language: EN-GB; mso-bidi-font-size: 8.0pt; mso-bidi-language: AR-SA;"> A "backdoor" in computing is a method of bypassing the normal method of authentication. Backdoors are usually inserted into a program or algorithm before it is distributed widely. They are often hidden in part of the design of the program or algorithm. In cryptography specifically, a backdoor would allow an intruder to access the encrypted information without having the correct credentials. </span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "open sans" , sans-serif; mso-ansi-language: EN-GB; mso-bidi-font-size: 8.0pt; mso-bidi-language: AR-SA;"> The backdoor would either </span><span style="font-family: "open sans" , sans-serif; mso-ansi-language: EN-GB; mso-bidi-font-size: 8.0pt; mso-bidi-language: AR-SA;">a) allow the intruder to guess the access key based on the context of the message or </span><span style="font-family: "open sans" , sans-serif; text-indent: -18pt;">b) allow the intruder to present a skeleton key that will always grant him access.</span></div>
</div>
</div>
</div>
<blockquote class="twitter-tweet" lang="en">
<div dir="ltr" lang="en">
"If secure encryption is outlawed, only outlaws will have secure encryption." —<a href="https://twitter.com/Slate">@slate</a> <a href="https://t.co/vm4rGmeHgA">https://t.co/vm4rGmeHgA</a></div>
— Vala Afshar (@ValaAfshar) <a href="https://twitter.com/ValaAfshar/status/668108961984454658">November 21, 2015</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script>
</div>
<hr />
</div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3078132662608425729.post-14886345337798393452015-11-29T01:10:00.000-08:002016-05-08T13:17:04.500-07:00What is Gamification? <div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwFkCmNEZpQ6ow0mBEkmMND3SffOtvJLEmWRLlX_bZsxtOJut0hzi9pib12vFxLX3WvIFHSbvmOwYylGL7LoAdYYy-cpyx9yoJrXRjda0j2tlCxeJOkEFSGf3hJZF7FLEDeLljmSEneAU/s1600/53b526de9c461.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="297" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwFkCmNEZpQ6ow0mBEkmMND3SffOtvJLEmWRLlX_bZsxtOJut0hzi9pib12vFxLX3WvIFHSbvmOwYylGL7LoAdYYy-cpyx9yoJrXRjda0j2tlCxeJOkEFSGf3hJZF7FLEDeLljmSEneAU/s640/53b526de9c461.jpg" width="640" /></a></div>
<br />
<blockquote class="tr_bq">
<span style="font-size: large;">The process of game-thinking and game mechanics to engage users and solve problems.</span></blockquote>
<br />
<iframe allowfullscreen="" frameborder="0" height="485" marginheight="0" marginwidth="0" scrolling="no" src="//www.slideshare.net/slideshow/embed_code/key/Dq7sQV2RqsaWe0" style="border-width: 1px; border: 1px solid #ccc; margin-bottom: 5px; max-width: 100%;" width="595"> </iframe> <br />
<div style="margin-bottom: 5px;">
<strong> <a href="https://www.slideshare.net/ChetanSundarde/gamification-a-brief-introduction-to-gamification" target="_blank" title="Gamification - A Brief Introduction to Gamification">Gamification - A Brief Introduction to Gamification</a> </strong> from <strong><a href="https://www.slideshare.net/ChetanSundarde" target="_blank">Chetan Sundarde</a></strong> </div>
<br />
<div style="background: white; margin-bottom: .0001pt; margin: 0cm; mso-line-height-alt: 14.65pt;">
<span style="font-family: "high tower text" , serif; font-size: 16pt;"><br /></span><span style="font-family: "high tower text" , serif; font-size: 16pt;">Gamification is the concept of applying game mechanics and game design techniques to engage and motivate people to achieve their goals. Gamification taps into the basic desires and needs of the users impulses which revolve around the idea of<span class="apple-converted-space"> </span>Status<span class="apple-converted-space"> </span>and<span class="apple-converted-space"> </span>Achievement.<o:p></o:p></span></div>
<div style="background: white; margin-bottom: .0001pt; margin: 0cm; mso-line-height-alt: 14.65pt;">
<span style="font-family: "high tower text" , serif; font-size: 16pt;"><br /></span></div>
<div style="background: white; line-height: 14.65pt; margin-bottom: .0001pt; margin: 0cm;">
</div>
<div style="background: white; margin: 0cm 0cm 0.0001pt;">
<span style="font-family: "high tower text" , serif; font-size: 16pt;">The research company Gartner predicts that by 2015, a gamified service for consumer goods marketing and customer retention will become as important as Facebook, eBay, or Amazon, and more than 70% of Global 2000 organizations will have at least one gamified application.<o:p></o:p></span></div>
<div style="background: white; line-height: 14.65pt; margin: 0cm 0cm 0.0001pt;">
<span style="font-family: "arial" , sans-serif; font-size: 10pt;"><br /></span>
<br />
<hr />
<a class="twitter-timeline" data-dnt="true" data-widget-id="670556648235233280" href="https://twitter.com/hashtag/GAMIFICATION">#GAMIFICATION Tweets</a>
<script>!function(d,s,id){var js,fjs=d.getElementsByTagName(s)[0],p=/^http:/.test(d.location)?'http':'https';if(!d.getElementById(id)){js=d.createElement(s);js.id=id;js.src=p+"://platform.twitter.com/widgets.js";fjs.parentNode.insertBefore(js,fjs);}}(document,"script","twitter-wjs");</script>
<br />
<hr />
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial;">
<span style="font-family: "high tower text" , serif; font-size: 16pt;"><b>Techniques</b></span></div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial;">
<span style="font-family: "high tower text" , serif; font-size: 16pt;"><br />Gamification techniques strive to leverage people's natural desires for Competition, Achievement, Status, Altruism, Community Collaboration, and many more.<o:p></o:p></span></div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial;">
<span style="font-family: "high tower text" , serif; font-size: 16pt;"><br /></span></div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial;">
<span style="font-family: "high tower text" , serif; font-size: 16pt;">Businesses can use Gamification to drive desired user behaviors that are advantageous to their brand. One common technique of Gamification is to increase engagement by rewarding users who accomplish desired tasks.<o:p></o:p></span></div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial;">
<span style="font-family: "high tower text" , serif; font-size: 16pt;"><br /></span></div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial;">
<span style="font-family: "high tower text" , serif; font-size: 16pt;">Rewards such as Badges and Points are used to elevate Status by showcasing the talents, expertise, and accomplishments of users.<o:p></o:p></span></div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial;">
<span style="font-family: "high tower text" , serif; font-size: 16pt;"><br /></span></div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; margin: 0cm 0cm 0.0001pt;">
</div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial;">
<span style="font-family: "high tower text" , serif; font-size: 16pt;">Competition is another technique that can be used in gamification. The desire to appear on the leaderboard drives players to complete more tasks, in turn fueling deeper engagement.<o:p></o:p></span></div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial;">
<span style="font-family: "high tower text" , serif; font-size: 16pt;"><br /></span></div>
<hr />
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; margin: 0cm 0cm 0.0001pt;">
<span style="font-family: "high tower text" , serif; font-size: 16pt;"><b>History</b><o:p></o:p></span></div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; margin: 0cm 0cm 0.0001pt;">
<br /></div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial;">
<span style="font-family: "high tower text" , serif; font-size: 16pt;">The oldest example of gamification are Frequent Flyer Programs that airline companies offer as a part of their customer loyalty programs.<o:p></o:p></span></div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial;">
<br /></div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial;">
</div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial;">
<span style="font-family: "high tower text" , serif; font-size: 16pt;">Gamification was a term that was first coined in 2003 by Nick Pelling, but did not gain popularity until 2010. The term gamification began to gather interest and a following in 2010 when companies such as Badgeville started using it to describe their behavior platforms. Gartner spurred the popularity of gamification by saying that "More than 50 Percent of Organizations that Manage Information Processes Will Gamify Those Processes" and also added Gamification to their hype cycle. In 2011, more companies started developing gamification platforms as they became more popular.<o:p></o:p></span><br />
<span style="font-family: "high tower text" , serif; font-size: 16pt;"><br /></span></div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; margin: 0cm 0cm 0.0001pt;">
<span style="font-family: "high tower text" , serif; font-size: 16pt;"><br /></span></div>
</div>
<hr />
<div style="background: white; mso-line-height-alt: 14.65pt;">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiW1iQzS0YpmaZlWHOzE8l7VcVVuVbH-T_7M1jSGWuWrMIqSBGbCVs8vlsxBpW6lFgvWXvmGuBzeiRSwi2M0hKYkz2o-cuBvJiM8v9jZo51h_XzyIq6kXsl8zrV9HS65wjDPKrjX8C3itk/s1600/Gamification-Infographic-DB-0827131.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img alt="A gamification infographic by Devan Brown @devan_brown2" class="size-full wp-image-7825 alignleft" height="3343" src="https://www.anvilmediainc.com/wp-content/uploads/Gamification-Infographic-DB-0827131.jpg" width="792" /></a></div>
<span style="font-family: "high tower text" , serif; font-size: 16pt;"><b><br /></b></span><span style="font-family: "high tower text" , serif; font-size: 16pt;"><b><br /></b></span><br />
<br />
<hr />
<span style="font-family: "high tower text" , serif; font-size: 16pt;"><b>Broccoli Example</b><o:p></o:p></span></div>
<div style="background: white; mso-line-height-alt: 14.65pt;">
<br /></div>
<div style="background: white; mso-line-height-alt: 14.65pt;">
<span style="font-family: "high tower text" , serif; font-size: 16pt;">Take broccoli consumption. There are a lot of children in the world that consider broccoli to be a real problem. In fact, 70% of us have a gene that makes it taste bitter. This genetic adaptation (found on gene Htas2r38) is likely linked to the fact that cruciferous vegetables (which include broccoli and cabbage, among others) historically blocked the uptake of iodine to the thyroid. Thus, in environments with low amounts of natural iodine, our perception of bitterness in these vegetables actually once protected us.<o:p></o:p></span></div>
<div style="background: white; mso-line-height-alt: 14.65pt;">
<span style="font-family: "high tower text" , serif; font-size: 16pt;">It took about 10,000 years to domesticate these vegetables so they became safe to eat. However, statistics show that it takes the average child 12 years to go from hating broccoli to loving it. And research shows that if you possess the Htas2r38 gene, you still perceive the bitterness—even into adulthood. So what has changed? Certainly not the broccoli-eating taste buds. Yet something is different, and that difference lies in perception. The palate changes, and bitter is no longer bad.<o:p></o:p></span></div>
<div style="background: white; mso-line-height-alt: 14.65pt;">
<span style="font-family: "high tower text" , serif; font-size: 16pt;">But what if we wanted to change kids’ minds about eating broccoli in fewer than a dozen years? We could certainly force them to eat the vegetable, but they would be likely to strongly dislike or rebel against the order. We could try to convince them to like it using facts, reasoning against their taste buds, or with social proof—“Mikey likes it”—but these methods are unreliable.<o:p></o:p></span></div>
<div style="background: white; mso-line-height-alt: 14.65pt;">
<span style="font-family: "high tower text" , serif; font-size: 16pt;">The two workable approaches—used by parents for generations—are to make a game out of it (e.g., the “airplane” landing) or to slather the broccoli with cheese sauce. Approach #1 tends to stop working after a while—there are only so many airplanes a child will consent to land. And approach #2 tends to produce a love of cheese sauce, and outweighs the health benefits of getting the kid to eat broccoli in the first place.<o:p></o:p></span></div>
<div style="background: white; mso-line-height-alt: 14.65pt;">
<span style="font-family: "high tower text" , serif; font-size: 16pt;">The obvious solution is to combine the two ideas. Make eating the broccoli both more fun (with a little game) and more rewarding (with a little cheese sauce, or dessert afterwards). The interplay among challenge, achievement, and reward not only allows you to train children to eat their broccoli, but it releases dopamine in the brain, intrinsically reinforcing the action as biologically positive.<o:p></o:p></span></div>
<div style="background: white; mso-line-height-alt: 14.65pt;">
<br /></div>
<div style="background: white; mso-line-height-alt: 14.65pt;">
<span style="font-family: "high tower text" , serif; font-size: 16pt;">In other words, by turning the experience into a game—including some reward for achievement—we can produce unprecedented behavior change. And when we amplify this loop with social proof and feedback, the sky’s the limit for viral growth. Heck, your kids might even show their friends how to turn broccoli into dopamine and chocolate cake (for dessert, and only after they eat their veggies) if you’re lucky…and good.<o:p></o:p></span></div>
<div style="background: white; mso-line-height-alt: 14.65pt;">
<br /></div>
<div style="background: white; mso-line-height-alt: 14.65pt;">
<span style="font-family: "high tower text" , serif; font-size: 16pt;">Or, consider a surprisingly similar but business-related challenge: professional service marketplaces. There are numerous online sites—including major sites like oDesk (<a href="http://odesk.com/">http://odesk.com</a>) and specialized ones like Behance (<a href="http://behance.com/">http://behance.com</a>)—that help marketers connect with skilled developers, and where competition for customers and the best practitioners can be fierce. Once the novelty of marketplaces wears off, how do the respective parties decide to choose one over the other? How do the markets ensure loyalty and engagement among their fickle and price-conscious users?<o:p></o:p></span></div>
<div style="background: white; mso-line-height-alt: 14.65pt;">
<br /></div>
<div style="background: white; mso-line-height-alt: 14.65pt;">
<span style="font-family: "high tower text" , serif; font-size: 16pt;">One such marketplace, DevHub (<a href="http://www.devhub.com/">www.devhub.com</a>), thinks it’s found the answer: gamification. By deploying some of the basic tenets of the discipline—and with the judicious use of game mechanics such as points, badges, levels, challenges, and rewards—DevHub has quickly differentiated itself as a market leader. The company has raised various engagement metrics, such as time on site, by as much as 20% over pre gamified levels. With a clear emphasis on making things more fun and rewarding, DevHub has broken the dour cycle of quoting, bidding, coding, and follow-up necessary to run a successful web project.<o:p></o:p></span></div>
<div style="background: white; mso-line-height-alt: 14.65pt;">
<br /></div>
<div style="background: white; line-height: 14.65pt; margin: 0cm 0cm 0.0001pt;">
</div>
<div style="background: white; margin-bottom: .0001pt; margin: 0cm; mso-line-height-alt: 14.65pt;">
<span style="font-family: "high tower text" , serif; font-size: 16pt;">Make no mistake, the core work is unchanged, and nothing has fundamentally shifted in the mechanics of designing a website. Only the perceptions of DevHub’s users have been altered—for the better. Understanding our potential to experience the same things in two ways is the first step to understanding the power of gamification.<o:p></o:p></span></div>
<br /></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3078132662608425729.post-72559159256414191992015-09-08T03:28:00.002-07:002015-09-08T03:35:43.053-07:00Google Takeout: Download Your Google Data<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhtOaFjAm2dr0NBm31t7W4pbqzvY_KtiqlWXj5TroEYeAZJcFqDWqJ7WFDCEAdn9beLLVdybXdAhYnezQTAsFRpKHnKFYO1j3mi8cua2dP1W8GyF8_NFoVfbWPxhjfbZ3giCSL65tIdbFw/s1600/GoogleTakeout+%25282%2529.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="382" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhtOaFjAm2dr0NBm31t7W4pbqzvY_KtiqlWXj5TroEYeAZJcFqDWqJ7WFDCEAdn9beLLVdybXdAhYnezQTAsFRpKHnKFYO1j3mi8cua2dP1W8GyF8_NFoVfbWPxhjfbZ3giCSL65tIdbFw/s640/GoogleTakeout+%25282%2529.png" width="640" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 18.0pt; mso-bidi-font-size: 22.0pt; mso-bidi-font-weight: bold;"><br /></span><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 18.0pt; mso-bidi-font-size: 22.0pt; mso-bidi-font-weight: bold;"><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 18.0pt; line-height: 107%; mso-ansi-language: EN-US; mso-bidi-font-family: Mangal; mso-bidi-font-size: 22.0pt; mso-bidi-font-weight: bold; mso-bidi-language: HI; mso-bidi-theme-font: minor-bidi; mso-fareast-language: EN-US;"><a href="http://www.google.com/takeout">GoogleTakeout</a> is Google's <a href="https://www.google.com/settings/takeout/" target="_blank">Download your data</a> service</span> which is a
project by the <a href="https://www.google.co.in/search?q=Google+Data+Liberation+Front&oq=Google+Data+Liberation+Front">Google
Data Liberation Front</a> that allows users of Google products, such as <a href="file:///F:/Desktop/Youtube.com">YouTube</a> and <a href="file:///F:/Desktop/gmail.com">Gmail</a>, to export
their data to a downloadable ZIP file.</span><br />
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg4MWvZvWzPT4siNdpzP46shllXsg4RG-3T3MkqyP-xfOiuINsr_10_TpOma8mDTmvtf4bl0MyYAmX_knAbK52qlU21YNH1IElGGzed3RERmQZSbFx4XBxlhPuouksUiyXNJ9icbXJEYj4/s1600/googletakeout.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" height="354" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg4MWvZvWzPT4siNdpzP46shllXsg4RG-3T3MkqyP-xfOiuINsr_10_TpOma8mDTmvtf4bl0MyYAmX_knAbK52qlU21YNH1IElGGzed3RERmQZSbFx4XBxlhPuouksUiyXNJ9icbXJEYj4/s640/googletakeout.jpg" width="640" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;"><br /></td></tr>
</tbody></table>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 18.0pt; mso-bidi-font-size: 22.0pt; mso-bidi-font-weight: bold;"><br /></span>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 18.0pt; mso-bidi-font-size: 22.0pt; mso-bidi-font-weight: bold;">The services that can be exported are
as follows:</span><br />
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjBQtZNQ6fj5bPkB_vLEi9yGDs-Pe833XvIHTeaSGK2qHB6Ob7zcyGLcawW_El3YXQ1JKSFf9vCGHdDvp3ECQAgUTAnfh-nwoA0Pnrh-dZhDGM9vt79LkJr3dPc2Hq730_Zf7Y_TbpVqcY/s1600/allproducts.PNG" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjBQtZNQ6fj5bPkB_vLEi9yGDs-Pe833XvIHTeaSGK2qHB6Ob7zcyGLcawW_El3YXQ1JKSFf9vCGHdDvp3ECQAgUTAnfh-nwoA0Pnrh-dZhDGM9vt79LkJr3dPc2Hq730_Zf7Y_TbpVqcY/s1600/allproducts.PNG" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;"><br /></td></tr>
</tbody></table>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 18.0pt; mso-bidi-font-size: 22.0pt; mso-bidi-font-weight: bold;"><br /></span>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 18.0pt; mso-bidi-font-size: 22.0pt; mso-bidi-font-weight: bold;">The user can select to export all of
the available Google products or choose Google products from the above list.
Then create an archive with your data from selected Google products.</span><br />
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhkW1GhBA27qUbV2khKvDnVObdRG6qzVIIrQUQ1W_hLx9448OHZaO-OQNxv-AcxnHJQuNOX_wWnbX0OrlLrvTC22mgRcB9GzMEA-nOVdzlep1r7ld3Qn5GIaVOVMOzeYSPmeIoAInQts-s/s1600/archive.PNG" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" height="342" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhkW1GhBA27qUbV2khKvDnVObdRG6qzVIIrQUQ1W_hLx9448OHZaO-OQNxv-AcxnHJQuNOX_wWnbX0OrlLrvTC22mgRcB9GzMEA-nOVdzlep1r7ld3Qn5GIaVOVMOzeYSPmeIoAInQts-s/s640/archive.PNG" width="640" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;"><br /></td></tr>
</tbody></table>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 18.0pt; mso-bidi-font-size: 22.0pt; mso-bidi-font-weight: bold;">Then Google takeout starts preparing
your archive. It may take some time before it is ready to download. Google
takeout email you when it’s ready. </span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 18.0pt; line-height: 107%; mso-ansi-language: EN-US; mso-bidi-font-family: Mangal; mso-bidi-font-size: 22.0pt; mso-bidi-font-weight: bold; mso-bidi-language: HI; mso-bidi-theme-font: minor-bidi; mso-fareast-language: EN-US;"> </span><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 18.0pt; mso-bidi-font-size: 22.0pt; mso-bidi-font-weight: bold;"><br /></span>
<br />
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7fimQqgI3GAvRLdwGaLo8Op5WITCK_7r7m-YDVTXR-cpACmDBEbiQVG0Z6-j384efEqL9uIhNygKPp586kY3uc33LViLYGtb7H0Xkg4LtWDqGGrCVmoGfWtOUwmlydpU9Rsr8K1j8DyU/s1600/preparing+archieve.PNG" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" height="391" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7fimQqgI3GAvRLdwGaLo8Op5WITCK_7r7m-YDVTXR-cpACmDBEbiQVG0Z6-j384efEqL9uIhNygKPp586kY3uc33LViLYGtb7H0Xkg4LtWDqGGrCVmoGfWtOUwmlydpU9Rsr8K1j8DyU/s640/preparing+archieve.PNG" width="640" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;"><br /></td></tr>
</tbody></table>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 18.0pt; mso-bidi-font-size: 22.0pt; mso-bidi-font-weight: bold;"><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 18.0pt; line-height: 107%; mso-ansi-language: EN-US; mso-bidi-font-family: Mangal; mso-bidi-font-size: 22.0pt; mso-bidi-font-weight: bold; mso-bidi-language: HI; mso-bidi-theme-font: minor-bidi; mso-fareast-language: EN-US;">After
some time google send you an email with download link of your archived zip file.</span></span><br />
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhaABRbZzwT6JAdsg23iEjIYEyUAZTnDeEwa_pgKm7Up5BOvHwe-C27Y7lUui4VGtYP5e_TtmN8tUVBoTdv-ZCahHJiOXnhkqkyfLeIKkorgZ3_4KUHOAy4onh_g4lfbb598tpHyZnXmHk/s1600/google%2527sdownloadyourdata.PNG" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" height="442" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhaABRbZzwT6JAdsg23iEjIYEyUAZTnDeEwa_pgKm7Up5BOvHwe-C27Y7lUui4VGtYP5e_TtmN8tUVBoTdv-ZCahHJiOXnhkqkyfLeIKkorgZ3_4KUHOAy4onh_g4lfbb598tpHyZnXmHk/s640/google%2527sdownloadyourdata.PNG" width="640" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;"><br /></td></tr>
</tbody></table>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 18.0pt; mso-bidi-font-size: 22.0pt; mso-bidi-font-weight: bold;"><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 18.0pt; line-height: 107%; mso-ansi-language: EN-US; mso-bidi-font-family: Mangal; mso-bidi-font-size: 22.0pt; mso-bidi-font-weight: bold; mso-bidi-language: HI; mso-bidi-theme-font: minor-bidi; mso-fareast-language: EN-US;">Click on 'Download archive' to download you archived zip file as shown in above figure. Enter your Google password one more time, then it will link you to download page of archives.</span></span><br />
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhG0n1kIza4RF5Cu3ZjlWQguJzeZjfmZlbTATD0NIOhoatWW9sWDRF0ErfLIBTQXCKhmDU39AEyBU1oRd2obQV9jwAaeP54TC9HAHZteaZlRi7AlJT3DpJdgN50R11XSYrG-oSoJ6Uibe8/s1600/downloadyourarchive.PNG" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" height="332" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhG0n1kIza4RF5Cu3ZjlWQguJzeZjfmZlbTATD0NIOhoatWW9sWDRF0ErfLIBTQXCKhmDU39AEyBU1oRd2obQV9jwAaeP54TC9HAHZteaZlRi7AlJT3DpJdgN50R11XSYrG-oSoJ6Uibe8/s640/downloadyourarchive.PNG" width="640" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;"><br /></td></tr>
</tbody></table>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 18.0pt; mso-bidi-font-size: 22.0pt; mso-bidi-font-weight: bold;">The zip file contains a separate
folder for each service that was selected for export. Extract this zip file.</span><br />
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZuBwWBUH9nmSmrxsjXVO1jmWzgHlyveHoN6wImIcETnaZvPLSAnWDYtIik9dPxHe77CrbLWqeFWDWD4DBkq8vuSpO5blh7VLT3V9GQjBcRliek0WDhHmdWoEA83jV85lwhdENS4XC05w/s1600/filesinsidezip.PNG" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" height="328" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZuBwWBUH9nmSmrxsjXVO1jmWzgHlyveHoN6wImIcETnaZvPLSAnWDYtIik9dPxHe77CrbLWqeFWDWD4DBkq8vuSpO5blh7VLT3V9GQjBcRliek0WDhHmdWoEA83jV85lwhdENS4XC05w/s640/filesinsidezip.PNG" width="640" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;"><br /></td></tr>
</tbody></table>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 18.0pt; mso-bidi-font-size: 22.0pt; mso-bidi-font-weight: bold;"><o:p></o:p></span><span style="color: #073763; font-family: 'Adobe Myungjo Std M', serif; font-size: 18pt; line-height: 107%;">Open 'index.html' file from zip file to browse your Google Data systematically.</span><br />
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhG4Zrq-AJcyqBxJSUAJ2lDzQ8SsOg60xlvlaCOiyZsTQgMnS2bF8osYUyp1UzNPuG9uRyq-dbpJspz9QEYHDVFgTSir7WE2M1o-c7RD1Jk8GD72o540uEvOZDgdO9kOIkQae5ifSA_kQo/s1600/downloadarchiveindexfile.PNG" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" height="396" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhG4Zrq-AJcyqBxJSUAJ2lDzQ8SsOg60xlvlaCOiyZsTQgMnS2bF8osYUyp1UzNPuG9uRyq-dbpJspz9QEYHDVFgTSir7WE2M1o-c7RD1Jk8GD72o540uEvOZDgdO9kOIkQae5ifSA_kQo/s640/downloadarchiveindexfile.PNG" width="640" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;"><br /></td></tr>
</tbody></table>
<span style="color: #073763; font-family: 'Adobe Myungjo Std M', serif; font-size: 18pt; line-height: 107%;"><br /></span>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 18.0pt; line-height: 107%; mso-ansi-language: EN-US; mso-bidi-font-family: Mangal; mso-bidi-font-size: 22.0pt; mso-bidi-font-weight: bold; mso-bidi-language: HI; mso-bidi-theme-font: minor-bidi; mso-fareast-language: EN-US;"> </span></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3078132662608425729.post-37892132061229849512015-09-06T11:34:00.000-07:002015-09-08T03:45:46.028-07:00Search 'I'm feeling curious' on Google...<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEihdrQk4I4BaEVlceVTLkJCBvbuUDvtgihAcoK882EAO1m3Y0tivUcJIx-R-6egDCsy34GHO81eMR5Rv5MsVvt5Q92f7lB5uop4DA-Fio0L6Qd89ImbdDnxYOPV4eYDzCk5aFAF_CgTa1A/s1600/feelingcurious.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="385" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEihdrQk4I4BaEVlceVTLkJCBvbuUDvtgihAcoK882EAO1m3Y0tivUcJIx-R-6egDCsy34GHO81eMR5Rv5MsVvt5Q92f7lB5uop4DA-Fio0L6Qd89ImbdDnxYOPV4eYDzCk5aFAF_CgTa1A/s640/feelingcurious.PNG" width="640" /></a></div>
<span style="font-size: large;"><span style="background-color: white; color: #333333; font-family: arial, sans-serif; line-height: 22px;"><br /></span></span>
<br />
<div style="text-align: left;">
<span style="font-family: Georgia, Times New Roman, serif; font-size: large;"><span style="background-color: white; line-height: 22px;">Type "I'm feeling curious" into the search engine and it will serve up a random fact </span><span style="background-color: white; line-height: 26px;">fact from the Internet. Examples produced during testing included "How often do we get a full moon?", "Why is Edgar Allan Poe famous?" and "Why is misses spelled Mrs?"</span></span></div>
<br />
<span style="font-size: large;"><span style="background-color: white; font-family: Georgia, 'Times New Roman', Times, serif; line-height: 26px;"><br /></span></span>
<span style="background-color: white; color: #333333; font-family: arial, sans-serif; line-height: 22px;"><span style="font-size: large;"><br /></span></span>
<br />
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiKw3IQHrgsZLfPMu6-jI2Rsiy1znsjBO-5tGAGsmkw3FIS5Q5fPI4cgUPBBUwyyU01Fgl44Tgkvjsc2pwozZ7v5UsbMw4bTEa6kpvS7YSUURgxMhe08nCw7DqLd5Xe88COA93FA2R6zR8/s1600/I%2527m+feeling+curious.PNG" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" height="374" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiKw3IQHrgsZLfPMu6-jI2Rsiy1znsjBO-5tGAGsmkw3FIS5Q5fPI4cgUPBBUwyyU01Fgl44Tgkvjsc2pwozZ7v5UsbMw4bTEa6kpvS7YSUURgxMhe08nCw7DqLd5Xe88COA93FA2R6zR8/s640/I%2527m+feeling+curious.PNG" width="640" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;"><h1 class="h2 title font-lato" style="background-color: white; box-sizing: border-box; color: #5d6769; font-family: Lato, 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 28px; font-weight: normal; line-height: 1.2em; margin: 42px 30px 5px 0px; text-rendering: optimizeLegibility;">
<span style="box-sizing: border-box; color: #5d6769; font-size: large; outline: none;"> <a href="https://moz.com/blog/101-google-answer-boxes-a-journey-into-the-knowledge-graph" style="box-sizing: border-box; color: #5d6769; outline: none; text-decoration: none;">101 Examples of Google Answer Boxes</a></span></h1>
</td></tr>
</tbody></table>
<div>
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div style="text-align: center;">
<iframe allowfullscreen="" frameborder="0" height="324" src="https://www.youtube.com/embed/eK1yfYC2gxs" width="576"></iframe></div>
</div>
</div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3078132662608425729.post-52726217941873448752015-09-01T13:50:00.001-07:002015-09-08T03:45:56.778-07:00Google introduced a new Google Logo<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhgw0AvLDY2ttCQ8U4LgSuZxzmrZBxCuLTiQlarvL8jv5zThCvVA4PnBUsOEGlE7in6S4YlALz6itAq7HGYHjJMdd7s-rTUwSUDdvpVlr5gz1Zz2PFDHYuW_8KWvM_hb-z_54rkeZAS77w/s1600/OGB-INSIDER-BLOGS-GoogleLogox2-Animated.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="360" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhgw0AvLDY2ttCQ8U4LgSuZxzmrZBxCuLTiQlarvL8jv5zThCvVA4PnBUsOEGlE7in6S4YlALz6itAq7HGYHjJMdd7s-rTUwSUDdvpVlr5gz1Zz2PFDHYuW_8KWvM_hb-z_54rkeZAS77w/s640/OGB-INSIDER-BLOGS-GoogleLogox2-Animated.gif" width="640" /></a></div>
<span style="color: rgba(0, 0, 0, 0.870588); font-family: Roboto, sans-serif; font-size: 17px; line-height: 32px;"><br /></span>
<span style="color: rgba(0, 0, 0, 0.870588); font-family: Roboto, sans-serif; font-size: 17px; line-height: 32px;"><br /></span>
<span style="color: rgba(0, 0, 0, 0.870588); font-family: Roboto, sans-serif; font-size: 17px; line-height: 32px;">Yesterday google introduced a new logo. </span><span style="color: rgba(0, 0, 0, 0.870588); font-family: Roboto, sans-serif; font-size: 17px; line-height: 32px;">Google has changed a lot over the past 17 years—from the range of products to the evolution of their look and feel. </span><span style="color: rgba(0, 0, 0, 0.870588); font-family: Roboto, sans-serif; font-size: 17px; line-height: 32px;">It doesn’t simply tell you that you’re using Google, but also shows you how Google is working for you. For example, new elements like a colorful Google mic help you identify and interact with Google whether you’re talking, tapping or typing. Meanwhile, we’re bidding adieu to the little blue “g” icon and replacing it with a four-color “G” that matches the logo.</span><br />
<span style="color: rgba(0, 0, 0, 0.870588); font-family: Roboto, sans-serif; font-size: 17px; line-height: 32px;">Yesterday's update is a great reflection of all the ways Google works for us across Search, Maps, Gmail, Chrome and many others. </span><br />
<span style="color: rgba(0, 0, 0, 0.870588); font-family: Roboto, sans-serif; font-size: 17px; line-height: 32px;"><br /></span>
<br />
<div style="text-align: center;">
<span style="background-color: white; font-family: ff-din-web-condensed, Helvetica, sans-serif; font-weight: bold; line-height: 37.5px; text-transform: uppercase;"><span style="font-size: large;">THE NEW LOGO IS MEANT TO REFLECT THE NEW WAYS PEOPLE VISIT GOOGLE</span></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhgw0AvLDY2ttCQ8U4LgSuZxzmrZBxCuLTiQlarvL8jv5zThCvVA4PnBUsOEGlE7in6S4YlALz6itAq7HGYHjJMdd7s-rTUwSUDdvpVlr5gz1Zz2PFDHYuW_8KWvM_hb-z_54rkeZAS77w/s1600/OGB-INSIDER-BLOGS-GoogleLogox2-Animated.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="360" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhgw0AvLDY2ttCQ8U4LgSuZxzmrZBxCuLTiQlarvL8jv5zThCvVA4PnBUsOEGlE7in6S4YlALz6itAq7HGYHjJMdd7s-rTUwSUDdvpVlr5gz1Zz2PFDHYuW_8KWvM_hb-z_54rkeZAS77w/s640/OGB-INSIDER-BLOGS-GoogleLogox2-Animated.gif" width="640" /></a></div>
<div style="text-align: center;">
<span style="background-color: white; font-family: ff-din-web-condensed, Helvetica, sans-serif; font-weight: bold; line-height: 37.5px; text-transform: uppercase;"><span style="font-size: large;"><br /></span></span></div>
<span style="background-color: white; color: #fa4b2a; font-family: ff-din-web-condensed, Helvetica, sans-serif; font-size: 37.5px; font-style: italic; font-weight: bold; line-height: 37.5px; text-transform: uppercase;"><br /></span>
<br />
<h2 class="title" itemprop="name" style="color: rgba(0, 0, 0, 0.870588); font-family: Roboto, sans-serif; font-size: 16px; line-height: 2em; margin: 0px; position: relative;">
<a href="http://www.google.com/" itemprop="url" style="color: rgba(0, 0, 0, 0.870588); font-size: 24px; font-weight: normal; text-decoration: none;" title="Google’s look, evolved">Google, evolved</a></h2>
<div>
<span style="color: rgba(0, 0, 0, 0.870588); font-family: Roboto, sans-serif; font-size: 17px; line-height: 32px;">The evolution of google's iconic logos.</span></div>
<div class="separator" style="clear: both; text-align: center;">
<iframe allowfullscreen="" frameborder="0" height="360" src="https://www.youtube.com/embed/olFEpeMwgHk?cc_load_policy=1" style="color: rgba(0, 0, 0, 0.870588); font-family: Roboto, sans-serif; font-size: 17px; line-height: 32px; margin: 30px 0px 20px; max-width: 100%; text-align: start;" width="640"></iframe><br style="color: rgba(0, 0, 0, 0.870588); content: " "; display: block; font-family: Roboto, sans-serif; font-size: 17px; line-height: 32px; padding: 4px; text-align: start;" /></div>
<div>
<br /></div>
<div>
<span style="color: rgba(0, 0, 0, 0.870588); font-family: Roboto, sans-serif; font-size: 17px; line-height: 32px;">for more about evolution of google logo visit <a href="http://logos.wikia.com/wiki/Google">here</a></span></div>
</div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3078132662608425729.post-7363866615992962012015-08-26T07:31:00.002-07:002015-09-08T03:46:27.792-07:00'Undo Send' Feature of GMAIL<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="MsoNormal">
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPL6CegIak7iX0F0c_qf-N0soEWImYwpXQS0G33EG4o8QBlYWaMhrINgyi_9oZgTAmPE8aZkythzlNL-UF7B8-oSsBTwKPO0uhKOY2kem5gXeaWodzuFvMlVV_W9dFlFHb4OmX6lEHLEU/s1600/gmail.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="409" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPL6CegIak7iX0F0c_qf-N0soEWImYwpXQS0G33EG4o8QBlYWaMhrINgyi_9oZgTAmPE8aZkythzlNL-UF7B8-oSsBTwKPO0uhKOY2kem5gXeaWodzuFvMlVV_W9dFlFHb4OmX6lEHLEU/s640/gmail.jpg" width="640" /></a></div>
<span style="font-family: "High Tower Text",serif;"><br /></span>
<span style="font-family: "High Tower Text",serif;"><br /></span>
<span style="font-family: "High Tower Text",serif;">Google has
added the ability to unsend messages in Gmail. If you make a regret sending a
message, you can undo the action by enabling "Undo send." This
setting gives you the option to take back a message you just sent.<o:p></o:p></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="font-family: "High Tower Text",serif;"> </span><span style="font-family: 'High Tower Text', serif; text-align: center;">Steps to
enable Undo Send:</span></div>
<div class="MsoNormal">
<span style="font-family: 'High Tower Text', serif; text-align: center;"><br /></span></div>
<div class="MsoListParagraphCxSpFirst" style="text-align: center; text-indent: -0.25in;">
<!--[if !supportLists]--><span style="font-family: "High Tower Text",serif; mso-bidi-font-family: "High Tower Text"; mso-fareast-font-family: "High Tower Text";">1.<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;">
</span></span><!--[endif]--><span style="font-family: "High Tower Text",serif;">Click
the gear in the top right.<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpFirst" style="text-align: center; text-indent: -0.25in;">
<span style="font-family: "High Tower Text",serif;"><br /></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgOjZ77g9n-z0PeUJRN72ZdHP3tl7kn2vQ20qqAWRR2Ifay5HXB88pfY4AnHR_JG2O_5lwlEzKbw7d6n5rsmeFG9jNeorEUQksZ9_sgWTfzUiDo5Q5akCG5NJ8IZvJHsoKINd6Grfs8pw8/s1600/step1.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="308" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgOjZ77g9n-z0PeUJRN72ZdHP3tl7kn2vQ20qqAWRR2Ifay5HXB88pfY4AnHR_JG2O_5lwlEzKbw7d6n5rsmeFG9jNeorEUQksZ9_sgWTfzUiDo5Q5akCG5NJ8IZvJHsoKINd6Grfs8pw8/s400/step1.PNG" width="400" /></a></div>
<div class="MsoListParagraphCxSpFirst" style="text-align: center; text-indent: -0.25in;">
<span style="font-family: "High Tower Text",serif;"><br /></span></div>
<div class="MsoListParagraphCxSpMiddle" style="text-align: center; text-indent: -0.25in;">
<!--[if !supportLists]--><span style="font-family: "High Tower Text",serif; mso-bidi-font-family: "High Tower Text"; mso-fareast-font-family: "High Tower Text";">2.<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="font-family: "High Tower Text",serif;">Select Settings.<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="text-align: center; text-indent: -0.25in;">
<span style="font-family: "High Tower Text",serif;"><br /></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhTgqKK4BPwEE3Lx9jR1CZBEFmMfyz1DceKppMOBWWkrXFqjpei2fOZbNs7iR1WMQmuFWu6vbPcslUNSriqGNiwWWx1M6AeVeyptQ1Fs2EzLk6k1kA3vUTMS86E8NUF-AU8yUM4-jwfU2g/s1600/step2.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="246" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhTgqKK4BPwEE3Lx9jR1CZBEFmMfyz1DceKppMOBWWkrXFqjpei2fOZbNs7iR1WMQmuFWu6vbPcslUNSriqGNiwWWx1M6AeVeyptQ1Fs2EzLk6k1kA3vUTMS86E8NUF-AU8yUM4-jwfU2g/s320/step2.PNG" width="320" /></a></div>
<div class="MsoListParagraphCxSpMiddle" style="text-align: center; text-indent: -0.25in;">
<span style="font-family: "High Tower Text",serif;"><br /></span></div>
<div class="MsoListParagraphCxSpMiddle" style="text-align: center; text-indent: -0.25in;">
<!--[if !supportLists]--><span style="font-family: "High Tower Text",serif; mso-bidi-font-family: "High Tower Text"; mso-fareast-font-family: "High Tower Text";">3.<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="font-family: "High Tower Text",serif;">Scroll down to "Undo
Send" and click Enable. And set the cancellation period (the amount of
time you have to decide if you want to unsend an email).<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="text-align: center; text-indent: -0.25in;">
<span style="font-family: "High Tower Text",serif;"><br /></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjoSGRpw3XgChxtO7BWVzgM295-z86V4IDUGPTXRNIBOaOc_m8S0RO80tWrikxq7t4os0bYrJEKmEYwJxVI9cB9K_swIQCCqzXI1lOIXkWkxdgzSMVwkH2ueLxI2nZGSExIzBAW-q4fLPQ/s1600/step3.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="328" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjoSGRpw3XgChxtO7BWVzgM295-z86V4IDUGPTXRNIBOaOc_m8S0RO80tWrikxq7t4os0bYrJEKmEYwJxVI9cB9K_swIQCCqzXI1lOIXkWkxdgzSMVwkH2ueLxI2nZGSExIzBAW-q4fLPQ/s640/step3.PNG" width="640" /></a></div>
<div class="MsoListParagraphCxSpMiddle" style="text-align: center; text-indent: -0.25in;">
<span style="font-family: "High Tower Text",serif;"><br /></span></div>
<div class="MsoNormal">
</div>
<div class="MsoListParagraphCxSpLast" style="text-align: center; text-indent: -0.25in;">
<!--[if !supportLists]--><span style="font-family: "High Tower Text",serif; mso-bidi-font-family: "High Tower Text"; mso-fareast-font-family: "High Tower Text";">4.<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="font-family: "High Tower Text",serif;">Click Save Changes at the bottom of
the page.<o:p></o:p></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidULss6IzbjYB6zKJ0BT9r2VaxYjZ7nt4bZ4LnKma30v-6OXq3hxu-xdumDiT1NVyKKV1Gv-qg4Tqi2yJO1owIBNHfTnf1JgMn7dwbdUHcnQyxCicdBSfZ7NSx3EK0qLiedyj5fGZku0A/s1600/step4.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="256" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidULss6IzbjYB6zKJ0BT9r2VaxYjZ7nt4bZ4LnKma30v-6OXq3hxu-xdumDiT1NVyKKV1Gv-qg4Tqi2yJO1owIBNHfTnf1JgMn7dwbdUHcnQyxCicdBSfZ7NSx3EK0qLiedyj5fGZku0A/s400/step4.PNG" width="400" /></a></div>
<div class="MsoListParagraphCxSpLast" style="text-align: center; text-indent: -0.25in;">
<span style="font-family: "High Tower Text",serif;"><br /></span></div>
<div class="MsoNormal">
<span style="font-family: 'High Tower Text', serif;">Once the
feature is switched on, you’ll see an “Undo” link appear on the screen
alongside the usual “Your message has been sent” confirmation.</span></div>
<div class="MsoNormal">
<span style="font-family: 'High Tower Text', serif;"><br /></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjevHha3GBu8mGuIyFv9pueJ5TYTM6qFa6khKJ4ERJfV7xMxaEYv-ouOHJ5bQPvIVAOPzBgjbsYhCKAvbmqPNN6gVvxDVbDTAdRwCdZlA21fUMCC9RFPsRY_aCUDru9CPu63FQ_w2DyT_g/s1600/undo+message+within+time+period.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="182" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjevHha3GBu8mGuIyFv9pueJ5TYTM6qFa6khKJ4ERJfV7xMxaEYv-ouOHJ5bQPvIVAOPzBgjbsYhCKAvbmqPNN6gVvxDVbDTAdRwCdZlA21fUMCC9RFPsRY_aCUDru9CPu63FQ_w2DyT_g/s400/undo+message+within+time+period.PNG" width="400" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgB-wuRFI-evZTOvEKrrYXgyaVN13DE5ACcLAsFaUprh_lnfIT3BJTiFcZPAljs7o_EmiCtqVF8AEJVcDQxmNN5u7S2ZaJSuk5FGqa7JWgqctCglLRSdJcXI6eDIxkbH4u8vzxYEL-g07s/s1600/undo.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="256" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgB-wuRFI-evZTOvEKrrYXgyaVN13DE5ACcLAsFaUprh_lnfIT3BJTiFcZPAljs7o_EmiCtqVF8AEJVcDQxmNN5u7S2ZaJSuk5FGqa7JWgqctCglLRSdJcXI6eDIxkbH4u8vzxYEL-g07s/s400/undo.PNG" width="400" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
</div>
<div class="MsoNormal">
<span style="font-family: "High Tower Text",serif;">Note: To
give you time to undo, Gmail delays sending the message for a few seconds. So
if you don't select "Undo" within the time limit, your message will
be sent.<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: "High Tower Text",serif;"><br /></span></div>
<div class="MsoNormal">
<span style="font-family: "High Tower Text",serif;"><br /></span></div>
</div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3078132662608425729.post-92015390280798998912015-08-25T04:56:00.000-07:002015-09-08T03:46:59.509-07:00Google Photos<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhEABn3iYHc8HESHP6l9tq6C9w-uS5PxRNmJhMQfbCWiu7DEJH76dNgXnXP0GNhp8m4aZj_hZ22ItKONLUb5TVVwN4RE1RUhukW9kc0txJ7s1rMnDmj2eYdRFfs5pOADs_JEJkjXRkGGek/s1600/googlephotos.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="446" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhEABn3iYHc8HESHP6l9tq6C9w-uS5PxRNmJhMQfbCWiu7DEJH76dNgXnXP0GNhp8m4aZj_hZ22ItKONLUb5TVVwN4RE1RUhukW9kc0txJ7s1rMnDmj2eYdRFfs5pOADs_JEJkjXRkGGek/s640/googlephotos.png" width="640" /></a></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="font-family: "High Tower Text",serif; font-size: 14.0pt; line-height: 107%; mso-bidi-font-size: 10.0pt;"><a href="https://photos.google.com/">Google Photos</a> is a photograph and video
sharing and storage service by <a href="http://www.google.com/">Google</a>. It
was announced in <span style="color: #1f4e79; mso-style-textfill-fill-alpha: 100.0%; mso-style-textfill-fill-color: #1F4E79; mso-style-textfill-fill-colortransforms: lumm=50000; mso-style-textfill-fill-themecolor: accent1; mso-themecolor: accent1; mso-themeshade: 128;">May 2015 </span>and spun out from Google+, the company's social
network. At its launch, reviewers wrote that the service was among the best of
its kind.<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: "High Tower Text",serif; font-size: 14.0pt; line-height: 107%; mso-bidi-font-size: 10.0pt;"><br /></span></div>
<div class="MsoNormal">
<span style="font-family: "High Tower Text",serif; font-size: 14.0pt; line-height: 107%; mso-bidi-font-size: 10.0pt;">Its core features were
previously embedded within Google+, the company's social network. The new
Google Photos includes unlimited photo and video storage, and apps for Android,
iOS, and the browser. Users back up their photos to the cloud service, and
become accessible between all of their devices connected to the service.<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: "High Tower Text",serif; font-size: 14.0pt; line-height: 107%; mso-bidi-font-size: 10.0pt;"><br /></span></div>
<div class="MsoNormal">
<span style="font-family: 'High Tower Text', serif; font-size: 14pt; line-height: 19.9733333587647px;">The Photos service analyzes and organizes images into groups and can identify features such as beaches, skylines, or "snowstorms in Toronto". From the application's search window, users are shown potential searches for groups of photos in three major categories: People, Places, and Things. The service analyzes photos for similar faces and groups them together in the People category. It can also group faces as they age. The Places category uses geotagging data but can also determine locations in older pictures by analyzing for major landmarks (e.g., photos containing the Eiffel Tower). The Things category processes photos for their subject matter: birthdays, buildings, cats, concerts, food, graduations, posters, screenshots, etc. Users can manually remove categorization errors.</span></div>
<div>
<span style="font-family: 'High Tower Text', serif; font-size: 14pt; line-height: 19.9733333587647px;"><br /></span></div>
<div class="MsoNormal">
<span style="font-family: "High Tower Text",serif; font-size: 14.0pt; line-height: 107%; mso-bidi-font-size: 10.0pt;"><br /></span></div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<br />
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjP9o0ygTc00LxZOWteproBcgGs67TXR9ebmCXSCoN86H78wZftw8BMse7X5_JfOrCSm5j2amoqgKAevqjCCZYetBMuhkfY8IPNHaI0TI5lMVPGCYMvwhk3dDiiNJJ8ZIsDuiXh5KKdN4U/s1600/assistent.PNG" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" height="330" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjP9o0ygTc00LxZOWteproBcgGs67TXR9ebmCXSCoN86H78wZftw8BMse7X5_JfOrCSm5j2amoqgKAevqjCCZYetBMuhkfY8IPNHaI0TI5lMVPGCYMvwhk3dDiiNJJ8ZIsDuiXh5KKdN4U/s400/assistent.PNG" width="400" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;"><span style="font-family: 'High Tower Text', serif; font-size: 18.6666660308838px; line-height: 19.9733333587647px; text-align: left;">Your assistant shows you fun new things automatically created from your photos & helps you stay organized</span></td></tr>
</tbody></table>
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div class="MsoNormal">
<span style="font-family: "High Tower Text",serif; font-size: 14.0pt; line-height: 107%; mso-bidi-font-size: 10.0pt;">Recipients of shared
images can view web galleries without needing to download the app. Users can
swipe their fingers across the screen to adjust the service's photo editing
settings, as opposed to using sliders. Images can be easily shared with social
networks (Google+, Facebook, Twitter) and other services. The application
generates web links that both Google Photos users and non-users can access.<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: "High Tower Text",serif; font-size: 14.0pt; line-height: 107%; mso-bidi-font-size: 10.0pt;"><br /></span></div>
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgO_ZyPBKlJge-K5M9xOiLbf_4-tbFH2MulB1RlGEaJvnY62kQojyppVBpAlNv5W1xBLUU-uUFGfr7vaVJIPD3QJwWOzMN-7A1mhRPlZUXj6sJTxrvPenq_uQyKWIBGyYcuEZBxGoO-_nI/s1600/apps.PNG" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" height="331" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgO_ZyPBKlJge-K5M9xOiLbf_4-tbFH2MulB1RlGEaJvnY62kQojyppVBpAlNv5W1xBLUU-uUFGfr7vaVJIPD3QJwWOzMN-7A1mhRPlZUXj6sJTxrvPenq_uQyKWIBGyYcuEZBxGoO-_nI/s400/apps.PNG" width="400" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;"><div class="MsoNormal">
<span style="font-family: "High Tower Text",serif; font-size: 14.0pt; line-height: 107%; mso-bidi-font-size: 10.0pt;">Google Photos app<o:p></o:p></span></div>
</td></tr>
</tbody></table>
<div class="MsoNormal">
<span style="font-family: "High Tower Text",serif; font-size: 14.0pt; line-height: 107%; mso-bidi-font-size: 10.0pt;"><br /></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: 'High Tower Text', serif; font-size: 14pt;">Google Photos app available for </span><span style="font-family: 'Times New Roman', serif; font-size: 13.5pt;"><o:p></o:p></span></div>
<div class="MsoListParagraphCxSpFirst" style="margin-bottom: 0.0001pt; text-indent: -0.25in;">
<!--[if !supportLists]--><span style="font-family: Symbol; font-size: 13.5pt;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;">
</span></span><!--[endif]--><span style="font-family: 'High Tower Text', serif; font-size: 14pt;"><a href="https://play.google.com/store/apps/details?id=com.google.android.apps.photos">Android
Devices</a></span><span style="font-family: 'Times New Roman', serif; font-size: 13.5pt;"><o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="margin-bottom: 0.0001pt; text-indent: -0.25in;">
<!--[if !supportLists]--><span style="font-family: Symbol; font-size: 13.5pt;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;">
</span></span><!--[endif]--><span style="font-family: 'High Tower Text', serif; font-size: 14pt;"><a href="https://itunes.apple.com/us/app/google-photos/id962194608">IPhones and IPads</a></span><span style="font-family: 'Times New Roman', serif; font-size: 13.5pt;"><o:p></o:p></span></div>
<div class="MsoNormal">
</div>
<div class="MsoListParagraphCxSpLast" style="margin-bottom: 0.0001pt; text-indent: -0.25in;">
<!--[if !supportLists]--><span style="font-family: Symbol; font-size: 13.5pt;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;">
</span></span><!--[endif]--><span style="font-family: 'High Tower Text', serif; font-size: 14pt;"><a href="https://dl.google.com/dl/picasa/gpautobackup_setup.exe">Desktop Uploader</a>
(Download Google Photos .exe Setup)</span><span style="font-family: 'Times New Roman', serif; font-size: 13.5pt;"><o:p></o:p></span></div>
<div class="MsoListParagraphCxSpLast" style="margin-bottom: 0.0001pt; text-indent: -0.25in;">
<span style="font-family: 'High Tower Text', serif; font-size: 14pt;"><br /></span></div>
<div class="MsoListParagraphCxSpLast" style="margin-bottom: 0.0001pt; text-indent: -0.25in;">
<span style="font-family: 'High Tower Text', serif; font-size: 14pt;"><br /></span></div>
</div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3078132662608425729.post-21249829309407198172015-08-19T05:57:00.000-07:002015-09-08T03:47:19.151-07:00Google Developers: List of All Products <div dir="ltr" style="text-align: left;" trbidi="on">
<div class="devsite-products-alphabet-letter" id="a" style="box-sizing: inherit; margin: 0px 0px 20px; padding: 0px;">
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiz_n1t3uMWRcAYvciprZLGCACLHJweZqV107PLwYT53n-xbP0nQmFRs2DQ3iOqgBigSscX6TjVesfKyBNcmZd9nngiZksHDpYU4AAqWFEjUPNPuY6FWeMFwTEg8NNNpU-SaRQU7qmE-Qk/s1600/google-product.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="424" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiz_n1t3uMWRcAYvciprZLGCACLHJweZqV107PLwYT53n-xbP0nQmFRs2DQ3iOqgBigSscX6TjVesfKyBNcmZd9nngiZksHDpYU4AAqWFEjUPNPuY6FWeMFwTEg8NNNpU-SaRQU7qmE-Qk/s640/google-product.gif" width="640" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<b><span style="font-size: large;"><br /></span></b></div>
<div class="separator" style="clear: both; text-align: center;">
<b><span style="font-size: large;">Google Developers Products are software development tools, application programming interfaces (APIs), and technical resources.</span> </b><span class="Apple-tab-span" style="white-space: pre;"><b> </b> </span></div>
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<span class="Apple-tab-span" style="white-space: pre;"> </span><br />
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<h3 class="devsite-products-alphabet-letter-heading" style="box-sizing: inherit; color: #212121; float: left; font-family: Roboto, sans-serif; font-size: 34px; font-stretch: normal; font-weight: 300; letter-spacing: -0.01em; line-height: 40px; margin: -4px 0px 0px; overflow: hidden; padding: 0px; text-overflow: ellipsis; width: 40px;">
A</h3>
<div class="devsite-products-alphabet-letter-inner" style="box-sizing: inherit; margin: 0px 0px 0px 40px; padding: 0px;">
<a class="devsite-products-alphabet-letter-link" data-category="Products Page" data-label="Admin API" href="https://cloud.google.com/appengine/docs/admin-api/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Admin API</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/admin-sdk/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Admin SDK</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/admob/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">AdMob</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/ads" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Ads</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/adsense/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">AdSense</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/custom-search-ads/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">AdSense Custom Search Ads</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/adsense-for-shopping/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">AdSense for Shopping</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/adsense/host/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">AdSense Host API</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/adsense/management/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">AdSense Management API</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/adwords/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Google AdWords</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/adwords/api/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">AdWords API</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/adwords/apps" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">AdWords App Promotion</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/adwords-remarketing-tag/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">AdWords Remarketing Tag</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/adwords/scripts/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">AdWords Scripts</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/analytics/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Google Analytics</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/analytics/devguides/reporting/core/v3/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Analytics Core Reporting API</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/analytics/devguides/reporting/embed/v1/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Analytics Embed API</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/analytics/devguides/collection/analyticsjs/events" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Analytics Event Tracking</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/analytics/devguides/collection/ios/v3/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Analytics for iOS</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/analytics/devguides/config/mgmt/v3/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Analytics Management API</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/analytics/devguides/collection/protocol/v1/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Analytics Measurement Protocol</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/analytics/devguides/reporting/metadata/v3/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Analytics Metadata API</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/analytics/devguides/reporting/mcf/v3/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Analytics Multi-Channel Funnels Reporting API</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/analytics/devguides/collection/unity/v3/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Analytics Plugin for Unity</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/analytics/devguides/config/provisioning/v3/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Analytics Provisioning API</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/analytics/devguides/reporting/realtime/v3/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Analytics Real Time Reporting API</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/analytics/devguides/collection/android/v4/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Analytics SDK for Android</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/analytics/devguides/collection/web" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Analytics Web Tracking</a><a class="devsite-products-alphabet-letter-link" data-category="Products Page" data-label="Android Developers" href="https://developer.android.com/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Android Developers</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/android/for-all/vocab-words" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Android for All</a><a class="devsite-products-alphabet-letter-link" data-category="Products Page" data-label="AngularJS" href="https://angularjs.org/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">AngularJS</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/api-client-library/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">API Client Libraries</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/discovery/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">API Discovery Service</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/apis-explorer/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">APIs Explorer</a><a class="devsite-products-alphabet-letter-link" data-category="Products Page" data-label="App Engine" href="https://cloud.google.com/appengine/docs/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">App Engine</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/app-indexing/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">App Indexing</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/app-invites/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">App Invites (Beta)</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/google-apps/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Google Apps</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/apps-marketplace/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Apps Marketplace</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/admin-sdk/reseller/v1/get-start/getting-started" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Google Apps Reseller API</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/apps-script/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Apps Script</a><a class="devsite-products-alphabet-letter-link" data-category="Products Page" data-label="Appurify" href="http://appurify.com/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Appurify</a></div>
<div class="devsite-products-alphabet-back-to-top-wrapper" style="border-bottom-color: rgb(235, 235, 235); border-bottom-style: solid; border-bottom-width: 1px; box-sizing: inherit; clear: left; height: 24px; margin: 20px 0px 0px; overflow: hidden; padding: 0px; position: relative;">
<a class="devsite-back-to-top-link" href="https://google-developers.appspot.com/products/#top_of_page" style="bottom: 0px; box-sizing: inherit; color: #03a9f4; outline: 0px; position: absolute; right: 0px; text-decoration: none;"><img class="devsite-back-to-top-image" src="https://google-developers.appspot.com/_static/images/redesign-14/devsite-back-to-top.svg" style="border: 0px; box-sizing: inherit; height: 24px; margin: 0px; max-width: 100%; padding: 0px; vertical-align: top; width: 24px;" /></a></div>
</div>
<div class="devsite-products-alphabet-letter" id="b" style="box-sizing: inherit; margin: 0px 0px 20px; padding: 0px;">
<h3 class="devsite-products-alphabet-letter-heading" style="box-sizing: inherit; color: #212121; float: left; font-family: Roboto, sans-serif; font-size: 34px; font-stretch: normal; font-weight: 300; letter-spacing: -0.01em; line-height: 40px; margin: -4px 0px 0px; overflow: hidden; padding: 0px; text-overflow: ellipsis; width: 40px;">
B</h3>
<div class="devsite-products-alphabet-letter-inner" style="box-sizing: inherit; margin: 0px 0px 0px 40px; padding: 0px;">
<a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/beacons/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Beacons</a><a class="devsite-products-alphabet-letter-link" data-category="Products Page" data-label="BigQuery" href="https://cloud.google.com/bigquery/docs/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">BigQuery</a><a class="devsite-products-alphabet-letter-link" data-category="Products Page" data-label="Blink" href="https://www.chromium.org/blink" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Blink</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/blockly/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Blockly</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/blogger/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Blogger</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/books/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Google Books APIs</a></div>
<div class="devsite-products-alphabet-back-to-top-wrapper" style="border-bottom-color: rgb(235, 235, 235); border-bottom-style: solid; border-bottom-width: 1px; box-sizing: inherit; clear: left; height: 24px; margin: 20px 0px 0px; overflow: hidden; padding: 0px; position: relative;">
<a class="devsite-back-to-top-link" href="https://google-developers.appspot.com/products/#top_of_page" style="bottom: 0px; box-sizing: inherit; color: #03a9f4; outline: 0px; position: absolute; right: 0px; text-decoration: none;"><img class="devsite-back-to-top-image" src="https://google-developers.appspot.com/_static/images/redesign-14/devsite-back-to-top.svg" style="border: 0px; box-sizing: inherit; height: 24px; margin: 0px; max-width: 100%; padding: 0px; vertical-align: top; width: 24px;" /></a></div>
</div>
<div class="devsite-products-alphabet-letter" id="c" style="box-sizing: inherit; margin: 0px 0px 20px; padding: 0px;">
<h3 class="devsite-products-alphabet-letter-heading" style="box-sizing: inherit; color: #212121; float: left; font-family: Roboto, sans-serif; font-size: 34px; font-stretch: normal; font-weight: 300; letter-spacing: -0.01em; line-height: 40px; margin: -4px 0px 0px; overflow: hidden; padding: 0px; text-overflow: ellipsis; width: 40px;">
C</h3>
<div class="devsite-products-alphabet-letter-inner" style="box-sizing: inherit; margin: 0px 0px 0px 40px; padding: 0px;">
<a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/caja/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Caja</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/google-apps/calendar/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Google Calendar API</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/cardboard/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Cardboard</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/google-apps/carddav/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Google CardDAV API</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/cast/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Cast</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/chart/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Charts</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/chrome/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Google Chrome</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/chrome/remote-desktop/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Google Chrome Remote Desktop API</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/v8/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Chrome V8</a><a class="devsite-products-alphabet-letter-link" data-category="Products Page" data-label="Chromium" href="https://www.chromium.org/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Chromium</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/civic-information/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Civic Information API</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/analytics/devguides/collection/gajs" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Classic Analytics Web Tracking (ga.js)</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/classroom/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Classroom API</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/closure/compiler" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Closure Compiler</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/closure/library" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Closure Library</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/closure/utilities" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Closure Linter</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/closure/templates" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Closure Templates</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/closure" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Closure Tools</a><a class="devsite-products-alphabet-letter-link" data-category="Products Page" data-label="Cloud Bigtable" href="https://cloud.google.com/bigtable/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Cloud Bigtable</a><a class="devsite-products-alphabet-letter-link" data-category="Products Page" data-label="Google Cloud Billing API" href="https://cloud.google.com/billing/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Google Cloud Billing API</a><a class="devsite-products-alphabet-letter-link" data-category="Products Page" data-label="Cloud Datastore" href="https://cloud.google.com/datastore/docs/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Cloud Datastore</a><a class="devsite-products-alphabet-letter-link" data-category="Products Page" data-label="Cloud Deployment Manager" href="https://cloud.google.com/deployment-manager/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Cloud Deployment Manager</a><a class="devsite-products-alphabet-letter-link" data-category="Products Page" data-label="Cloud DNS" href="https://cloud.google.com/dns/docs/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Cloud DNS</a><a class="devsite-products-alphabet-letter-link" data-category="Products Page" data-label="Cloud Identity and Access Management" href="https://cloud.google.com/iam/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Cloud Identity and Access Management</a><a class="devsite-products-alphabet-letter-link" data-category="Products Page" data-label="Cloud Platform" href="https://cloud.google.com/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Cloud Platform</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/cloud-print/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Cloud Print</a><a class="devsite-products-alphabet-letter-link" data-category="Products Page" data-label="Google Cloud Resource Manager API" href="https://cloud.google.com/resource-manager/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Google Cloud Resource Manager API</a><a class="devsite-products-alphabet-letter-link" data-category="Products Page" data-label="Cloud SDK" href="https://cloud.google.com/sdk/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Cloud SDK</a><a class="devsite-products-alphabet-letter-link" data-category="Products Page" data-label="Google Cloud Security Scanner" href="https://cloud.google.com/security-scanner/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Google Cloud Security Scanner</a><a class="devsite-products-alphabet-letter-link" data-category="Products Page" data-label="Cloud Source Repositories" href="https://cloud.google.com/tools/cloud-repositories/docs/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Cloud Source Repositories</a><a class="devsite-products-alphabet-letter-link" data-category="Products Page" data-label="Cloud SQL" href="https://cloud.google.com/sql/docs/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Cloud SQL</a><a class="devsite-products-alphabet-letter-link" data-category="Products Page" data-label="Cloud Storage" href="https://cloud.google.com/storage/docs/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Cloud Storage</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/cloud-test-lab/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Cloud Test Lab</a><a class="devsite-products-alphabet-letter-link" data-category="Products Page" data-label="Cloud Tools for Android Studio" href="https://cloud.google.com/tools/android-studio" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Cloud Tools for Android Studio</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/java-dev-tools/codepro" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Codepro AnalytiX</a><a class="devsite-products-alphabet-letter-link" data-category="Products Page" data-label="Compute Engine" href="https://cloud.google.com/compute/docs/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Compute Engine</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/google-apps/contacts/v3/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Contacts API</a><a class="devsite-products-alphabet-letter-link" data-category="Products Page" data-label="Container Engine" href="https://cloud.google.com/container-engine" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Container Engine</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/shopping-content/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Content API for Shopping</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/custom-search/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Custom Search</a></div>
<div class="devsite-products-alphabet-back-to-top-wrapper" style="border-bottom-color: rgb(235, 235, 235); border-bottom-style: solid; border-bottom-width: 1px; box-sizing: inherit; clear: left; height: 24px; margin: 20px 0px 0px; overflow: hidden; padding: 0px; position: relative;">
<a class="devsite-back-to-top-link" href="https://google-developers.appspot.com/products/#top_of_page" style="bottom: 0px; box-sizing: inherit; color: #03a9f4; outline: 0px; position: absolute; right: 0px; text-decoration: none;"><img class="devsite-back-to-top-image" src="https://google-developers.appspot.com/_static/images/redesign-14/devsite-back-to-top.svg" style="border: 0px; box-sizing: inherit; height: 24px; margin: 0px; max-width: 100%; padding: 0px; vertical-align: top; width: 24px;" /></a></div>
</div>
<div class="devsite-products-alphabet-letter" id="d" style="box-sizing: inherit; margin: 0px 0px 20px; padding: 0px;">
<h3 class="devsite-products-alphabet-letter-heading" style="box-sizing: inherit; color: #212121; float: left; font-family: Roboto, sans-serif; font-size: 34px; font-stretch: normal; font-weight: 300; letter-spacing: -0.01em; line-height: 40px; margin: -4px 0px 0px; overflow: hidden; padding: 0px; text-overflow: ellipsis; width: 40px;">
D</h3>
<div class="devsite-products-alphabet-letter-inner" style="box-sizing: inherit; margin: 0px 0px 0px 40px; padding: 0px;">
<a class="devsite-products-alphabet-letter-link" data-category="Products Page" data-label="Dart (language)" href="https://www.dartlang.org/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Dart (language)</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/public-data/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Dataset Publishing Language</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/depthmap-metadata/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Depthmap Metadata</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/design-sprint/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Design Sprint</a><a class="devsite-products-alphabet-letter-link" data-category="Products Page" data-label="Google Developers Console" href="https://console.developers.google.com/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Google Developers Console</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/ad-exchange/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">DoubleClick Ad Exchange</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/bid-manager/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">DoubleClick Bid Manager</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/doubleclick-publishers/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">DoubleClick for Publishers</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/doubleclick-search/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">DoubleClick Search API</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/drive/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Drive</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/drive/android/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Drive API for Android</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/drive/web/about-sdk" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Drive REST API</a></div>
<div class="devsite-products-alphabet-back-to-top-wrapper" style="border-bottom-color: rgb(235, 235, 235); border-bottom-style: solid; border-bottom-width: 1px; box-sizing: inherit; clear: left; height: 24px; margin: 20px 0px 0px; overflow: hidden; padding: 0px; position: relative;">
<a class="devsite-back-to-top-link" href="https://google-developers.appspot.com/products/#top_of_page" style="bottom: 0px; box-sizing: inherit; color: #03a9f4; outline: 0px; position: absolute; right: 0px; text-decoration: none;"><img class="devsite-back-to-top-image" src="https://google-developers.appspot.com/_static/images/redesign-14/devsite-back-to-top.svg" style="border: 0px; box-sizing: inherit; height: 24px; margin: 0px; max-width: 100%; padding: 0px; vertical-align: top; width: 24px;" /></a></div>
</div>
<div class="devsite-products-alphabet-letter" id="e" style="box-sizing: inherit; margin: 0px 0px 20px; padding: 0px;">
<h3 class="devsite-products-alphabet-letter-heading" style="box-sizing: inherit; color: #212121; float: left; font-family: Roboto, sans-serif; font-size: 34px; font-stretch: normal; font-weight: 300; letter-spacing: -0.01em; line-height: 40px; margin: -4px 0px 0px; overflow: hidden; padding: 0px; text-overflow: ellipsis; width: 40px;">
E</h3>
<div class="devsite-products-alphabet-letter-inner" style="box-sizing: inherit; margin: 0px 0px 0px 40px; padding: 0px;">
<a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/earth-engine/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Google Earth Engine API</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/eclipse/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Google Plugin for Eclipse</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/edu/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Google for Education</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/gmail/markup" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Email Markup</a></div>
<div class="devsite-products-alphabet-back-to-top-wrapper" style="border-bottom-color: rgb(235, 235, 235); border-bottom-style: solid; border-bottom-width: 1px; box-sizing: inherit; clear: left; height: 24px; margin: 20px 0px 0px; overflow: hidden; padding: 0px; position: relative;">
<a class="devsite-back-to-top-link" href="https://google-developers.appspot.com/products/#top_of_page" style="bottom: 0px; box-sizing: inherit; color: #03a9f4; outline: 0px; position: absolute; right: 0px; text-decoration: none;"><img class="devsite-back-to-top-image" src="https://google-developers.appspot.com/_static/images/redesign-14/devsite-back-to-top.svg" style="border: 0px; box-sizing: inherit; height: 24px; margin: 0px; max-width: 100%; padding: 0px; vertical-align: top; width: 24px;" /></a></div>
</div>
<div class="devsite-products-alphabet-letter" id="f" style="box-sizing: inherit; margin: 0px 0px 20px; padding: 0px;">
<h3 class="devsite-products-alphabet-letter-heading" style="box-sizing: inherit; color: #212121; float: left; font-family: Roboto, sans-serif; font-size: 34px; font-stretch: normal; font-weight: 300; letter-spacing: -0.01em; line-height: 40px; margin: -4px 0px 0px; overflow: hidden; padding: 0px; text-overflow: ellipsis; width: 40px;">
F</h3>
<div class="devsite-products-alphabet-letter-inner" style="box-sizing: inherit; margin: 0px 0px 0px 40px; padding: 0px;">
<a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/feed/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Google Feed API</a><a class="devsite-products-alphabet-letter-link" data-category="Products Page" data-label="Firebase" href="https://www.firebase.com/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Firebase</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/fit/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Google Fit</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/fonts/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Google Fonts</a><a class="devsite-products-alphabet-letter-link" data-category="Products Page" data-label="Free Trial" href="https://cloud.google.com/free-trial/docs" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Free Trial</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/fusiontables" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Fusion Tables REST API</a></div>
<div class="devsite-products-alphabet-back-to-top-wrapper" style="border-bottom-color: rgb(235, 235, 235); border-bottom-style: solid; border-bottom-width: 1px; box-sizing: inherit; clear: left; height: 24px; margin: 20px 0px 0px; overflow: hidden; padding: 0px; position: relative;">
<a class="devsite-back-to-top-link" href="https://google-developers.appspot.com/products/#top_of_page" style="bottom: 0px; box-sizing: inherit; color: #03a9f4; outline: 0px; position: absolute; right: 0px; text-decoration: none;"><img class="devsite-back-to-top-image" src="https://google-developers.appspot.com/_static/images/redesign-14/devsite-back-to-top.svg" style="border: 0px; box-sizing: inherit; height: 24px; margin: 0px; max-width: 100%; padding: 0px; vertical-align: top; width: 24px;" /></a></div>
</div>
<div class="devsite-products-alphabet-letter" id="g" style="box-sizing: inherit; margin: 0px 0px 20px; padding: 0px;">
<h3 class="devsite-products-alphabet-letter-heading" style="box-sizing: inherit; color: #212121; float: left; font-family: Roboto, sans-serif; font-size: 34px; font-stretch: normal; font-weight: 300; letter-spacing: -0.01em; line-height: 40px; margin: -4px 0px 0px; overflow: hidden; padding: 0px; text-overflow: ellipsis; width: 40px;">
G</h3>
<div class="devsite-products-alphabet-letter-inner" style="box-sizing: inherit; margin: 0px 0px 0px 40px; padding: 0px;">
<a class="devsite-products-alphabet-letter-link" data-category="Products Page" data-label="Genomics" href="https://cloud.google.com/genomics/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Genomics</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/glass/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Glass</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/gmail/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Gmail</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/gmail/api/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Gmail API</a><a class="devsite-products-alphabet-letter-link" data-category="Products Page" data-label="Go (language)" href="https://golang.org/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Go (language)</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/+/domains/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Google+ Domains API</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/+/hangouts/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Google+ Hangouts API</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/+/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Google+ Platform</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/+/web/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Google+ Platform for Web</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/+/web/signin/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Google+ Sign-In</a><a class="devsite-products-alphabet-letter-link" data-category="Products Page" data-label="GWT (Google Web Toolkit)" href="http://www.gwtproject.org/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">GWT (Google Web Toolkit)</a></div>
<div class="devsite-products-alphabet-back-to-top-wrapper" style="border-bottom-color: rgb(235, 235, 235); border-bottom-style: solid; border-bottom-width: 1px; box-sizing: inherit; clear: left; height: 24px; margin: 20px 0px 0px; overflow: hidden; padding: 0px; position: relative;">
<a class="devsite-back-to-top-link" href="https://google-developers.appspot.com/products/#top_of_page" style="bottom: 0px; box-sizing: inherit; color: #03a9f4; outline: 0px; position: absolute; right: 0px; text-decoration: none;"><img class="devsite-back-to-top-image" src="https://google-developers.appspot.com/_static/images/redesign-14/devsite-back-to-top.svg" style="border: 0px; box-sizing: inherit; height: 24px; margin: 0px; max-width: 100%; padding: 0px; vertical-align: top; width: 24px;" /></a></div>
</div>
<div class="devsite-products-alphabet-letter" id="h" style="box-sizing: inherit; margin: 0px 0px 20px; padding: 0px;">
<h3 class="devsite-products-alphabet-letter-heading" style="box-sizing: inherit; color: #212121; float: left; font-family: Roboto, sans-serif; font-size: 34px; font-stretch: normal; font-weight: 300; letter-spacing: -0.01em; line-height: 40px; margin: -4px 0px 0px; overflow: hidden; padding: 0px; text-overflow: ellipsis; width: 40px;">
H</h3>
<div class="devsite-products-alphabet-letter-inner" style="box-sizing: inherit; margin: 0px 0px 0px 40px; padding: 0px;">
<a class="devsite-products-alphabet-letter-link" data-category="Products Page" data-label="Hadoop on Google Cloud Platform" href="https://cloud.google.com/hadoop/docs/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Hadoop on Google Cloud Platform</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/speed/libraries/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Hosted Libraries</a><a class="devsite-products-alphabet-letter-link" data-category="Products Page" data-label="HTML5 Rocks" href="http://www.html5rocks.com/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">HTML5 Rocks</a></div>
<div class="devsite-products-alphabet-back-to-top-wrapper" style="border-bottom-color: rgb(235, 235, 235); border-bottom-style: solid; border-bottom-width: 1px; box-sizing: inherit; clear: left; height: 24px; margin: 20px 0px 0px; overflow: hidden; padding: 0px; position: relative;">
<a class="devsite-back-to-top-link" href="https://google-developers.appspot.com/products/#top_of_page" style="bottom: 0px; box-sizing: inherit; color: #03a9f4; outline: 0px; position: absolute; right: 0px; text-decoration: none;"><img class="devsite-back-to-top-image" src="https://google-developers.appspot.com/_static/images/redesign-14/devsite-back-to-top.svg" style="border: 0px; box-sizing: inherit; height: 24px; margin: 0px; max-width: 100%; padding: 0px; vertical-align: top; width: 24px;" /></a></div>
</div>
<div class="devsite-products-alphabet-letter" id="i" style="box-sizing: inherit; margin: 0px 0px 20px; padding: 0px;">
<h3 class="devsite-products-alphabet-letter-heading" style="box-sizing: inherit; color: #212121; float: left; font-family: Roboto, sans-serif; font-size: 34px; font-stretch: normal; font-weight: 300; letter-spacing: -0.01em; line-height: 40px; margin: -4px 0px 0px; overflow: hidden; padding: 0px; text-overflow: ellipsis; width: 40px;">
I</h3>
<div class="devsite-products-alphabet-letter-inner" style="box-sizing: inherit; margin: 0px 0px 0px 40px; padding: 0px;">
<a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/identity/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Google Identity Platform</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/identity/toolkit/android/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Identity Toolkit for Android</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/identity/toolkit/ios/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Identity Toolkit for iOS</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/identity/toolkit/web/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Identity Toolkit for Websites</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/chrome/apps/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Installable Web Apps</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/instance-id/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Instance ID</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/interactive-media-ads/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Interactive Media Ads</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/international" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Internationalization (i18n)</a></div>
<div class="devsite-products-alphabet-back-to-top-wrapper" style="border-bottom-color: rgb(235, 235, 235); border-bottom-style: solid; border-bottom-width: 1px; box-sizing: inherit; clear: left; height: 24px; margin: 20px 0px 0px; overflow: hidden; padding: 0px; position: relative;">
<a class="devsite-back-to-top-link" href="https://google-developers.appspot.com/products/#top_of_page" style="bottom: 0px; box-sizing: inherit; color: #03a9f4; outline: 0px; position: absolute; right: 0px; text-decoration: none;"><img class="devsite-back-to-top-image" src="https://google-developers.appspot.com/_static/images/redesign-14/devsite-back-to-top.svg" style="border: 0px; box-sizing: inherit; height: 24px; margin: 0px; max-width: 100%; padding: 0px; vertical-align: top; width: 24px;" /></a></div>
</div>
<div class="devsite-products-alphabet-letter" id="j" style="box-sizing: inherit; margin: 0px 0px 20px; padding: 0px;">
<h3 class="devsite-products-alphabet-letter-heading" style="box-sizing: inherit; color: #212121; float: left; font-family: Roboto, sans-serif; font-size: 34px; font-stretch: normal; font-weight: 300; letter-spacing: -0.01em; line-height: 40px; margin: -4px 0px 0px; overflow: hidden; padding: 0px; text-overflow: ellipsis; width: 40px;">
J</h3>
<div class="devsite-products-alphabet-letter-inner" style="box-sizing: inherit; margin: 0px 0px 0px 40px; padding: 0px;">
<a class="devsite-products-alphabet-letter-link" data-category="Products Page" data-label="J2ObjC" href="http://j2objc.org/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">J2ObjC</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/java-dev-tools/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Java Developer Tools</a></div>
<div class="devsite-products-alphabet-back-to-top-wrapper" style="border-bottom-color: rgb(235, 235, 235); border-bottom-style: solid; border-bottom-width: 1px; box-sizing: inherit; clear: left; height: 24px; margin: 20px 0px 0px; overflow: hidden; padding: 0px; position: relative;">
<a class="devsite-back-to-top-link" href="https://google-developers.appspot.com/products/#top_of_page" style="bottom: 0px; box-sizing: inherit; color: #03a9f4; outline: 0px; position: absolute; right: 0px; text-decoration: none;"><img class="devsite-back-to-top-image" src="https://google-developers.appspot.com/_static/images/redesign-14/devsite-back-to-top.svg" style="border: 0px; box-sizing: inherit; height: 24px; margin: 0px; max-width: 100%; padding: 0px; vertical-align: top; width: 24px;" /></a></div>
</div>
<div class="devsite-products-alphabet-letter" id="k" style="box-sizing: inherit; margin: 0px 0px 20px; padding: 0px;">
<h3 class="devsite-products-alphabet-letter-heading" style="box-sizing: inherit; color: #212121; float: left; font-family: Roboto, sans-serif; font-size: 34px; font-stretch: normal; font-weight: 300; letter-spacing: -0.01em; line-height: 40px; margin: -4px 0px 0px; overflow: hidden; padding: 0px; text-overflow: ellipsis; width: 40px;">
K</h3>
<div class="devsite-products-alphabet-letter-inner" style="box-sizing: inherit; margin: 0px 0px 0px 40px; padding: 0px;">
<a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/kml/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Keyhole Markup Language</a></div>
<div class="devsite-products-alphabet-back-to-top-wrapper" style="border-bottom-color: rgb(235, 235, 235); border-bottom-style: solid; border-bottom-width: 1px; box-sizing: inherit; clear: left; height: 24px; margin: 20px 0px 0px; overflow: hidden; padding: 0px; position: relative;">
<a class="devsite-back-to-top-link" href="https://google-developers.appspot.com/products/#top_of_page" style="bottom: 0px; box-sizing: inherit; color: #03a9f4; outline: 0px; position: absolute; right: 0px; text-decoration: none;"><img class="devsite-back-to-top-image" src="https://google-developers.appspot.com/_static/images/redesign-14/devsite-back-to-top.svg" style="border: 0px; box-sizing: inherit; height: 24px; margin: 0px; max-width: 100%; padding: 0px; vertical-align: top; width: 24px;" /></a></div>
</div>
<div class="devsite-products-alphabet-letter" id="l" style="box-sizing: inherit; margin: 0px 0px 20px; padding: 0px;">
<h3 class="devsite-products-alphabet-letter-heading" style="box-sizing: inherit; color: #212121; float: left; font-family: Roboto, sans-serif; font-size: 34px; font-stretch: normal; font-weight: 300; letter-spacing: -0.01em; line-height: 40px; margin: -4px 0px 0px; overflow: hidden; padding: 0px; text-overflow: ellipsis; width: 40px;">
L</h3>
<div class="devsite-products-alphabet-letter-inner" style="box-sizing: inherit; margin: 0px 0px 0px 40px; padding: 0px;">
<a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/loader/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Google Loader</a></div>
<div class="devsite-products-alphabet-back-to-top-wrapper" style="border-bottom-color: rgb(235, 235, 235); border-bottom-style: solid; border-bottom-width: 1px; box-sizing: inherit; clear: left; height: 24px; margin: 20px 0px 0px; overflow: hidden; padding: 0px; position: relative;">
<a class="devsite-back-to-top-link" href="https://google-developers.appspot.com/products/#top_of_page" style="bottom: 0px; box-sizing: inherit; color: #03a9f4; outline: 0px; position: absolute; right: 0px; text-decoration: none;"><img class="devsite-back-to-top-image" src="https://google-developers.appspot.com/_static/images/redesign-14/devsite-back-to-top.svg" style="border: 0px; box-sizing: inherit; height: 24px; margin: 0px; max-width: 100%; padding: 0px; vertical-align: top; width: 24px;" /></a></div>
</div>
<div class="devsite-products-alphabet-letter" id="m" style="box-sizing: inherit; margin: 0px 0px 20px; padding: 0px;">
<h3 class="devsite-products-alphabet-letter-heading" style="box-sizing: inherit; color: #212121; float: left; font-family: Roboto, sans-serif; font-size: 34px; font-stretch: normal; font-weight: 300; letter-spacing: -0.01em; line-height: 40px; margin: -4px 0px 0px; overflow: hidden; padding: 0px; text-overflow: ellipsis; width: 40px;">
M</h3>
<div class="devsite-products-alphabet-letter-inner" style="box-sizing: inherit; margin: 0px 0px 0px 40px; padding: 0px;">
<a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/speed/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Make the Web Faster</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/maps/documentation/android/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Google Maps Android API</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/maps/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Google Maps APIs</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/maps/documentation/directions/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Google Maps Directions API</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/maps/documentation/distancematrix/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Google Maps Distance Matrix API</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/maps/documentation/elevation/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Google Maps Elevation API</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/maps/documentation/embed/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Google Maps Embed API</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/maps/documentation/geocoding/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Google Maps Geocoding API</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/maps/documentation/javascript/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Google Maps JavaScript API</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/maps/documentation/roads/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Google Maps Roads API</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/maps/documentation/ios/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Google Maps SDK for iOS</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/maps/documentation/streetview/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Google Maps Street View API</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/maps/documentation/timezone/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Google Maps Time Zone API</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/merchant-review-feeds/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Google Merchant Review Feeds</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/mobile-ads-sdk/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Mobile Ads SDK</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/app-conversion-tracking/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Mobile Apps Conversion Tracking and Remarketing</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/vision/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Mobile Vision</a></div>
<div class="devsite-products-alphabet-back-to-top-wrapper" style="border-bottom-color: rgb(235, 235, 235); border-bottom-style: solid; border-bottom-width: 1px; box-sizing: inherit; clear: left; height: 24px; margin: 20px 0px 0px; overflow: hidden; padding: 0px; position: relative;">
<a class="devsite-back-to-top-link" href="https://google-developers.appspot.com/products/#top_of_page" style="bottom: 0px; box-sizing: inherit; color: #03a9f4; outline: 0px; position: absolute; right: 0px; text-decoration: none;"><img class="devsite-back-to-top-image" src="https://google-developers.appspot.com/_static/images/redesign-14/devsite-back-to-top.svg" style="border: 0px; box-sizing: inherit; height: 24px; margin: 0px; max-width: 100%; padding: 0px; vertical-align: top; width: 24px;" /></a></div>
</div>
<div class="devsite-products-alphabet-letter" id="n" style="box-sizing: inherit; margin: 0px 0px 20px; padding: 0px;">
<h3 class="devsite-products-alphabet-letter-heading" style="box-sizing: inherit; color: #212121; float: left; font-family: Roboto, sans-serif; font-size: 34px; font-stretch: normal; font-weight: 300; letter-spacing: -0.01em; line-height: 40px; margin: -4px 0px 0px; overflow: hidden; padding: 0px; text-overflow: ellipsis; width: 40px;">
N</h3>
<div class="devsite-products-alphabet-letter-inner" style="box-sizing: inherit; margin: 0px 0px 0px 40px; padding: 0px;">
<a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/native-client/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Native Client</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/nearby/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Nearby</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/nearby/connections/overview" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Nearby Connections API</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/nearby/messages/overview" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Nearby Messages API</a><a class="devsite-products-alphabet-letter-link" data-category="Products Page" data-label="Nest API" href="https://developer.nest.com/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Nest API</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/android/nexus/images" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Nexus Files for Developers</a></div>
<div class="devsite-products-alphabet-back-to-top-wrapper" style="border-bottom-color: rgb(235, 235, 235); border-bottom-style: solid; border-bottom-width: 1px; box-sizing: inherit; clear: left; height: 24px; margin: 20px 0px 0px; overflow: hidden; padding: 0px; position: relative;">
<a class="devsite-back-to-top-link" href="https://google-developers.appspot.com/products/#top_of_page" style="bottom: 0px; box-sizing: inherit; color: #03a9f4; outline: 0px; position: absolute; right: 0px; text-decoration: none;"><img class="devsite-back-to-top-image" src="https://google-developers.appspot.com/_static/images/redesign-14/devsite-back-to-top.svg" style="border: 0px; box-sizing: inherit; height: 24px; margin: 0px; max-width: 100%; padding: 0px; vertical-align: top; width: 24px;" /></a></div>
</div>
<div class="devsite-products-alphabet-letter" id="o" style="box-sizing: inherit; margin: 0px 0px 20px; padding: 0px;">
<h3 class="devsite-products-alphabet-letter-heading" style="box-sizing: inherit; color: #212121; float: left; font-family: Roboto, sans-serif; font-size: 34px; font-stretch: normal; font-weight: 300; letter-spacing: -0.01em; line-height: 40px; margin: -4px 0px 0px; overflow: hidden; padding: 0px; text-overflow: ellipsis; width: 40px;">
O</h3>
<div class="devsite-products-alphabet-letter-inner" style="box-sizing: inherit; margin: 0px 0px 0px 40px; padding: 0px;">
<a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/octane/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Octane</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/ad-exchange/rtb/open-bidder/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Open Bidder (Beta)</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/open-source/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Open Source Programs Office</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/open-spherical-camera" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Open Spherical Camera API</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/optimization/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Optimization</a></div>
<div class="devsite-products-alphabet-back-to-top-wrapper" style="border-bottom-color: rgb(235, 235, 235); border-bottom-style: solid; border-bottom-width: 1px; box-sizing: inherit; clear: left; height: 24px; margin: 20px 0px 0px; overflow: hidden; padding: 0px; position: relative;">
<a class="devsite-back-to-top-link" href="https://google-developers.appspot.com/products/#top_of_page" style="bottom: 0px; box-sizing: inherit; color: #03a9f4; outline: 0px; position: absolute; right: 0px; text-decoration: none;"><img class="devsite-back-to-top-image" src="https://google-developers.appspot.com/_static/images/redesign-14/devsite-back-to-top.svg" style="border: 0px; box-sizing: inherit; height: 24px; margin: 0px; max-width: 100%; padding: 0px; vertical-align: top; width: 24px;" /></a></div>
</div>
<div class="devsite-products-alphabet-letter" id="p" style="box-sizing: inherit; margin: 0px 0px 20px; padding: 0px;">
<h3 class="devsite-products-alphabet-letter-heading" style="box-sizing: inherit; color: #212121; float: left; font-family: Roboto, sans-serif; font-size: 34px; font-stretch: normal; font-weight: 300; letter-spacing: -0.01em; line-height: 40px; margin: -4px 0px 0px; overflow: hidden; padding: 0px; text-overflow: ellipsis; width: 40px;">
P</h3>
<div class="devsite-products-alphabet-letter-inner" style="box-sizing: inherit; margin: 0px 0px 0px 40px; padding: 0px;">
<a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/speed/pagespeed/module" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">PageSpeed Module</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/speed/pagespeed/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">PageSpeed Tools</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/partners/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Google Partners API</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/photo-sphere/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Photo Sphere</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/picasa-web/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Picasa Web Albums Data API</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/picker/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Picker</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/places/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Google Places API</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/places/android" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Google Places API for Android</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/places/ios" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Google Places API for iOS</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/places/javascript" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Google Places API JavaScript Library</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/places/webservice" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Google Places API Web Service</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/android-publisher" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Google Play Developer API</a><a class="devsite-products-alphabet-letter-link" data-category="Products Page" data-label="Google Play Developers Console" href="https://play.google.com/apps/publish" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Google Play Developers Console</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/games/services/android/quickstart" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Play Games Services for Android</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/games/services/cpp/GettingStartedNativeClient" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Play Games Services for C++</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/games/services/ios/quickstart" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Play Games Services for iOS</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/games/services/web/gettingstarted" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Play Games Services for Web</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/games/services/management/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Play Games Services Management API</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/games/services/publishing/quickstart" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Play Games Services Publishing API</a><a class="devsite-products-alphabet-letter-link" data-category="Products Page" data-label="Polymer" href="https://www.polymer-project.org/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Polymer</a><a class="devsite-products-alphabet-letter-link" data-category="Products Page" data-label="Prediction API" href="https://cloud.google.com/prediction/docs/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Prediction API</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/brillo" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Project Brillo</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/project-tango/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Project Tango</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/project-tango/apis/c/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Project Tango C API</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/project-tango/apis/java/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Project Tango Java API</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/project-tango/apis/unity/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Project Tango Unity SDK</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/protocol-buffers/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Protocol Buffers</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/beacons/proximity/guides" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Proximity Beacon API</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/speed/public-dns/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Public DNS</a></div>
<div class="devsite-products-alphabet-back-to-top-wrapper" style="border-bottom-color: rgb(235, 235, 235); border-bottom-style: solid; border-bottom-width: 1px; box-sizing: inherit; clear: left; height: 24px; margin: 20px 0px 0px; overflow: hidden; padding: 0px; position: relative;">
<a class="devsite-back-to-top-link" href="https://google-developers.appspot.com/products/#top_of_page" style="bottom: 0px; box-sizing: inherit; color: #03a9f4; outline: 0px; position: absolute; right: 0px; text-decoration: none;"><img class="devsite-back-to-top-image" src="https://google-developers.appspot.com/_static/images/redesign-14/devsite-back-to-top.svg" style="border: 0px; box-sizing: inherit; height: 24px; margin: 0px; max-width: 100%; padding: 0px; vertical-align: top; width: 24px;" /></a></div>
</div>
<div class="devsite-products-alphabet-letter" id="q" style="box-sizing: inherit; margin: 0px 0px 20px; padding: 0px;">
<h3 class="devsite-products-alphabet-letter-heading" style="box-sizing: inherit; color: #212121; float: left; font-family: Roboto, sans-serif; font-size: 34px; font-stretch: normal; font-weight: 300; letter-spacing: -0.01em; line-height: 40px; margin: -4px 0px 0px; overflow: hidden; padding: 0px; text-overflow: ellipsis; width: 40px;">
Q</h3>
<div class="devsite-products-alphabet-letter-inner" style="box-sizing: inherit; margin: 0px 0px 0px 40px; padding: 0px;">
<a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/qpx-express/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">QPX Express API</a></div>
<div class="devsite-products-alphabet-back-to-top-wrapper" style="border-bottom-color: rgb(235, 235, 235); border-bottom-style: solid; border-bottom-width: 1px; box-sizing: inherit; clear: left; height: 24px; margin: 20px 0px 0px; overflow: hidden; padding: 0px; position: relative;">
<a class="devsite-back-to-top-link" href="https://google-developers.appspot.com/products/#top_of_page" style="bottom: 0px; box-sizing: inherit; color: #03a9f4; outline: 0px; position: absolute; right: 0px; text-decoration: none;"><img class="devsite-back-to-top-image" src="https://google-developers.appspot.com/_static/images/redesign-14/devsite-back-to-top.svg" style="border: 0px; box-sizing: inherit; height: 24px; margin: 0px; max-width: 100%; padding: 0px; vertical-align: top; width: 24px;" /></a></div>
</div>
<div class="devsite-products-alphabet-letter" id="r" style="box-sizing: inherit; margin: 0px 0px 20px; padding: 0px;">
<h3 class="devsite-products-alphabet-letter-heading" style="box-sizing: inherit; color: #212121; float: left; font-family: Roboto, sans-serif; font-size: 34px; font-stretch: normal; font-weight: 300; letter-spacing: -0.01em; line-height: 40px; margin: -4px 0px 0px; overflow: hidden; padding: 0px; text-overflow: ellipsis; width: 40px;">
R</h3>
<div class="devsite-products-alphabet-letter-inner" style="box-sizing: inherit; margin: 0px 0px 0px 40px; padding: 0px;">
<a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/google-apps/realtime/overview" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Realtime API</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/transit/gtfs-realtime/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Realtime Transit</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/recaptcha/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">reCAPTCHA</a></div>
<div class="devsite-products-alphabet-back-to-top-wrapper" style="border-bottom-color: rgb(235, 235, 235); border-bottom-style: solid; border-bottom-width: 1px; box-sizing: inherit; clear: left; height: 24px; margin: 20px 0px 0px; overflow: hidden; padding: 0px; position: relative;">
<a class="devsite-back-to-top-link" href="https://google-developers.appspot.com/products/#top_of_page" style="bottom: 0px; box-sizing: inherit; color: #03a9f4; outline: 0px; position: absolute; right: 0px; text-decoration: none;"><img class="devsite-back-to-top-image" src="https://google-developers.appspot.com/_static/images/redesign-14/devsite-back-to-top.svg" style="border: 0px; box-sizing: inherit; height: 24px; margin: 0px; max-width: 100%; padding: 0px; vertical-align: top; width: 24px;" /></a></div>
</div>
<div class="devsite-products-alphabet-letter" id="s" style="box-sizing: inherit; margin: 0px 0px 20px; padding: 0px;">
<h3 class="devsite-products-alphabet-letter-heading" style="box-sizing: inherit; color: #212121; float: left; font-family: Roboto, sans-serif; font-size: 34px; font-stretch: normal; font-weight: 300; letter-spacing: -0.01em; line-height: 40px; margin: -4px 0px 0px; overflow: hidden; padding: 0px; text-overflow: ellipsis; width: 40px;">
S</h3>
<div class="devsite-products-alphabet-letter-inner" style="box-sizing: inherit; margin: 0px 0px 0px 40px; padding: 0px;">
<a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/safe-browsing/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Safe Browsing API</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/schemas/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Google Schemas</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/search" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Search</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/webmaster-tools/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Search Console API (Webmaster Tools API)</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/ad-exchange/seller-rest/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Seller REST API</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/google-apps/spreadsheets/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Sheets API</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/identity/sign-in/android/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Google Sign-In for Android</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/identity/sign-in/ios/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Google Sign-In for iOS</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/identity/sign-in/web/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Google Sign-In for Websites</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/site-verification/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Google Site Verification API</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/google-apps/sites/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Google Sites API</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/identity/smartlock-passwords/android/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Smart Lock for Passwords on Android</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/speed/protocols/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">SPDY</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/spectrum/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Google Spectrum Database API</a><a class="devsite-products-alphabet-letter-link" data-category="Products Page" data-label="Stackdriver" href="https://www.stackdriver.com/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Stackdriver</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/maps/documentation/staticmaps/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Google Static Maps API</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/transit/gtfs/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Static Transit</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/structured-data/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Structured Data</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/structured-data/testing-tool/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Structured Data Testing Tool</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/swiffy/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Swiffy</a></div>
<div class="devsite-products-alphabet-back-to-top-wrapper" style="border-bottom-color: rgb(235, 235, 235); border-bottom-style: solid; border-bottom-width: 1px; box-sizing: inherit; clear: left; height: 24px; margin: 20px 0px 0px; overflow: hidden; padding: 0px; position: relative;">
<a class="devsite-back-to-top-link" href="https://google-developers.appspot.com/products/#top_of_page" style="bottom: 0px; box-sizing: inherit; color: #03a9f4; outline: 0px; position: absolute; right: 0px; text-decoration: none;"><img class="devsite-back-to-top-image" src="https://google-developers.appspot.com/_static/images/redesign-14/devsite-back-to-top.svg" style="border: 0px; box-sizing: inherit; height: 24px; margin: 0px; max-width: 100%; padding: 0px; vertical-align: top; width: 24px;" /></a></div>
</div>
<div class="devsite-products-alphabet-letter" id="t" style="box-sizing: inherit; margin: 0px 0px 20px; padding: 0px;">
<h3 class="devsite-products-alphabet-letter-heading" style="box-sizing: inherit; color: #212121; float: left; font-family: Roboto, sans-serif; font-size: 34px; font-stretch: normal; font-weight: 300; letter-spacing: -0.01em; line-height: 40px; margin: -4px 0px 0px; overflow: hidden; padding: 0px; text-overflow: ellipsis; width: 40px;">
T</h3>
<div class="devsite-products-alphabet-letter-inner" style="box-sizing: inherit; margin: 0px 0px 0px 40px; padding: 0px;">
<a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/tag-manager/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Google Tag Manager</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/tag-manager/android/v4/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Google Tag Manager for Android</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/tag-manager/ios/v3/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Google Tag Manager for iOS</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/tag-manager/quickstart" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Google Tag Manager for Web Tracking</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/tag-manager/api/v1/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Google Tag Manager REST API</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/tag-manager/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Google Tag Manager Vendor Tag Template Program</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/google-apps/tasks" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Tasks API</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/transit" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Transit</a><a class="devsite-products-alphabet-letter-link" data-category="Products Page" data-label="Translate API" href="https://cloud.google.com/translate/docs/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Translate API</a></div>
<div class="devsite-products-alphabet-back-to-top-wrapper" style="border-bottom-color: rgb(235, 235, 235); border-bottom-style: solid; border-bottom-width: 1px; box-sizing: inherit; clear: left; height: 24px; margin: 20px 0px 0px; overflow: hidden; padding: 0px; position: relative;">
<a class="devsite-back-to-top-link" href="https://google-developers.appspot.com/products/#top_of_page" style="bottom: 0px; box-sizing: inherit; color: #03a9f4; outline: 0px; position: absolute; right: 0px; text-decoration: none;"><img class="devsite-back-to-top-image" src="https://google-developers.appspot.com/_static/images/redesign-14/devsite-back-to-top.svg" style="border: 0px; box-sizing: inherit; height: 24px; margin: 0px; max-width: 100%; padding: 0px; vertical-align: top; width: 24px;" /></a></div>
</div>
<div class="devsite-products-alphabet-letter" id="u" style="box-sizing: inherit; margin: 0px 0px 20px; padding: 0px;">
<h3 class="devsite-products-alphabet-letter-heading" style="box-sizing: inherit; color: #212121; float: left; font-family: Roboto, sans-serif; font-size: 34px; font-stretch: normal; font-weight: 300; letter-spacing: -0.01em; line-height: 40px; margin: -4px 0px 0px; overflow: hidden; padding: 0px; text-overflow: ellipsis; width: 40px;">
U</h3>
<div class="devsite-products-alphabet-letter-inner" style="box-sizing: inherit; margin: 0px 0px 0px 40px; padding: 0px;">
<a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/analytics/devguides/collection/analyticsjs" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Universal Analytics Web Tracking (analytics.js)</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/url-shortener/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">URL Shortener</a></div>
<div class="devsite-products-alphabet-back-to-top-wrapper" style="border-bottom-color: rgb(235, 235, 235); border-bottom-style: solid; border-bottom-width: 1px; box-sizing: inherit; clear: left; height: 24px; margin: 20px 0px 0px; overflow: hidden; padding: 0px; position: relative;">
<a class="devsite-back-to-top-link" href="https://google-developers.appspot.com/products/#top_of_page" style="bottom: 0px; box-sizing: inherit; color: #03a9f4; outline: 0px; position: absolute; right: 0px; text-decoration: none;"><img class="devsite-back-to-top-image" src="https://google-developers.appspot.com/_static/images/redesign-14/devsite-back-to-top.svg" style="border: 0px; box-sizing: inherit; height: 24px; margin: 0px; max-width: 100%; padding: 0px; vertical-align: top; width: 24px;" /></a></div>
</div>
<div class="devsite-products-alphabet-letter" id="v" style="box-sizing: inherit; margin: 0px 0px 20px; padding: 0px;">
<h3 class="devsite-products-alphabet-letter-heading" style="box-sizing: inherit; color: #212121; float: left; font-family: Roboto, sans-serif; font-size: 34px; font-stretch: normal; font-weight: 300; letter-spacing: -0.01em; line-height: 40px; margin: -4px 0px 0px; overflow: hidden; padding: 0px; text-overflow: ellipsis; width: 40px;">
V</h3>
<div class="devsite-products-alphabet-letter-inner" style="box-sizing: inherit; margin: 0px 0px 0px 40px; padding: 0px;">
<a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/voice-actions/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Voice Actions</a></div>
<div class="devsite-products-alphabet-back-to-top-wrapper" style="border-bottom-color: rgb(235, 235, 235); border-bottom-style: solid; border-bottom-width: 1px; box-sizing: inherit; clear: left; height: 24px; margin: 20px 0px 0px; overflow: hidden; padding: 0px; position: relative;">
<a class="devsite-back-to-top-link" href="https://google-developers.appspot.com/products/#top_of_page" style="bottom: 0px; box-sizing: inherit; color: #03a9f4; outline: 0px; position: absolute; right: 0px; text-decoration: none;"><img class="devsite-back-to-top-image" src="https://google-developers.appspot.com/_static/images/redesign-14/devsite-back-to-top.svg" style="border: 0px; box-sizing: inherit; height: 24px; margin: 0px; max-width: 100%; padding: 0px; vertical-align: top; width: 24px;" /></a></div>
</div>
<div class="devsite-products-alphabet-letter" id="w" style="box-sizing: inherit; margin: 0px 0px 20px; padding: 0px;">
<h3 class="devsite-products-alphabet-letter-heading" style="box-sizing: inherit; color: #212121; float: left; font-family: Roboto, sans-serif; font-size: 34px; font-stretch: normal; font-weight: 300; letter-spacing: -0.01em; line-height: 40px; margin: -4px 0px 0px; overflow: hidden; padding: 0px; text-overflow: ellipsis; width: 40px;">
W</h3>
<div class="devsite-products-alphabet-letter-inner" style="box-sizing: inherit; margin: 0px 0px 0px 40px; padding: 0px;">
<a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/web/fundamentals/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Web Fundamentals</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/webmasters/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">Webmasters</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/speed/webp" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">WebP</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/java-dev-tools/wintester" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">WindowTester Pro</a></div>
<div class="devsite-products-alphabet-back-to-top-wrapper" style="border-bottom-color: rgb(235, 235, 235); border-bottom-style: solid; border-bottom-width: 1px; box-sizing: inherit; clear: left; height: 24px; margin: 20px 0px 0px; overflow: hidden; padding: 0px; position: relative;">
<a class="devsite-back-to-top-link" href="https://google-developers.appspot.com/products/#top_of_page" style="bottom: 0px; box-sizing: inherit; color: #03a9f4; outline: 0px; position: absolute; right: 0px; text-decoration: none;"><img class="devsite-back-to-top-image" src="https://google-developers.appspot.com/_static/images/redesign-14/devsite-back-to-top.svg" style="border: 0px; box-sizing: inherit; height: 24px; margin: 0px; max-width: 100%; padding: 0px; vertical-align: top; width: 24px;" /></a></div>
</div>
<div class="devsite-products-alphabet-letter" id="x" style="box-sizing: inherit; margin: 0px 0px 20px; padding: 0px;">
<h3 class="devsite-products-alphabet-letter-heading" style="box-sizing: inherit; color: #212121; float: left; font-family: Roboto, sans-serif; font-size: 34px; font-stretch: normal; font-weight: 300; letter-spacing: -0.01em; line-height: 40px; margin: -4px 0px 0px; overflow: hidden; padding: 0px; text-overflow: ellipsis; width: 40px;">
X</h3>
<div class="devsite-products-alphabet-letter-inner" style="box-sizing: inherit; margin: 0px 0px 0px 40px; padding: 0px;">
</div>
<div class="devsite-products-alphabet-back-to-top-wrapper" style="border-bottom-color: rgb(235, 235, 235); border-bottom-style: solid; border-bottom-width: 1px; box-sizing: inherit; clear: left; height: 24px; margin: 20px 0px 0px; overflow: hidden; padding: 0px; position: relative;">
<a class="devsite-back-to-top-link" href="https://google-developers.appspot.com/products/#top_of_page" style="bottom: 0px; box-sizing: inherit; color: #03a9f4; outline: 0px; position: absolute; right: 0px; text-decoration: none;"><img class="devsite-back-to-top-image" src="https://google-developers.appspot.com/_static/images/redesign-14/devsite-back-to-top.svg" style="border: 0px; box-sizing: inherit; height: 24px; margin: 0px; max-width: 100%; padding: 0px; vertical-align: top; width: 24px;" /></a></div>
</div>
<div class="devsite-products-alphabet-letter" id="y" style="box-sizing: inherit; margin: 0px 0px 20px; padding: 0px;">
<h3 class="devsite-products-alphabet-letter-heading" style="box-sizing: inherit; color: #212121; float: left; font-family: Roboto, sans-serif; font-size: 34px; font-stretch: normal; font-weight: 300; letter-spacing: -0.01em; line-height: 40px; margin: -4px 0px 0px; overflow: hidden; padding: 0px; text-overflow: ellipsis; width: 40px;">
Y</h3>
<div class="devsite-products-alphabet-letter-inner" style="box-sizing: inherit; margin: 0px 0px 0px 40px; padding: 0px;">
<a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/youtube/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">YouTube</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/youtube/analytics/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">YouTube Analytics API</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/youtube/android/player/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">YouTube Android Player API</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/youtube/v3/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">YouTube Data API</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/youtube/iframe_api_reference" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">YouTube IFrame Player API</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/youtube/v3/live/getting-started" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">YouTube Live Streaming API</a><a class="devsite-products-alphabet-letter-link" href="https://google-developers.appspot.com/youtube/subscribe/" style="box-sizing: inherit; color: #212121; display: inline-block; margin: 0px 0px 16px 40px; min-width: 190px; outline: 0px; text-decoration: none; vertical-align: top; width: calc((100% - 120px) / 3);">YouTube Subscribe Button</a></div>
<div class="devsite-products-alphabet-back-to-top-wrapper" style="border-bottom-color: rgb(235, 235, 235); border-bottom-style: solid; border-bottom-width: 1px; box-sizing: inherit; clear: left; height: 24px; margin: 20px 0px 0px; overflow: hidden; padding: 0px; position: relative;">
<a class="devsite-back-to-top-link" href="https://google-developers.appspot.com/products/#top_of_page" style="bottom: 0px; box-sizing: inherit; color: #03a9f4; outline: 0px; position: absolute; right: 0px; text-decoration: none;"><img class="devsite-back-to-top-image" src="https://google-developers.appspot.com/_static/images/redesign-14/devsite-back-to-top.svg" style="border: 0px; box-sizing: inherit; height: 24px; margin: 0px; max-width: 100%; padding: 0px; vertical-align: top; width: 24px;" /></a></div>
</div>
<div class="devsite-products-alphabet-letter" id="z" style="box-sizing: inherit; margin: 0px 0px 20px; padding: 0px;">
<h3 class="devsite-products-alphabet-letter-heading" style="box-sizing: inherit; color: #212121; float: left; font-family: Roboto, sans-serif; font-size: 34px; font-stretch: normal; font-weight: 300; letter-spacing: -0.01em; line-height: 40px; margin: -4px 0px 0px; overflow: hidden; padding: 0px; text-overflow: ellipsis; width: 40px;">
Z</h3>
<div class="devsite-products-alphabet-letter-inner" style="box-sizing: inherit; color: #212121; font-family: Roboto, sans-serif; font-size: 16px; line-height: 24px; margin: 0px 0px 0px 40px; padding: 0px;">
</div>
<div class="devsite-products-alphabet-back-to-top-wrapper" style="border-bottom-color: rgb(235, 235, 235); border-bottom-style: solid; border-bottom-width: 1px; box-sizing: inherit; clear: left; color: #212121; font-family: Roboto, sans-serif; font-size: 16px; height: 24px; line-height: 24px; margin: 20px 0px 0px; overflow: hidden; padding: 0px; position: relative;">
</div>
</div>
</div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3078132662608425729.post-51524488314478123732015-05-28T11:51:00.000-07:002015-05-28T11:51:51.476-07:00Wireless Hacking<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgtdVs64bYtWDevCRpnlN3Q62hOqye3b3gxRilgnpxHeK_N6QT7GsBC-C3fJsFfZeoSVqshKnciS2wh7AUeggNNf9TK6Kw8j0qDdmJmNFNYXrdJtMBWORSLq7bZeptM2WMGuF0txa3vG0I/s1600/Wireless-Network.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgtdVs64bYtWDevCRpnlN3Q62hOqye3b3gxRilgnpxHeK_N6QT7GsBC-C3fJsFfZeoSVqshKnciS2wh7AUeggNNf9TK6Kw8j0qDdmJmNFNYXrdJtMBWORSLq7bZeptM2WMGuF0txa3vG0I/s1600/Wireless-Network.png" /></a></div>
<br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">The usage of wireless networks are becoming increasingly popular
these days due to their operation flexibility and low cost setup. Wireless
networks such as WLANs allow users to access network resources from anywhere in
the campus using mobile devices like laptops and tablets. This offers a great
deal of flexibility to students and employees, thereby eliminating the need to
always stick to their desks during their work time.<o:p></o:p></span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">However, on the flipside of all its advantages lies major
security issues. As more and more companies have now started using wireless
technologies in their network, these security issues puts the business on a
high risk. As opposed to wired networks, wireless technology does not limit
physical access to an outsider such as a hacker. Today, with all the readily available
tools it is easily possible for the hacker to compromise loopholes in the
wireless security system and gain access to the network.<o:p></o:p></span><br />
<br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">We will look at some of the common vulnerabilities that exists
in the wireless networking technology, ways to exploit them for gaining access
and also the countermeasures for preventing them<o:p></o:p></span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">WIRELESS NETWORK BASICS<o:p></o:p></span></b><br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span></b>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Before jumping into the actual hacking, let us go through some
of the basic concepts of wireless networking.<o:p></o:p></span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">The wireless standard is commonly represented as 802.11 and is
used to setup wireless local area networks (WLANs) in environments such as
schools and offices. 802.11 standard has 3 leading protocols (or extensions) as
follows:<o:p></o:p></span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">1. 802.11a - It offers higher speed (up to 54-Mbps), more
channels and less interferences.<o:p></o:p></span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">2. 802.11b - This protocol is also popularly known as “Wi-Fi”.
This is the standard that was used in most of the Wi-Fi hotspots.<o:p></o:p></span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">3. 802.11g - This is similar to the 802.11b protocol but
provides much faster transmission.<o:p></o:p></span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><b>Components of Wireless Network</b><o:p></o:p></span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt; line-height: 107%; mso-ansi-language: EN-US; mso-bidi-font-family: Mangal; mso-bidi-language: HI; mso-bidi-theme-font: minor-bidi; mso-fareast-language: EN-US;">A
wireless network comprises of the following 3 basic components:</span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt; line-height: 107%; mso-ansi-language: EN-US; mso-bidi-font-family: Mangal; mso-bidi-language: HI; mso-bidi-theme-font: minor-bidi; mso-fareast-language: EN-US;"><br /></span>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhQBTY3nUkT0qOG7MiEYEDNnspFxNtzHCRO2xA5xFhuJMv506Gntk6v3Uj1ne6pejQQT1kSrxu6jTXWNNf_Rz6C1DJrAg8EfsSML8aRnxXiJ1M61d3tEi5AiLscKwyGLFUqtZEA-snP-Qs/s1600/3component.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="392" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhQBTY3nUkT0qOG7MiEYEDNnspFxNtzHCRO2xA5xFhuJMv506Gntk6v3Uj1ne6pejQQT1kSrxu6jTXWNNf_Rz6C1DJrAg8EfsSML8aRnxXiJ1M61d3tEi5AiLscKwyGLFUqtZEA-snP-Qs/s640/3component.PNG" width="640" /></a></div>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt; line-height: 107%; mso-ansi-language: EN-US; mso-bidi-font-family: Mangal; mso-bidi-language: HI; mso-bidi-theme-font: minor-bidi; mso-fareast-language: EN-US;"><br /></span>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">1. <b>Wi-Fi Radio Device:</b> This can be any device that has a
wireless card (NIC) built into it such as a laptop, tablet, Wi-Fi enabled PC or
a cell phone.<o:p></o:p></span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">2. <b>Access Point:</b> This is the device which allows Wi-Fi radio
devices to connect to the wireless network using WiFi- standards. The AP then
has a wired connection to the router. However, most modern routers now come
with built-in APs to eliminate the need for an extra device.<o:p></o:p></span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">3. <b>Gateway: </b>Routers are connected to the gateways which
then connects the whole network to the Internet.<o:p></o:p></span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Detecting Wireless Networks (War-Driving)<o:p></o:p></span></b><br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span></b>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">To detect a wireless network such as a <i>Wi-Fi Access Point</i>,
you can start roaming in a technology park, downtown area or simply through the
walls of your own building using your Wi-Fi capable device (such as laptops and
palm devices) with a “war-driving” software. Some of the popular war-driving
software programs are listed below:<o:p></o:p></span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><a href="http://www.netstumbler.com/downloads/">Netstumbler</a>:
</span></b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">This is a Windows based war-driving tool that can detect
wireless networks and also mark their position with a GPS.<o:p></o:p></span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><a href="http://www.netstumbler.com/downloads/">MiniStumbler</a>:
</span></b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">This is a portable version of <i>NetStumbler </i>that can be
installed on handheld computers.<o:p></o:p></span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><a href="http://www.vistumbler.net/">Vistumbler</a>: </span></b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">This
is another handy war-driving tool for Windows based operating systems.<o:p></o:p></span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><a href="https://www.kismetwireless.net/">Kismet</a>: </span></b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">This
is a Linux based wireless sniffing tool that also has the ability to perform
war-driving.<o:p></o:p></span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><a href="https://www.acrylicwifi.com/en/wlan-software/wlan-scanner-acrylic-wifi-free/">Wifi
Scanner</a>: </span></b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">This is a GUI based Windows tool to detect all the available APs
in your surroundings.<o:p></o:p></span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Please note that all wireless network cards (NICs) are not same
and some may not be compatible with the above mentioned war-driving tools. In
that case you will have to use the software that came with your wireless NIC
for detecting access points.<o:p></o:p></span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">WIRELESS SNIFFING<o:p></o:p></span></b><br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span></b>
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Wireless sniffing </span></b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">is no different than the
“wired sniffing”. In this case the protocol used for sniffing is 802.11. Since
radio waves are omnidirectional, it is easily possible to carry out a
“man-in-the-middle” attack and capture all the packets from the wireless
traffic available in your range.<o:p></o:p></span><br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span></b>
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Configuring Wireless Cards for Promiscuous Mode<o:p></o:p></span></b><br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span></b>
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Promiscuous mode </span></b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">allows the NIC (Network
Interface Card) to capture all the network traffic that arrives at it instead
of capturing only those that are intended for the NIC.<o:p></o:p></span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Unless your wireless card is configured to operate in
promiscuous mode, it is not possible to perform wireless sniffing.<o:p></o:p></span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Most wireless network cards do not support promiscuous mode on
Windows operating system and hence one has to use Linux to successfully perform
wireless sniffing. If you still want to perform sniffing on Windows, you can
use a special type of wireless card known as <b>AirPcap </b>which is far too
expensive compared to normal ones. AirPcap cards can be used on Windows with
sniffing programs like “<a href="https://www.wireshark.org/">WireShark</a>” and
“<a href="http://www.oxid.it/cain.html">Cain&Abel</a>“, but for all other
cards one has to use Linux platform.<o:p></o:p></span><br />
<br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 18.0pt;">Tools for Wireless Sniffing<o:p></o:p></span></b><br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span></b>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Let us look at some of the widely used tools for performing
wireless sniffing:<o:p></o:p></span><br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 18.0pt;"><br /></span></b>
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 18.0pt;">Wireshark<o:p></o:p></span></b><br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 18.0pt;"><br /></span></b>
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Wireshark </span></b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">is one of my favourite packet
sniffing tool as it is easy to use and supports </span><span style="color: #073763; font-family: 'Adobe Myungjo Std M', serif; font-size: 16pt;">GUI. Even though it works on Windows, I am using Linux operating
system in my wireless sniffing demonstration as promiscuous mode is not
supported on Windows platform. I am using </span><b style="color: #073763; font-family: 'Adobe Myungjo Std M', serif; font-size: 16pt;">TP-LINK TL-WN722N </b><span style="color: #073763; font-family: 'Adobe Myungjo Std M', serif; font-size: 16pt;">for this
demo as it is fully compatible with Kali Linux that I am running it on. If you
have a different wireless card or need to purchase one, please make sure that
it is compatible with the Linux kernel that you will be using it on. Since Kali
Linux is packed with Wireshark and all other useful tools there is no need to
install it separately. Follow the below instructions to perform a sample
wireless sniffing:</span><br />
<span style="color: #073763; font-family: 'Adobe Myungjo Std M', serif; font-size: 16pt;"><br /></span>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">1. Boot up your computer from your Live Kali Linux DVD.<o:p></o:p></span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">2. Once the Linux is loaded, plug-in your USB wireless card.<o:p></o:p></span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">3. Open the “Terminal” window and type the following command:<o:p></o:p></span><br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span></b>
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">iwconfig</span></b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><o:p></o:p></span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiIS-eQY1pNbTYlL5SbDhGE2y4hT6NufGzSAGLO_CXbLMPMyHkF9kPAXrrYoo87MKFoUCSQaOaIajlCzaE3nGgov9ThisX2JaFnH0tnWFSVjORv8QtrlGgYOb5H4UmbDD4-qAAvZTs_MvE/s1600/iwconfig_2.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="198" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiIS-eQY1pNbTYlL5SbDhGE2y4hT6NufGzSAGLO_CXbLMPMyHkF9kPAXrrYoo87MKFoUCSQaOaIajlCzaE3nGgov9ThisX2JaFnH0tnWFSVjORv8QtrlGgYOb5H4UmbDD4-qAAvZTs_MvE/s640/iwconfig_2.PNG" width="640" /></a></div>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">4. If your wireless card
is compatible, you should see your device listed as shown in the above snapshot
as “wlan0”.<o:p></o:p></span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">5. The next step is to put the card into the monitoring mode
(promiscuous mode). For this, type the following command:<o:p></o:p></span><br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span></b>
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">airmon-ng start wlan0<o:p></o:p></span></b><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<div class="separator" style="clear: both; text-align: center;">
</div>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj5qk0g1uGw86KUigdr9_1uiH22VJt3tP_NosrWIKJacKOu1BFmyDfRLODWhAtmS-3F2g8T-uO4pf4hEClpQnPDhUWLV5xxdJ9e078h6O_CAVqhz-uk6pAXvvhCY4Np-J7xbXAsYfm7Qt0/s1600/airmon-ng_.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj5qk0g1uGw86KUigdr9_1uiH22VJt3tP_NosrWIKJacKOu1BFmyDfRLODWhAtmS-3F2g8T-uO4pf4hEClpQnPDhUWLV5xxdJ9e078h6O_CAVqhz-uk6pAXvvhCY4Np-J7xbXAsYfm7Qt0/s640/airmon-ng_.PNG" width="640" /></a></div>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">On my computer, wireless card is listed as “wlan0”. So, I have
entered “wlan0”in the command. If your computer has a different listing such as
“wlan1” or“wlan2”, then you need to replace the same in the above command.<o:p></o:p></span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">6. After you execute the command successfully, your computer
will create a new virtual wireless card and enable “monitor mode” in it. In my
case it is “mon0” as shown in the below snapshot.<o:p></o:p></span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">7. Now it is time to use Wireshark to start capturing the
packets. To start Wireshark, click on <b>Applications -> Kali Linux ->
Top 10 Security Tools -> wireshark </b>as shown below:<o:p></o:p></span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwz_uc8SmlLBks4kEHzE10UAvSZtXCy9QWanTLZoe95-j5ZfNNUcz88zUA1Qx-G-1xx2aa9YsYFoFxZw_XmN7RRnCKpvZUQJu_TQbSqGcavZwXFtUb22jUTo30fSN806SKItWmplScDv8/s1600/Kali_linux_application.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="328" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwz_uc8SmlLBks4kEHzE10UAvSZtXCy9QWanTLZoe95-j5ZfNNUcz88zUA1Qx-G-1xx2aa9YsYFoFxZw_XmN7RRnCKpvZUQJu_TQbSqGcavZwXFtUb22jUTo30fSN806SKItWmplScDv8/s640/Kali_linux_application.PNG" width="640" /></a></div>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">8. Now, from the Wireshark main window, select “mon0” from the <b>Interface
List</b>, double-click on it and select option to capture packets in both
“promiscuous mode” and “monitor mode”. Next click on <b>OK</b>.<o:p></o:p></span><br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgp8BxPS9gy2v4zGRi0vCjsU2n_va4kYydWb1U5pvuJ1c9Sr89J-sOkTG30aTn3-e1_hyphenhyphenbA_JtqZtslfbJbQgM-dQvKi1Xi2eYw1gZ19S1aeNFTdpXCzOS_wJvJUbjz2kNz-8eLdz8M954/s1600/capture.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgp8BxPS9gy2v4zGRi0vCjsU2n_va4kYydWb1U5pvuJ1c9Sr89J-sOkTG30aTn3-e1_hyphenhyphenbA_JtqZtslfbJbQgM-dQvKi1Xi2eYw1gZ19S1aeNFTdpXCzOS_wJvJUbjz2kNz-8eLdz8M954/s1600/capture.PNG" /></a></div>
<br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">9. Once you are done, click on the “Start” button to begin
sniffing. This should capture packets from all the nearby available wireless networks.
The following snapshot shows a sample packet capture:<o:p></o:p></span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidxANT66OviwSzca0DoCt2e5D5c7UjzbkxwHvBQUOJta2oU7UEqyrKTYvwNoMbjr9rLOvTTgurF_xwqEhCT-Bid572WLzw0JVLqOSYfVzUmgav2Hzgr_4HJ3fzmKq_sq4EVOxnFMqY_h0/s1600/capture2.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="338" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidxANT66OviwSzca0DoCt2e5D5c7UjzbkxwHvBQUOJta2oU7UEqyrKTYvwNoMbjr9rLOvTTgurF_xwqEhCT-Bid572WLzw0JVLqOSYfVzUmgav2Hzgr_4HJ3fzmKq_sq4EVOxnFMqY_h0/s640/capture2.PNG" width="640" /></a></div>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">The following are some of the other wireless sniffing tools
worth considering:<o:p></o:p></span><br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span></b>
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Ethereal<o:p></o:p></span></b><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">This is another Linux based sniffing tool that works both on
wired and wireless networks.<o:p></o:p></span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">It comes as a built-in security testing tool in Kali Linux.<o:p></o:p></span><br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span></b>
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">OmniPeek Wireless<o:p></o:p></span></b><br />
<br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><a href="http://www.wildpackets.com/">OmniPeek</a> </span></b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">is
a commercial 802.11 sniffer tool packet with tons of useful features for network
monitoring. It works on Windows platform.<o:p></o:p></span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">WIRED EQUIVALENT PRIVACY (WEP)<o:p></o:p></span></b><br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span></b>
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">WEP </span></b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">is a component of 802.11 WLAN networks designed to provide
confidentiality of data in the wireless networks. Unlike wired networks where
it is possible to limit physical access only to trusted users, the same is not
possible in case of a wireless network.<o:p></o:p></span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Therefore, in order to overcome this limitation a special type
of encryption called WEP is used to prevent attackers from intercepting the wireless
data.<o:p></o:p></span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">However, there is a clear weakness in the WEP security system
that can be exploited.<o:p></o:p></span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Once enough data packets are captured and given ample time, the
attacker can easily crack the WEP key used for encryption so as to decrypt all
information back to raw data.<o:p></o:p></span><br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span></b>
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Cracking WEP Encryption<o:p></o:p></span></b><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">The following tools are used popularly for cracking WEP
encryption key/password:<o:p></o:p></span><br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span></b>
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Aircrack-NG<o:p></o:p></span></b><br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span></b>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">This is a popular tool used on Linux to crack 802.11 WEP
encryption keys. It is a command line tool that comes as a built-in feature in
Kali Linux package and can easily be used by loading it from the live DVD.
Since it takes a long list of commands and procedures to crack WEP passwords, I
have decided to omit the demo of the cracking process from this book. But you
can still Google for “how to crack WEP encryption” to find many step-by-step
procedures that describe the actual cracking process.<o:p></o:p></span><br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span></b>
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">WEPCrack<o:p></o:p></span></b><br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span></b>
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">WEPCrack </span></b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">is another popular tool for cracking
802.11 secret keys. This is the first tool to give a public demonstration on
how WEP encryption can be exploited.<o:p></o:p></span><br />
<br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">WI-FI PROTECTED ACCESS (WPA)<o:p></o:p></span></b><br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span></b>
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">WPA </span></b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">is another wireless security standard that was mainly developed
to address the shortcomings of WEP. WPA uses a different encryption standard
which is better than that of WEP and is designed as a software upgrade.<o:p></o:p></span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">However, a flaw in this security feature called <b>Wi-Fi
Protected Setup </b>(<b>WPS</b>) allows </span><span style="color: #073763; font-family: 'Adobe Myungjo Std M', serif; font-size: 16pt;">WPA passwords to be cracked using brute-force approach. Most
access points have WPS enabled by default and hence remain vulnerable.</span><br />
<span style="color: #073763; font-family: 'Adobe Myungjo Std M', serif; font-size: 16pt;"><br /></span>
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Cracking WPA Passwords<o:p></o:p></span></b><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Here is a step-by-step demonstration of cracking WPA password
using the <b>Reaver </b>tool that comes with Kali Linux.<o:p></o:p></span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">1. Boot your computer using the Kali Live DVD and also plug-in
the USB wireless card.<o:p></o:p></span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">2. Open the terminal window and type the command <b>iwconfig </b>to
make sure that your card is detected.<o:p></o:p></span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhvMH4dqU_8LpL4IN_kdTJqWN_bUnGoteJDdg9OHVk2VDwJsMTb-bzUsmSIfuKQenG7AjjgiSL5iAS5_snZEtv1I7h9JcOv4doiCNLNHtgxfgcRg_N4wMGe4D8V7LokyGtBkBMMw-3LNLg/s1600/iwconfig.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="184" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhvMH4dqU_8LpL4IN_kdTJqWN_bUnGoteJDdg9OHVk2VDwJsMTb-bzUsmSIfuKQenG7AjjgiSL5iAS5_snZEtv1I7h9JcOv4doiCNLNHtgxfgcRg_N4wMGe4D8V7LokyGtBkBMMw-3LNLg/s640/iwconfig.PNG" width="640" /></a></div>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">3. Once you see your card listed (wlan0) as shown above, type
the following command to put your card into the “monitoring mode” and start
using it.<o:p></o:p></span><br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span></b>
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">airmon-ng start wlan0<o:p></o:p></span></b><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">This should activate “monitoring mode” for your card. On my
computer it is enabled on “mon0” as shown in the below snapshot.<o:p></o:p></span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj5qk0g1uGw86KUigdr9_1uiH22VJt3tP_NosrWIKJacKOu1BFmyDfRLODWhAtmS-3F2g8T-uO4pf4hEClpQnPDhUWLV5xxdJ9e078h6O_CAVqhz-uk6pAXvvhCY4Np-J7xbXAsYfm7Qt0/s1600/airmon-ng_.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj5qk0g1uGw86KUigdr9_1uiH22VJt3tP_NosrWIKJacKOu1BFmyDfRLODWhAtmS-3F2g8T-uO4pf4hEClpQnPDhUWLV5xxdJ9e078h6O_CAVqhz-uk6pAXvvhCY4Np-J7xbXAsYfm7Qt0/s640/airmon-ng_.PNG" width="640" /></a></div>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">4. Now type the following command to detect nearby WPS enabled
access points.<o:p></o:p></span><br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span></b>
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">wash -i mon0 -C<o:p></o:p></span></b><br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span></b>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhD8jd1ZQ6MDBv5KOYO9TaVjK2V48ODCqyWwMAkK7F-tGnreF4HuGZrsP4aPaM4BgWIh6O8YTLQ-_RccW2NLotHsqwMArFZN6eDhVCmkIc6LV6gvACW6iGJG6TDEdc2dN4u4UQYJwgzEBw/s1600/wash.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="244" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhD8jd1ZQ6MDBv5KOYO9TaVjK2V48ODCqyWwMAkK7F-tGnreF4HuGZrsP4aPaM4BgWIh6O8YTLQ-_RccW2NLotHsqwMArFZN6eDhVCmkIc6LV6gvACW6iGJG6TDEdc2dN4u4UQYJwgzEBw/s640/wash.PNG" width="640" /></a></div>
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span></b>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">This should perform a scan and list all the nearby access points
as shown below. </span><span style="color: #073763; font-family: 'Adobe Myungjo Std M', serif; font-size: 16pt;">Once access points are
detected, press </span><b style="color: #073763; font-family: 'Adobe Myungjo Std M', serif; font-size: 16pt;">Ctrl+C </b><span style="color: #073763; font-family: 'Adobe Myungjo Std M', serif; font-size: 16pt;">to stop the scanning process.</span><br />
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">5. As shown above, there is one listing which shows a vulnerable
access point with an </span><span style="color: #073763; font-family: 'Adobe Myungjo Std M', serif; font-size: 16pt;">“ESSID” </span><b style="color: #073763; font-family: 'Adobe Myungjo Std M', serif; font-size: 16pt;">NETGEAR31</b><span style="color: #073763; font-family: 'Adobe Myungjo Std M', serif; font-size: 16pt;">. Now issue the following command to
perform brute force attack on the target.</span><br />
<span style="color: #073763; font-family: 'Adobe Myungjo Std M', serif; font-size: 16pt;"><br /></span>
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">reaver -i mon0 -b 2C:B0:5D:68:93:D6 -vv<o:p></o:p></span></b><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Please note that you will have to replace“2C:B0:5D:68:93:D6”
with the <b>BSSID </b>of the target AP in your case.<b><o:p></o:p></b></span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">6. The cracking process will take a few hours to complete and if
everything goes well you should see the cracked PIN and passphrase in the
results as shown in the below snapshot:<o:p></o:p></span><br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span></b>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRHliZCZvp-6EW0VooVD-o4aAXGmzXEK17-fA7tgJmm7NeYivqFBtZaTCxGsC0y1pwJYBQ9t_dXDeSdZTG4q4gn_pDZzqkoqdF_AuF5rFqys6qH6b-qaRMONndykqvBc_GkoK5kZgxmBw/s1600/reaver.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="380" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRHliZCZvp-6EW0VooVD-o4aAXGmzXEK17-fA7tgJmm7NeYivqFBtZaTCxGsC0y1pwJYBQ9t_dXDeSdZTG4q4gn_pDZzqkoqdF_AuF5rFqys6qH6b-qaRMONndykqvBc_GkoK5kZgxmBw/s640/reaver.PNG" width="640" /></a></div>
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span></b>
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span></b>
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Other Tools for Cracking WPA<o:p></o:p></span></b><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">The following are some of the other WPA cracking tools that you
can try:<o:p></o:p></span><br />
<b><br /></b>
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><a href="http://www.wirelessdefence.org/Contents/coWPAttyMain.htm">coWPAtty</a>: </span></b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">This
is a Linux based tool which uses dictionary approach and precomputed hash files
(similar to rainbow tables) to crack WPA passphrases.<o:p></o:p></span><br />
<b><br /></b>
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><a href="http://hashcat.net/wiki/doku.php?id=cracking_wpawpa2">Hashcat</a>:
</span></b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">This is one of the fastest CPU-based password cracking tool
which uses different approaches like dictionary, brute-force and hybrid types
of attacks. It comes for both Windows and Linux operating systems.<o:p></o:p></span><br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span></b>
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">DENIAL OF SERVICE (DOS) ATTACKS<o:p></o:p></span></b><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Just like wired networks, wireless networks are also susceptible
to denial of service attacks. Since WLANs use radio waves on public frequencies
for sending and receiving the traffic, it is easy to use other traffic from the
same band to cause interference. If the attacker fails to gain access to the
network, he may use DoS as a final option to attack the network. DoS attacks
cause all the existing connections to the network to get dropped and also
prevents new connections from happening thereby causing the WLAN virtually unusable.<o:p></o:p></span><br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 18.0pt;"><br /></span></b>
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 18.0pt;">Tools for Wireless DoS<o:p></o:p></span></b><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Kali Linux has a handful of built-in tools and features to cause
DoS attacks on WLANs. </span><span style="color: #073763; font-family: 'Adobe Myungjo Std M', serif; font-size: 16pt;">Most of these tools works by sending de-authentication packets
instead of authentication packets to access points which causes the network to
drop all the existing connections.</span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Other way to flood network is by sending authentication requests
to APs with inappropriate status codes or random client MACs.<o:p></o:p></span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Some of the popular tools for wireless DoS include <b><a href="http://www.wirelessdefence.org/Contents/Void11Main.htm">Void11</a>, <a href="http://www.wi-foo.com/soft/attack/fata_jack.c">Fatajack</a> </b>and <b><a href="http://www.wirelessdefence.org/Contents/FakeAPMain.htm">FakeAP</a> </b>(for
spoofing or creating large number of fake access points in an attempt to confuse
clients).<o:p></o:p></span><br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span></b>
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">COUNTERMEASURES<o:p></o:p></span></b><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">The following are some of the countermeasures that one can
employ to prevent possible attacks on a wireless network:<o:p></o:p></span><br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span></b>
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">MAC Address Filtering: </span></b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">This feature uses a
pre-defined list of MAC addresses of the clients’ wireless NICs who are allowed
to connect to the network. This way it is possible to prevent strangers from
accessing the WLANs.<o:p></o:p></span><br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span></b>
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Hidden SSID: </span></b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Preventing an AP to stop
broadcasting its SSID makes it go invisible and hence becomes inaccessible to
attackers.<o:p></o:p></span><br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span></b>
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">WPA instead of WEP: </span></b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Since WEP has well known
security issues, it is always safe to use alternate encryption standards such
as WPA or WPA2 over WEP.<o:p></o:p></span><br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span></b>
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Disable WPS: </span></b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Since WPS (Wi-Fi
Protected Setup) is said to have flaws, enabling it makes WPA vulnerable.
Therefore, it is necessary to manually disable the WPS feature where in most
routers it comes pre-activated by default.<o:p></o:p></span><br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt; line-height: 107%; mso-ansi-language: EN-US; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: HI; mso-fareast-language: EN-US;"><br /></span></b>
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt; line-height: 107%; mso-ansi-language: EN-US; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: HI; mso-fareast-language: EN-US;">Firewall: </span></b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt; line-height: 107%; mso-ansi-language: EN-US; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: HI; mso-fareast-language: EN-US;">Using a firewall with strong
rules helps </span><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt; line-height: 107%; mso-ansi-language: EN-US; mso-bidi-font-family: Mangal; mso-bidi-language: HI; mso-bidi-theme-font: minor-bidi; mso-fareast-language: EN-US;">filter unauthorized traffic and prevent brute-force
attacks.</span></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3078132662608425729.post-26282672119209356902015-04-30T03:56:00.003-07:002015-04-30T03:57:11.606-07:0010 Interactive Infographics #1<div dir="ltr" style="text-align: left;" trbidi="on">
<h1 style="border: 0px; box-sizing: border-box; color: #515351; font-family: proxima-nova-soft, 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 2.15385em; font-stretch: inherit; line-height: 1.35714em; margin: 0px 0px 30px; padding: 0px 90px 0px 0px; vertical-align: baseline;">
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 22.0pt;">1. <a href="http://www.species-in-pieces.com/">SPECIES IN PIECES</a><o:p></o:p></span></b><br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 22.0pt;"><br /></span></b>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiWu3FJ08x4kpODGUfX1pZBjahWsBhjbNdNJAKMiQhNC07G66WyMp237cIiwQ3Yz1QOfWLvprsgDaCCAK18MVBwnlLX1CGI7JHeY494LbiJB6AlzLekaqRBpPP_CioS-qLOZotvDjcaeLw/s1600/species-in-pieces.PNG" imageanchor="1"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiWu3FJ08x4kpODGUfX1pZBjahWsBhjbNdNJAKMiQhNC07G66WyMp237cIiwQ3Yz1QOfWLvprsgDaCCAK18MVBwnlLX1CGI7JHeY494LbiJB6AlzLekaqRBpPP_CioS-qLOZotvDjcaeLw/s1600/species-in-pieces.PNG" height="316" width="640" /></a></div>
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 20.0pt;"><br /></span></b>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">It is an interactive web
exhibition on the 30 animals we are in danger of losing.</span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJMj7mN98xjixh6jhbhRwaRvOfpi4LhsFqL79N0QSxJX2ctduGYq_fgXId_GBoT3OAicu_hisbazXtJnUu06U01OEXG4FL_p7eHnfN3cKwQA09rAnX1CIo1js_6nkBBkAUKRJSd9FigkI/s1600/species-in-pieces-4.PNG" imageanchor="1"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJMj7mN98xjixh6jhbhRwaRvOfpi4LhsFqL79N0QSxJX2ctduGYq_fgXId_GBoT3OAicu_hisbazXtJnUu06U01OEXG4FL_p7eHnfN3cKwQA09rAnX1CIo1js_6nkBBkAUKRJSd9FigkI/s1600/species-in-pieces-4.PNG" height="360" width="640" /></a></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><a href="http://www.species-in-pieces.com/">This</a> website enables you
to scroll through each of the unique species and click to discover their main
threats and see their population stats visualized on polar charts.<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 22.0pt;">2. <a href="http://notoriousbond.info/">NOTORIOUS BOND</a><o:p></o:p></span></b><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"> <div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhlPOD0jY9N_VscHswCmnnMzR0BTzpHcqps3KFxgzT3QYyiBNQC_tWIk74_wQzNPUH_pMxN9OZ7sE2qO37Ljt8x6MrBc4HOxshgWwn_Qqy4EcnzMk-oSJUa3p0yh5NFUPsFMt4axJMCsr8/s1600/notorious-bond.PNG" imageanchor="1"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhlPOD0jY9N_VscHswCmnnMzR0BTzpHcqps3KFxgzT3QYyiBNQC_tWIk74_wQzNPUH_pMxN9OZ7sE2qO37Ljt8x6MrBc4HOxshgWwn_Qqy4EcnzMk-oSJUa3p0yh5NFUPsFMt4axJMCsr8/s1600/notorious-bond.PNG" height="318" width="640" /></a></div>
</span><div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
</div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><a href="http://notoriousbond.info/">notoriousbond.info</a> is
interactive infographics. It is interactive exploration into the things each
actor was notorious for. </span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiwffhwDZ6LTTNVB7i6yC2AsKBtgDMk0XHYfiOXqXZC7K_WUCNUfapWGyXpak0-4nUAHMOgAj-Vq213ccmW10izp0djslMgyeKMoCueZmf5VaFD9xGZrD8u6HbPCQHyGjdESe1slxi6ySA/s1600/notorious-bonds.PNG" imageanchor="1"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiwffhwDZ6LTTNVB7i6yC2AsKBtgDMk0XHYfiOXqXZC7K_WUCNUfapWGyXpak0-4nUAHMOgAj-Vq213ccmW10izp0djslMgyeKMoCueZmf5VaFD9xGZrD8u6HbPCQHyGjdESe1slxi6ySA/s1600/notorious-bonds.PNG" height="360" width="640" /></a></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Such as the number of martinis consumed, the number of
times each actor was presumed dead and the number of people killed etc.<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span></div>
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 22.0pt;">3. <a href="http://www.bloomberg.com/billionaires">BLOOMBERG BILLIONAIRES INDEX</a></span></b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><o:p></o:p></span><br />
<b><br /></b>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1SWHlvA-6UYwgpYLs5V4xkXzQpebd0PY8kQI1eo_dqdUxqcICmTTH5d-VYWSBpAXeFiDoOzL2SVTGBMUFSsTy_gAgB_Flrf6pLffczQNROJsKHFmfImPoC0gJzHsuLpiWs1bRU0Xpt_I/s1600/bloomberg.PNG" imageanchor="1"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1SWHlvA-6UYwgpYLs5V4xkXzQpebd0PY8kQI1eo_dqdUxqcICmTTH5d-VYWSBpAXeFiDoOzL2SVTGBMUFSsTy_gAgB_Flrf6pLffczQNROJsKHFmfImPoC0gJzHsuLpiWs1bRU0Xpt_I/s1600/bloomberg.PNG" height="396" width="640" /></a></div>
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 22.0pt;"><br /></span></b>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">The <a href="https://draft.blogger.com/"><span id="goog_1311467369"></span>Bloomberg
Billionaires Index<span id="goog_1311467370"></span></a> visualizes a daily ranking of the world's richest people. <o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br />
<div class="separator" style="clear: both; text-align: center;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg5WbBuO9Kys4lRil2V9K5SwKCRMd0lHDGMTdHRR1DsEojCdSLYh_9Wmu7m2fyOs3pPF1RXbdcVge7sCQn-bgWTaJh2_xic5v2zR5hN_ZfKJ8tnMLjNZ37Vb2WoIRAW7H1aBK9xw8syRZE/s1600/bloomberg_all.PNG" imageanchor="1"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg5WbBuO9Kys4lRil2V9K5SwKCRMd0lHDGMTdHRR1DsEojCdSLYh_9Wmu7m2fyOs3pPF1RXbdcVge7sCQn-bgWTaJh2_xic5v2zR5hN_ZfKJ8tnMLjNZ37Vb2WoIRAW7H1aBK9xw8syRZE/s1600/bloomberg_all.PNG" height="500" width="640" /></a></span></div>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">
</span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
</div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">The index is a dynamic
measure of the top 100 billionaires based on changes in markets, the economy
and personal assets.<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br />
<div style="margin-bottom: .0001pt; margin: 0in;">
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 22.0pt;">4. <a href="http://hereistoday.com/">Here is Today</a><o:p></o:p></span></b></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjxcj23bXNvVoSyEIynmI7EuYCtRoC7tFgxBiYK5tnslmnpzgTeVNiSE-gwUDjtvAi2p_Firt4KXjbQ7wx1GyoZltgRDF25ASUZuYlm29v9r0p-lYn8qz_8nkA631kmxljnwlJDj1f2fS4/s1600/hereistoday.PNG" imageanchor="1"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjxcj23bXNvVoSyEIynmI7EuYCtRoC7tFgxBiYK5tnslmnpzgTeVNiSE-gwUDjtvAi2p_Firt4KXjbQ7wx1GyoZltgRDF25ASUZuYlm29v9r0p-lYn8qz_8nkA631kmxljnwlJDj1f2fS4/s1600/hereistoday.PNG" height="316" width="640" /></a></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 22.0pt;"><br /></span></b></div>
<br />
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">An interactive look at
time.<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span></div>
<div class="MsoNormal" style="margin-bottom: 22.5pt; mso-line-height-alt: 16.3pt; mso-outline-level: 1; vertical-align: baseline;">
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 22.0pt; mso-bidi-font-family: "Times New Roman";">5. <a href="http://listen.hatnote.com/">Listen to Wikipedia</a>.</span></b><br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 22.0pt; mso-bidi-font-family: "Times New Roman";"><br /></span></b></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhN4YQsazohliqB4uccAKY5tBOVReHE3yaG1RkQN8JrxMnfBID84oEB_umql4TJbrFH7cyaYuL1sCBXFKt8jXfMh3wvZH0seRAo6-r2vcaXQZHOANdekUZLbbppyIq-U0BVpQGbR7C5We8/s1600/listen_hatnote_wikipedia.PNG" imageanchor="1"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhN4YQsazohliqB4uccAKY5tBOVReHE3yaG1RkQN8JrxMnfBID84oEB_umql4TJbrFH7cyaYuL1sCBXFKt8jXfMh3wvZH0seRAo6-r2vcaXQZHOANdekUZLbbppyIq-U0BVpQGbR7C5We8/s1600/listen_hatnote_wikipedia.PNG" height="318" width="640" /></a></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Listen to Wikipedia is a
visualization and sonification of Wikipedia's live recent changes data. The
sounds indicate addition to (bells) or subtraction from (strings) a Wikipedia
articles, and the pitch is inversely proportional to the size of the edit (a
lower pitch means a bigger edit). Green circles show edits from unregistered
contributors, and purple circles mark edits performed by automated bots. A
string swell welcomes a new user to the site. There's something reassuring
about knowing that every user makes a noise, every edit has a voice in the
roar.<o:p></o:p></span></div>
</div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 22.0pt; line-height: 107%; mso-ansi-language: EN-US; mso-bidi-font-family: Mangal; mso-bidi-language: HI; mso-bidi-theme-font: minor-bidi; mso-fareast-language: EN-US;">6. <a href="http://worldfoodclock.com/">World Food Clock</a></span></b></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjRF_moixu8lYomjTUnRrPwnLdkBgUOLeJCe76pJ0Jx37ghM0wGgMQboyvbWua4Flev_8CzZWqh9qBynOYxqICrucMjLqQwFYvI9sCPgqfsPIFNQC0fjBH5vLEVQODbQcpHYNTVFmyLvoo/s1600/worldfoodclock.PNG" imageanchor="1"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjRF_moixu8lYomjTUnRrPwnLdkBgUOLeJCe76pJ0Jx37ghM0wGgMQboyvbWua4Flev_8CzZWqh9qBynOYxqICrucMjLqQwFYvI9sCPgqfsPIFNQC0fjBH5vLEVQODbQcpHYNTVFmyLvoo/s1600/worldfoodclock.PNG" height="296" width="640" /></a></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 22.0pt;"><br /></span></b></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
</div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">A look at the world's
food right now, with a focus on how much we produce, consume and waste every
second.<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 22.0pt;">7. <a href="http://ekrivoruchko.com/parsons/DataVis-work/Earthquakes/">Earthquakes</a><o:p></o:p></span></b><br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 22.0pt;"><br /></span></b>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhU_rDi8iJkNQB1n0N3GyMH2n1oIS_swWp32LB4PXoJfOdCyOQODu4cXsiA5FuxslQn4FShyphenhyphenyxalGCaeZkSx0YozSXPpW6OoeYZLtbaO96kVsrkQlkdiG5ABSTb1inwOJVZGq38_cdXrkg/s1600/earthquakes.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhU_rDi8iJkNQB1n0N3GyMH2n1oIS_swWp32LB4PXoJfOdCyOQODu4cXsiA5FuxslQn4FShyphenhyphenyxalGCaeZkSx0YozSXPpW6OoeYZLtbaO96kVsrkQlkdiG5ABSTb1inwOJVZGq38_cdXrkg/s1600/earthquakes.PNG" height="308" width="640" /></a></div>
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 22.0pt;"><br /></span></b>
<br />
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">It is interactive
visualization of earthquakes happened in the past 24 hours. The data is fetched
from USGS.<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span></div>
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 22.0pt;">8. <a href="http://codehesive.com/commonwealthww1/">Commonwealth War Dead: First World War Visualized</a><o:p></o:p></span></b><br />
<b><br /></b>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjyh_-dq-Hliv-AOrNB27Q9TBn8yrqg3yxZDoG9_1LgxLJnD221enzFEFlXIckteL-BQanERsAvmqRxULyD1sHiAqaQTLkgy10L8mG2lrZU7mJKyA5YhL6MOrJXPMdqFYgrYlPWzvWMF-g/s1600/Commonwealth_War_dead.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjyh_-dq-Hliv-AOrNB27Q9TBn8yrqg3yxZDoG9_1LgxLJnD221enzFEFlXIckteL-BQanERsAvmqRxULyD1sHiAqaQTLkgy10L8mG2lrZU7mJKyA5YhL6MOrJXPMdqFYgrYlPWzvWMF-g/s1600/Commonwealth_War_dead.PNG" height="312" width="640" /></a></div>
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 22.0pt;"><br /></span></b>
<span style="color: #073763; font-family: Adobe Myungjo Std M, serif;"><span style="font-size: 16pt; line-height: 107%;">This website maps war dead </span><span style="font-size: 21.3333339691162px; line-height: 22.8266677856445px;">recorded</span><span style="font-size: 16pt; line-height: 107%;"> by the Commonwealth
War Graves Commission during the First World War.</span></span><br />
<span style="color: #073763; font-family: Adobe Myungjo Std M, serif;"><span style="font-size: 16pt; line-height: 107%;"><br /></span></span>
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 22.0pt;">9. <a href="http://www.uis.unesco.org/_LAYOUTS/UNESCO/women-in-science/index.html">Women in Science</a><o:p></o:p></span></b><br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 22.0pt;"><br /></span></b>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjPJx-9SN9z-T9OQHV_VfA6B-YINuLIB2_4czZ_RFO_wWDe1lvtn4JshGjGHs-Kssvr8mOS7gsLTgSV-Zv0Gnl_y9i3xFaRpo2LkdDgIKOxUdcljkwwUiKeGnsgCoZ_gFIYOIiN4IvgALI/s1600/Women_in_science.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjPJx-9SN9z-T9OQHV_VfA6B-YINuLIB2_4czZ_RFO_wWDe1lvtn4JshGjGHs-Kssvr8mOS7gsLTgSV-Zv0Gnl_y9i3xFaRpo2LkdDgIKOxUdcljkwwUiKeGnsgCoZ_gFIYOIiN4IvgALI/s1600/Women_in_science.PNG" height="360" width="640" /></a></div>
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 22.0pt;"><br /></span></b>
<br />
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">It is centered on the
theme “Equality for women is progress for all” helps visualize the gender gaps
in the pipeline leading to a career in research. <o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span></div>
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 22.0pt;">10. <a href="http://eyesinspace.com/">Eyes in Space</a><o:p></o:p></span></b><br />
<b><br /></b>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjU9PulmoylESchJ0pbHcNBjl2rnlHUPBmFdy_ty6vWtaNVZFNUWG5HRzaz5-mNz0qTfYLv9O8mbjjuX1HDXzLp7ozUBGf5uvwjuq_MdLmLxZDYl0-NZu6SBDuAdU6GNeorjowyZPPb38o/s1600/EyesinSpace.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjU9PulmoylESchJ0pbHcNBjl2rnlHUPBmFdy_ty6vWtaNVZFNUWG5HRzaz5-mNz0qTfYLv9O8mbjjuX1HDXzLp7ozUBGf5uvwjuq_MdLmLxZDYl0-NZu6SBDuAdU6GNeorjowyZPPb38o/s1600/EyesinSpace.PNG" height="292" width="640" /></a></div>
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 22.0pt;"><br /></span></b>
<br />
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Eyes in space.... take
every one on a personal journey to roam the cosmos.<o:p></o:p></span></div>
</div>
</div>
</h1>
</div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3078132662608425729.post-14726958391217823662015-04-23T21:53:00.000-07:002015-04-23T21:53:03.073-07:00INTRODUCTION TO CLOUD<div dir="ltr" style="text-align: left;" trbidi="on">
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgN6UsbzjInylzhIGAUkR1Ijkav53yYL43J-aB_jog-ZG8ORmGjbHRocqRM-VKXNAN5td_mFJWAXYuq0JEBF90oCl8RAMSlSqf_jlvOY3M6WERcBVO_uw5Kp0hs72AtFqtYvWUm29WuBDM/s1600/introductiontocloud.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgN6UsbzjInylzhIGAUkR1Ijkav53yYL43J-aB_jog-ZG8ORmGjbHRocqRM-VKXNAN5td_mFJWAXYuq0JEBF90oCl8RAMSlSqf_jlvOY3M6WERcBVO_uw5Kp0hs72AtFqtYvWUm29WuBDM/s1600/introductiontocloud.png" height="340" width="640" /></a></div>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif;"><b><span style="font-size: x-large;">What is cloud?</span></b><span style="font-size: 16pt;"><o:p></o:p></span></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">The first thing you need
to know is that “the cloud” exists in far-flung data centers, which you access
via the internet. It is a collection of networked computer hardware that works
together to provide many aspects of computing in the form of online services.
You can’t physically touch the hardware itself in the public cloud, but you
control it remotely via web interfaces. <o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">One of the central features of the cloud is virtualization.
Virtual machines are created with software that subdivides the computing power,
memory and storage of a given machine into multiple smaller units, each running
their own operating system. This virtualization allows computing resources to
be shared and allocated efficiently across the cloud.</span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Cloud computing is a general term that is better divided into three
categories:<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin-bottom: 0in; margin-left: .5in; margin-right: 0in; margin-top: 0in; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<!--[if !supportLists]--><b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt; mso-bidi-font-family: "Adobe Myungjo Std M";">1.<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--></b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><b>Infrastructure
as a Service (IaaS)</b><o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 1.0in; margin-right: 0in; margin-top: 0in;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Where big players like Amazon and Google rent out immense
computing infrastructure to other companies. <o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 1.0in; margin-right: 0in; margin-top: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin-bottom: 0in; margin-left: .5in; margin-right: 0in; margin-top: 0in; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<!--[if !supportLists]--><b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt; mso-bidi-font-family: "Adobe Myungjo Std M";">2.<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--></b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><b>Platform
as a Services (PaaS)</b><o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 1.0in; margin-right: 0in; margin-top: 0in;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Online spaces where developers create online applications for
specific sets of users.<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 1.0in; margin-right: 0in; margin-top: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin-bottom: 0in; margin-left: .5in; margin-right: 0in; margin-top: 0in; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<!--[if !supportLists]--><b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt; mso-bidi-font-family: "Adobe Myungjo Std M";">3.<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--></b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><b>Software
as a Services (SaaS)</b><o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 1.0in; margin-right: 0in; margin-top: 0in;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Where clients use software over the internet. <o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Even the average web
surfer at home has interacted with at least some of these. Facebook, Twitter
and Gmail are all examples of SaaS cloud applications. One of the things that
make it so powerful is the fact that- in the case of the former two- thousands,
even millions, of people can interact with the same bit of information
simultaneously. <o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg568uz_z97__3RmKisPowAUUgDj2aNL-EPxxELLIYVK5febVuOCZWy4TOKRzCwk08uQmpe2_RB7inLwlpLbhmij5ENCV6CrWiNHV3qPo37Gg5N2SM1zNTbpdHqjah06U94uyMIZ3kyspE/s1600/Characteristics_Of_Cloud.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg568uz_z97__3RmKisPowAUUgDj2aNL-EPxxELLIYVK5febVuOCZWy4TOKRzCwk08uQmpe2_RB7inLwlpLbhmij5ENCV6CrWiNHV3qPo37Gg5N2SM1zNTbpdHqjah06U94uyMIZ3kyspE/s1600/Characteristics_Of_Cloud.png" height="504" width="640" /></a></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">The order giant boon for
individual users is that services like Dropbox and Apple’s iCloud allow them to
store their photos, email, music, calendars, contacts and other data in a
central location, accessible from whatever device happens to be handy. These
can be set up to automatically sync with the cloud, ending an era of fumbling
with USB cables and cursing yourself for bringing the wrong data stick to a
meeting. Relax! That appointment you just noted in your phone will appear
seamlessly in your desktop calendar, leaving you free to kick back and enjoy
the music you’re streaming from your collection on distant servers.<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif;"><b><span style="font-size: x-large;">Cloud storage Vs Cloud
computing</span></b><span style="font-size: 16pt;"><o:p></o:p></span></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRWQHOZPNdLNsQ3_n35BY8VSs-4rOWcmiD3ked9DEtT6UH9yaka8-kibU1thAKBLQMStvSCNSjBWiNZEGNNOdRSVaVevKwg6V6MRVj0gfruj784BYFSfQaKaTLBP4DfBYw1LswOBXGjjw/s1600/computingvsstorage.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRWQHOZPNdLNsQ3_n35BY8VSs-4rOWcmiD3ked9DEtT6UH9yaka8-kibU1thAKBLQMStvSCNSjBWiNZEGNNOdRSVaVevKwg6V6MRVj0gfruj784BYFSfQaKaTLBP4DfBYw1LswOBXGjjw/s1600/computingvsstorage.png" height="358" width="640" /></a></div>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Cloud storage involves
stashing data on hardware in a remote physical location, which can be accessed
for any device via the internet. Clients send files to a data server maintained
by a cloud provider instead of (or as well as) storing it on the own hard
drives. Dropbox, which lets user store and share files, is a good example.
Cloud storage systems generally encompass hundreds of data servers linked
together by a master control server, but the simplest systems might involve
just one.<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
</div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Cloud computing also
involves clients connecting to remote computing infrastructures via a network,
but this time that infrastructure includes shared processing power, software
and other resources. This frees users from having to constantly update and
maintain their software and systems, while at the same time allowing them to
harness the processing power of a vast network. Familiar everyday services powered
by cloud computing include social networks like Facebook, webmail client like
Gmail, and online banking apps.<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif;"><b><span style="font-size: x-large;">Where’s my stuff?</span></b><span style="font-size: 16pt;"><o:p></o:p></span></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Two words: data centers. Anything you’re uploaded to the
cloud, or that you run from the cloud, exists on dedicated servers and storage
volumes housed in vast warehouses, often situated on campuses full of such
warehouses. Data centres are owned by cloud service providers, who are
responsible for keeping the server up and running. <o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">The job of all data centers, however big or small- and yes,
some of them can be tiny- is to keep your data physically safe from theft and destruction,
and to make sure it’s available whenever you want to access it. They run
extensive cooling systems to keep the electronics form overheating and have at
least one backup generator in case of power outages.<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Once you’ve put your data in the cloud, it may be physically
stored in many different places, countries or even continents, depending on
where the service provider’s data centre are located. In fact, cloud providers
actually make multiple copies of the data you upload and purposely store these
in disparate locales to ensure that it won’t get destroyed or be inaccessible
in the event that a natural disaster takes out one of the centres.<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
</div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg9eU5ekh_B4Nh3S0eq8u_ySidWhyphenhyphen-CA3LjonFy-3JDt0zJ_kuhcFav8RM6xV85RK_xxzyOVqPHDd2Jgh4vOoLQdvGQo20wI_U3FZXCqskbm67V7Z06fjo-_26j1eTwOoqll44KJ3RSaDs/s1600/headtocloud.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg9eU5ekh_B4Nh3S0eq8u_ySidWhyphenhyphen-CA3LjonFy-3JDt0zJ_kuhcFav8RM6xV85RK_xxzyOVqPHDd2Jgh4vOoLQdvGQo20wI_U3FZXCqskbm67V7Z06fjo-_26j1eTwOoqll44KJ3RSaDs/s1600/headtocloud.png" height="1135" width="700" /></a></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">They physical location of their stored data is irrelevant to
the majority of people, since it can be called together over the internet
almost instantly. But for organizations using the cloud for certain sensitive
type of data- government documents or health records, for example-
understanding where the data is headed and which data-protection and privacy
laws apply in those places becomes critical.<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif;"><b><span style="font-size: x-large;">How safe is the cloud?</span></b></span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif;"><b><span style="font-size: x-large;"><br /></span></b></span>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif;"><span style="font-size: 16pt;"><o:p></o:p></span></span><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjULw7K47Lv55tpkHbSb5825hVEO2AbP8pp8Qqdk5Xn62PwwHZPEKkjGFVml_FJo8FsRJS_uENlVOPTPznNDj38E3g-Q_pjVYtzEiW2PdnDZL4ii4rzMBZbb2ALDZvk9WVwkosL0J0tPfE/s1600/howsafeiscloud.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjULw7K47Lv55tpkHbSb5825hVEO2AbP8pp8Qqdk5Xn62PwwHZPEKkjGFVml_FJo8FsRJS_uENlVOPTPznNDj38E3g-Q_pjVYtzEiW2PdnDZL4ii4rzMBZbb2ALDZvk9WVwkosL0J0tPfE/s1600/howsafeiscloud.png" height="336" width="640" /></a><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif;"><b><span style="font-size: x-large;"><br /></span></b></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">The cloud may promise to
lift the burden of our ever-increasing data storage needs, but how do we know
our data is truly safe when we entrust it to a cloud provider? What measures do
they take to address our two biggest concerns: reliability and security?<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">We’ve already learned that cloud providers store backups in multiple
locations. Systems that detect smoke, suppress fires and provide emergency
power are also standard features of data centers, and these secret locations
are heavily reinforced, guarded and internally protected to prevent intruders
or disgruntled employees from physically harming or stealing the storage
hardware.<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">To secure you data so no one else can get at it, cloud systems
use authentication processes like username and passwords to limit access, and
data encryption to protect data that is stolen or intercepted en route. And yet,
passwords can be hacked; often it’s the service provide who holds the
encryption keys to your data, meaning that rogue employees could access it; and
your data isn’t immune to search and seizure by government entities. <o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEieZwCRcdUCySmyIjP1_b7tzWHU2XqUvuji6MRzUwcmfUyego5KlHpHCnX2wstCGF080ur23WxFI3W_aLxQ8FcJCr4clzIUinmnCk6_6gxwgSwRNQ8mlPMrpTFAvF2MRIIMELcNCuIRzkM/s1600/Howdataencryptionworks2.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEieZwCRcdUCySmyIjP1_b7tzWHU2XqUvuji6MRzUwcmfUyego5KlHpHCnX2wstCGF080ur23WxFI3W_aLxQ8FcJCr4clzIUinmnCk6_6gxwgSwRNQ8mlPMrpTFAvF2MRIIMELcNCuIRzkM/s1600/Howdataencryptionworks2.PNG" height="791" width="696" /></a></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">So, to entrust or not to entrust? In any case, you can rest assured
that- since cloud storage companies live and die by their reputation- they take
great pains to employ the most advanced security techniques and provide the most
reliable service possible. But the bottom line is that we live in an age where
national governments have been exposed for tapping into supposedly private cloud
data. Savvy surfers would be wise to keep anything truly sensitive stored on
their personal computer or private cloud behind a firewall, and never upload it
to the public cloud. <o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif;"><b><span style="font-size: x-large;">How was the iCloud
hacked?</span></b><span style="font-size: 16pt;"><o:p></o:p></span></span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif;"><b><span style="font-size: x-large;"><br /></span></b></span>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjo_Ynr0oOUjT51usT_rnpHqtIi1I9zGjzzELjmJEb-iOPPS50pJHg5KOLTeYraTp29geQ_mmdN4edjaff8PwwfpPCZjaPiOM7qbL5QYFnlHrvm3LSCKmd8oq9EG3SgYk0qRdBp94XQdoU/s1600/icloud-hack-celebrities.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjo_Ynr0oOUjT51usT_rnpHqtIi1I9zGjzzELjmJEb-iOPPS50pJHg5KOLTeYraTp29geQ_mmdN4edjaff8PwwfpPCZjaPiOM7qbL5QYFnlHrvm3LSCKmd8oq9EG3SgYk0qRdBp94XQdoU/s1600/icloud-hack-celebrities.png" height="346" width="640" /></a></div>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif;"><b><span style="font-size: x-large;"><br /></span></b></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">On 31 August 2014, a
cache of almost 200 personal photos of (mostly female) celebrities- many of
them explicit- was posted online. X-men and Hunger Games star Jennifer Lawrence
and recording artist Rihanna were among those whose private pictures, taken on their
iPhones and automatically backed up to the iCloud, were stolen and distributed.
Following the attacks, one survey found that 20 per cent of respondents had
become less confident in the security of the iCloud, while a further 40 per
cent were worried about storing photos and data in any cloud service. How this security
breach allowed to happen?<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">In an interview in the Wall Street Journal, Apple CEO Tim Cook
dispelled rumours that the victim’s user IDs and passwords were taken from the
company’s servers in a brute force attack. Instead, he explained, the hackers
obtained the information via a combination of phishing emails and correctly
answering the celebrities’ security questions. “That’s not really an engineering
thing”, he commented, but conceded that Apple should have done more to make user
savvier about choosing strong passwords and protecting themselves.<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
</div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Since the scandal, Apple has beefed up its security measures
by expanding its two-factor ID verification system to include any time a new
device attempts to access or download iCloud data. Users will also receive an
email alert or push notification whenever someone tries to do these things or
change the account password. Apple plans to aggressively encourage iCloud
users, the majority of whom still haven’t enabled two-factor authentication, to
turn on the feature immediately.<o:p></o:p></span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span></div>
</div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3078132662608425729.post-70573749506255051812015-04-21T11:37:00.001-07:002015-04-21T11:43:19.167-07:00What is Sniffing?<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjpKKz6m0bIUS6ns6uhNandN6IQeNB7QgNyHnuso3OfEOCUeuWmjGH6t5CTKUk6k6i-FBaxbmpPs3a5S-6k5kkEnbrvwDXbYz7IyFc-MRo_2nYpTXEG27Yx_NfNVV-MXrEZiGwCMkjAvBU/s1600/sniffing.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjpKKz6m0bIUS6ns6uhNandN6IQeNB7QgNyHnuso3OfEOCUeuWmjGH6t5CTKUk6k6i-FBaxbmpPs3a5S-6k5kkEnbrvwDXbYz7IyFc-MRo_2nYpTXEG27Yx_NfNVV-MXrEZiGwCMkjAvBU/s1600/sniffing.png" height="294" width="640" /></a></div>
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span></b>
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Sniffing </span></b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">(also called as <b>packet sniffing</b>)
refers to the use of a device or program to capture vital information from a
wired or wireless network traffic using data interception technology. The
objective of sniffing is to steal various information such as passwords of
applications like email and FTP, contents in the email, chat conversations,
files that are in transfer from one system to another and so on.<o:p></o:p></span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Protocols that send and receive data in a raw format without
encryption are easily susceptible to sniffing attack. Here is a list of some of
the common protocols that are vulnerable to sniffing:<o:p></o:p></span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<br />
<div style="margin-left: .5in; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<!--[if !supportLists]--><span style="color: #073763; font-family: Symbol; font-size: 16.0pt; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Telnet:
</span></b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Keystrokes including usernames and passwords.<o:p></o:p></span></div>
<br />
<div style="margin-left: .5in; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<!--[if !supportLists]--><span style="color: #073763; font-family: Symbol; font-size: 16.0pt; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">HTTP:
</span></b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Data sent in clear text.<o:p></o:p></span></div>
<br />
<div style="margin-left: .5in; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<!--[if !supportLists]--><span style="color: #073763; font-family: Symbol; font-size: 16.0pt; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">SMTP:
</span></b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Passwords and data sent in clear text.<o:p></o:p></span></div>
<br />
<div style="margin-left: .5in; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<!--[if !supportLists]--><span style="color: #073763; font-family: Symbol; font-size: 16.0pt; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">FTP:
</span></b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Passwords and data sent in clear text.<o:p></o:p></span></div>
<br />
<div style="margin-left: .5in; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<!--[if !supportLists]--><span style="color: #073763; font-family: Symbol; font-size: 16.0pt; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">POP:
</span></b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Passwords and data sent in clear text.<o:p></o:p></span></div>
<br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span></b>
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">TYPES OF SNIFFING<o:p></o:p></span></b><br />
<br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Sniffing is mainly classified into two types as follows:<o:p></o:p></span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Passive Sniffing<o:p></o:p></span></b><br />
<br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Passive sniffing </span></b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">is fairly simple which
involves just connecting to the target network and waiting for the packets to
arrive at your host for sniffing. This type of sniffing works only in an
unswitched network environment where the individual hosts are interconnected
using a <b>hub</b>.<o:p></o:p></span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">In a hub type of network environment, traffic (packets) from all
hosts are sent to all ports on the network. This makes it possible for the
hacker’s computer to secretly intercept and sniff packets that belong to other
computers on the same network.<o:p></o:p></span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">In order to carry out passive sniffing, the hacker will simply
hook up his laptop to the network and runs a sniffing software to silently
capture the packets that arrive at his port.<o:p></o:p></span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Since passive sniffing works by simply exploiting the existing
vulnerability of unswitched networks without making additional modifications,
it is often hard to detect.<o:p></o:p></span><br />
<br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Active Sniffing<o:p></o:p></span></b><br />
<br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Active sniffing </span></b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">is the one that is often
performed on a switched network environment. Here individual hosts on the
network are interconnected using <b>switches </b>that keeps record of MAC
addresses (hardware addresses) of all hosts connected to it. With this
information the switch can identify which system is sitting on which port so
that when the packets are received they are intelligently filtered and forwarded
only to the intended ports.<o:p></o:p></span><br />
<br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">This makes the packet sniffing very difficult on switched network
as the traffic from all hosts does not flow to all ports on the network.
However, it is still possible to actively sniff packets on switched networks
using techniques such as <b>ARP poisoning </b>and <b>MAC</b> <b>flooding </b>which
are discussed below.<o:p></o:p></span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">TECHNIQUES FOR ACTIVE SNIFFING<o:p></o:p></span></b><br />
<br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Since most computer networks today uses switches instead of
hubs, active sniffing proves more feasible under practical conditions. The
following are some of the important techniques used in <i>active sniffing</i>:<o:p></o:p></span><br />
<br />
<b><span style="color: #073763; font-family: 'Adobe Myungjo Std M', serif;"><span style="font-size: x-large;">ARP Poisoning</span><span style="font-size: 16pt;"><o:p></o:p></span></span></b><br />
<br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Before actually going into <b>ARP poisoning</b>, let us first
try to understand what <b>ARP </b>actually means.<o:p></o:p></span><br />
<br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">What is an ARP?<o:p></o:p></span></b><br />
<br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">ARP </span></b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">which stands for <b>Address Resolution Protocol </b>is
responsible for converting <i>IP address </i>to a physical address called <i>MAC
address </i>in a network. Each host on a network<i> </i>has a MAC address
associated with it which is embedded in its hardware component such<i> </i>as <b>NIC
</b>(Network Interface Controller). This MAC address is used to physically
identify a<i> </i>host on the network and forward packets to it.<o:p></o:p></span><br />
<br />
<br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">When one host wants to send data to another, it broadcasts an
ARP message to an IP address requesting for its corresponding physical address.
The host with the IP address in the request replies with its physical address
after which the data is forwarded to it. This ARP request is cached immediately
and stored in an ARP table to ease further lookups. So, <b>ARP poisoning </b>(also
known as <b>ARP spoofing</b>) is where the hacker goes and pollutes the entries
in the ARP table to perform data interception between two machines in the network.
For this, whenever a source host sends an ARP message requesting for the MAC address
of target host, the hacker broadcasts the MAC address of his machine so that
all the packets are routed to him and not the target host that is intended to
receive. The following figure shows an illustration of how ARP poisoning is
performed.<o:p></o:p></span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<br />
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEit1j0O7U78xWgHsoOh8FRgi2Bg2H11_jdfEo-OxdDgK0NJ-FDVz_TEoTHjnHHxVNXhcfPDM5BRXIfUijXDEnrhCJoINMf38axo-Af1TOOKV306bp2CvSbGNPaksSQ62u6RUbKaJfW3tV4/s1600/ARPpoisoning.PNG" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEit1j0O7U78xWgHsoOh8FRgi2Bg2H11_jdfEo-OxdDgK0NJ-FDVz_TEoTHjnHHxVNXhcfPDM5BRXIfUijXDEnrhCJoINMf38axo-Af1TOOKV306bp2CvSbGNPaksSQ62u6RUbKaJfW3tV4/s1600/ARPpoisoning.PNG" height="390" width="640" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">ARP poisoning</td></tr>
</tbody></table>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt; line-height: 107%; mso-ansi-language: EN-US; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: HI; mso-fareast-language: EN-US;">As shown in the above example <b>John</b>, <b>Adam </b>and the <b>attacker </b>all
three share the same network. John decides to send a message to Adam where his
computer knows the IP address of Adam as 192.168.1.3 but does not know its MAC
address. So it will broadcast an ARP message requesting for the MAC address of
192.168.1.3. But, the Attacker will poison the ARP cache table by spoofing
Adam’s IP address and mapping his (attacker’s) MAC address on to. As a result,
John’s traffic gets forwarded to the attacker’s computer where he sniffs all the
vital information and forwards the same to Adam so as to make everything look
normal.</span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt; line-height: 107%; mso-ansi-language: EN-US; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: HI; mso-fareast-language: EN-US;"><br /></span>
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Tools for APR Poisoning<o:p></o:p></span></b><br />
<br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">The following are some of the tools that can be used to carry
out ARP poisoning:<o:p></o:p></span><br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"> <o:p></o:p></span></b><br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">1. Ettercap<o:p></o:p></span></b><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">This is an open-source network security tool used for performing
sniffing and man-in-themiddle attacks on a local network. It is capable of
intercepting network traffic and capturing vital information like passwords and
emails. It works by putting the network interface device into promiscuous mode and
poisoning ARP entries of the target machines to sniff traffic even on switched
network environment. It can be downloaded from the link below:<o:p></o:p></span><br />
<br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Download Ettercap: <a href="http://ettercap.github.io/ettercap/">http://ettercap.github.io/ettercap/</a><o:p></o:p></span></b><br />
<br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">2. Nightawk<o:p></o:p></span></b><br />
<br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">This is a simple tool for performing ARP spoofing and password
sniffing. It has the ability to capture passwords from web login forms
implemented on protocols like HTTP, FTP, SMTP and POP. It can be downloaded
from the link below:<o:p></o:p></span><br />
<br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Download Nightawk: <a href="https://code.google.com/p/nighthawk/">https://code.google.com/p/nighthawk/</a><o:p></o:p></span></b><br />
<br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span></b>
<b><span style="color: #073763; font-family: 'Adobe Myungjo Std M', serif;"><span style="font-size: x-large;">MAC Flooding</span></span></b><br />
<br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">MAC flooding </span></b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">is another type of
sniffing technique used in a switched network<b> </b>environment that basically
involves flooding the switch with numerous unnecessary<b> </b>requests. Since
switches have limited memory and processing capabilities to map MAC<b> </b>addresses
to physical ports, they gets confused and hits their limitation.<b><o:p></o:p></b></span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">When switches hits their limitation they will fall into an open
state and starts acting just like a hub. That means, all traffic gets forwarded
to all ports just like in case of an unswitched network so that the attacker
can easily sniff the required information.<o:p></o:p></span><br />
<br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Tools for MAC Flooding<o:p></o:p></span></b><br />
<br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">EtherFlood </span></b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">is an easy to use open-source tool
to carryout MAC flooding in a switched network environment. The download link
EtherFlood is mentioned below:<o:p></o:p></span><br />
<br />
<br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Download EtherFlood: <a href="http://ntsecurity.nu/toolbox/etherflood/">http://ntsecurity.nu/toolbox/etherflood/</a><o:p></o:p></span></b><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<b><span style="color: #073763; font-family: 'Adobe Myungjo Std M', serif;"><span style="font-size: x-large;">DNS CACHE POISONING</span><span style="font-size: 16pt;"><o:p></o:p></span></span></b><br />
<br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">DNS cache poisoning </span></b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">(also known as <b>DNS
spoofing</b>) is a technique similar to <i>ARP poisoning </i>where the Domain
Name System (DNS) resolver’s cache is polluted by<i> </i>introducing
manipulated data into it. So, whenever users try to access websites, the<i> </i>poisoned
DNS server returns an incorrect IP address thereby directing the users to the<i>
</i>attacker’s computers.<i><o:p></o:p></i></span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">The DNS is responsible for mapping the human readable domain names
to their corresponding addresses. In order to improve the speed of resolution,
DNS servers often cache the previously obtained query results. Before caching
or forwarding the query results, the DNS server has to validate the response
obtained from other servers to make sure that it has come from an authoritative
source. However, some servers are configured with less security features where
they fail to properly validate the source of response. Hackers can exploit this
vulnerability to introduce malicious records to the DNS cache so as to redirect
a large group of Internet users to their computers. When a DNS cache is said to
be poisoned, it will affect all those Internet users who have configured their
systems to use it as their DNS server. The following figure illustrates the
working of DNS cache poisoning attack.<o:p></o:p></span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<br />
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjNbAj-rkz094Wj_OZTCeHGPxJKOd1EFELF67GZeu2SFjaj3QQ34HwH9R_yftQ-Nd3X2JkjuozZb_pkaEORqR8VBWRLmLn5pvQS3pxZw85XfZksTgb_sxAokqKzZgKrNrooWc0-H1emhyI/s1600/dnspoisoning.PNG" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjNbAj-rkz094Wj_OZTCeHGPxJKOd1EFELF67GZeu2SFjaj3QQ34HwH9R_yftQ-Nd3X2JkjuozZb_pkaEORqR8VBWRLmLn5pvQS3pxZw85XfZksTgb_sxAokqKzZgKrNrooWc0-H1emhyI/s1600/dnspoisoning.PNG" height="440" width="640" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">DNS Cache Poisoning</td></tr>
</tbody></table>
<br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">As shown in the above figure, a user will place a request to the
DNS server for resolving “facebook.com”. Since the DNS server does not have the
IP in its cache, it forwards the same request to the next DNS server. Now, a
rouge DNS server picks up the request and replies with a fake IP for the query
“facebook.com”. Without actually validating the response, the DNS server
forwards the result to the user and also stores the result in its cache. As a
result the cache gets poisoned.<o:p></o:p></span><br />
<br />
<br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">The user is now directed towards the <b>fake </b>“Facebook”
server maintained by the hacker instead of the real one. All the subsequent
requests from other users for “facebook.com” is also answered by the
compromised DNS server using its poisoned cache data. </span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">In this way it is
possible for the hacker to victimize a large group of people and hijack their
personal information such as passwords, emails, bank logins and other valuable
data.<o:p></o:p></span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">MAN-IN-THE-MIDDLE ATTACK<o:p></o:p></span></b><br />
<br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Man-in-the-middle </span></b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">is referred to a kind of
attack where the attacker intercepts an ongoing communication between two hosts
in a network with an ability to sniff the data or manipulate the packets
exchanged between two communicating parties. This attack is somewhat similar to
the one shown in the below figure from the previous section.<o:p></o:p></span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Another good example of man-in-the-middle attack is an active
eavesdropping carried out by the attacker by making two independent connections
with the victims to make them believe that they are chatting with each other.
But the entire conversation is actually controlled by the attacker as
illustrated in the following figure<o:p></o:p></span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<br />
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg9W5TE3xNmR8LYAcAxpUhoXPwnmswNC4HpUpFQZ2H4nsyUpUvryg5D-ovbeEF6Vr2TvPyM9B4TtTpfz8NMydRfuMNiioKGhVR2B50AVKqzwylYK5j5VSGES3gDaqSCRJ_xU29eBOML7Ac/s1600/maninthemiddleattack.PNG" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg9W5TE3xNmR8LYAcAxpUhoXPwnmswNC4HpUpFQZ2H4nsyUpUvryg5D-ovbeEF6Vr2TvPyM9B4TtTpfz8NMydRfuMNiioKGhVR2B50AVKqzwylYK5j5VSGES3gDaqSCRJ_xU29eBOML7Ac/s1600/maninthemiddleattack.PNG" height="430" width="640" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">Man In The Middle Attack</td></tr>
</tbody></table>
<br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">TOOLS FOR SNIFFING<o:p></o:p></span></b><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">After going far enough into the theoretical concepts of
sniffing, let us now look at some of the popular sniffing tools and learn how
to use them to carry out various kinds of attacks.<o:p></o:p></span><br />
<br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">WireShark<o:p></o:p></span></b><br />
<br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Wireshark </span></b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">is free and open-source packet
analyzer program used for network troubleshooting and analysis. It is available
for both Windows and Linux operating systems and can be downloaded from the
following link:<o:p></o:p></span><br />
<br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Download WireShark: <a href="https://www.wireshark.org/download.html">https://www.wireshark.org/download.html</a><o:p></o:p></span></b><br />
<br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Once you have installed <b>WireShark </b>on your Windows
computer, start the program by running it with administrator privileges.<o:p></o:p></span><br />
<br />
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhFJrKYoFzyn_8y7-AZVEezjoRAPsJYf-ZKlMYkVjmAZEI8Mlc1OVky2KTEtv2IDR5lYV1RDovbqq6tNC7oGHVIVL0FXlH4xchMtKstPqm87OtDPGzi13r_TAiP6-Sj0k_2OuTiA3Xf_L8/s1600/wireshark.PNG" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhFJrKYoFzyn_8y7-AZVEezjoRAPsJYf-ZKlMYkVjmAZEI8Mlc1OVky2KTEtv2IDR5lYV1RDovbqq6tNC7oGHVIVL0FXlH4xchMtKstPqm87OtDPGzi13r_TAiP6-Sj0k_2OuTiA3Xf_L8/s1600/wireshark.PNG" height="384" width="640" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">WureShark</td></tr>
</tbody></table>
<br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">From the menu options, click on “Capture” and select “Options”
from the drop down menu. This will show a list of available interface devices
for sniffing.<o:p></o:p></span><br />
<br />
<br />
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhuPeVm4K65CBEGBJyNeMRi0Id4YNVHcqTwF-lZ4vYx3pdLrbFiDrvkMHqBV429-t1Csj493ly-muoFXFyL5vzk7M5fNJgEWyLV_1e_6gamP_ffYjudfbl3p2E09FmjHFyEnzklA6glphc/s1600/captureoptions.PNG" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhuPeVm4K65CBEGBJyNeMRi0Id4YNVHcqTwF-lZ4vYx3pdLrbFiDrvkMHqBV429-t1Csj493ly-muoFXFyL5vzk7M5fNJgEWyLV_1e_6gamP_ffYjudfbl3p2E09FmjHFyEnzklA6glphc/s1600/captureoptions.PNG" height="314" width="640" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">Available Interface device</td></tr>
</tbody></table>
<br />
<br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">You can either select a particular device or choose to capture
on all interfaces. Also make sure that “promiscuous mode” is activated. When
you are done click on the “Start” button to begin the sniffing process.<o:p></o:p></span><br />
<br />
<br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">This will start capturing all the incoming and outgoing traffic
on the network as shown in the following figure below:<o:p></o:p></span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<br />
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh2DBpfLGwBt8beKIxg_6Ue-VbZ3pQbdpAXpFWIk2iq1mkb1d0PYW_0oat2b6AlR_vu8YzoROgbEOGdnD8UXPNgAVgUAY_ASsJr-MWuvLq5cApwO04cYAFhfYEPXscLuB_jcnpEfHArWas/s1600/capturing.PNG" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh2DBpfLGwBt8beKIxg_6Ue-VbZ3pQbdpAXpFWIk2iq1mkb1d0PYW_0oat2b6AlR_vu8YzoROgbEOGdnD8UXPNgAVgUAY_ASsJr-MWuvLq5cApwO04cYAFhfYEPXscLuB_jcnpEfHArWas/s1600/capturing.PNG" height="280" width="640" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">Packet Capturing</td></tr>
</tbody></table>
<br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Run this tool for as long as you want and when you feel that you
are done with capturing enough data, stop the sniffing process by pressing the
“Stop” button displayed in red colour at the top.<o:p></o:p></span><br />
<br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">In order to analyze the captured data, you will have to set
filters in for filtering the type of data that you are looking for. For
example, if one is looking to capture passwords from login forms which are
normally sent using the HTTP POST request method, you can set the filter as <b>http.request.method
== “POST”</b>. This will help you narrow your results and find what you are
looking for. <o:p></o:p></span><br />
<br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Once the filter is set, right-click on the desired result that
you want to analyze and select “Follow TCP Stream”. This will open up the
entire TCP stream in a new window. Here you can carefully analyze the data to
find out the password entered by users in unencrypted login forms as shown in
the sample snapshot below.<o:p></o:p></span><br />
<br />
<br />
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg4ds4mj-LFUN0JsXuYP_ZPktRgiG08FTNDu_Kv-n5lwik5wvTClnLJqJaxgOwaQoPcwPcShcsYXeBW8rQ_3uxOAdf0gNNeyJSxAIsS2zScC7VXw-CnbYHgpAQX3I7g3PlkO60dlfrnGGU/s1600/passwordtcpstream.PNG" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg4ds4mj-LFUN0JsXuYP_ZPktRgiG08FTNDu_Kv-n5lwik5wvTClnLJqJaxgOwaQoPcwPcShcsYXeBW8rQ_3uxOAdf0gNNeyJSxAIsS2zScC7VXw-CnbYHgpAQX3I7g3PlkO60dlfrnGGU/s1600/passwordtcpstream.PNG" height="272" width="640" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">TCP Stream</td></tr>
</tbody></table>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">You can use different filters for analyzing different types of
data. For instance if you want to analyze the FTP results, set the filter as <b>ftp
</b>and follow the TCP stream.<o:p></o:p></span><br />
<br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Cain & Abel<o:p></o:p></span></b><br />
<br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">This is another powerful network sniffer which has many other
built-in features such as password cracking, ARP poisoning and MAC spoofing. It
proves as an all-in-one tool for performing various attacks such as sniffing,
man-in-the-middle attack and ARP cache poisoning.<o:p></o:p></span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<br />
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNHHCElxqo9azf-ZLqgOWrAP4nvu00uaaEVfesspDVGN2ojfAgUNos1rJeC_OnwqWpfYT47_4qfZ7VMH43ULnr4qi2pYeKK792uUxy91dYSc86autNzB3JdQEndMDmVRdJoxvx7rfHXQs/s1600/cain_abel.PNG" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNHHCElxqo9azf-ZLqgOWrAP4nvu00uaaEVfesspDVGN2ojfAgUNos1rJeC_OnwqWpfYT47_4qfZ7VMH43ULnr4qi2pYeKK792uUxy91dYSc86autNzB3JdQEndMDmVRdJoxvx7rfHXQs/s1600/cain_abel.PNG" height="318" width="640" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">Cain and Abel</td></tr>
</tbody></table>
<br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">You can download this tool from the following link:<o:p></o:p></span><br />
<br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Download Cain & Abel: <a href="http://www.oxid.it/cain.html">http://www.oxid.it/cain.html</a><o:p></o:p></span></b><br />
<br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">SMAC<o:p></o:p></span></b><br />
<br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">SMAC </span></b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">is a handy tool that allows you to spoof the MAC address on your
machine. Using this tool it is possible to set the MAC address of your choice
so as to easily fool other machines on the network to send their information to
your machine.<o:p></o:p></span><br />
<br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">The following snapshot shows the SMAC tool in action:<o:p></o:p></span><br />
<br />
<br />
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiszZKrhxTgBqV5UbJJwE4bZakHE5CKZI8CG9Ba4Qp84LZ2GRcT5qS5w4jf8ECvIt30dBigTYXHb_JXuEMhwYecm0UpiZi9Zli-6QMYUBjyufODByckhCMxu46TxoWPVwJoR_jmAxdqINU/s1600/smac.PNG" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiszZKrhxTgBqV5UbJJwE4bZakHE5CKZI8CG9Ba4Qp84LZ2GRcT5qS5w4jf8ECvIt30dBigTYXHb_JXuEMhwYecm0UpiZi9Zli-6QMYUBjyufODByckhCMxu46TxoWPVwJoR_jmAxdqINU/s1600/smac.PNG" height="440" width="640" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">SMAC</td></tr>
</tbody></table>
<br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">The download link for SMAC is given below:<o:p></o:p></span><br />
<br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">SMAC Download : </span></b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><a href="http://www.klcconsulting.net/smac/"><b>http://www.klcconsulting.net/smac/</b></a><b><o:p></o:p></b></span><br />
<br />
<br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span></b>
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">COUNTERMEASURES<o:p></o:p></span></b><br />
<br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">After knowing about various sniffing methods and the tools used
to carry out them, it is time to shed some light on possible countermeasures
that can be taken to prevent such attacks on your network.<o:p></o:p></span><br />
<br />
<div style="margin-left: .5in; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<!--[if !supportLists]--><span style="color: #073763; font-family: Symbol; font-size: 16.0pt; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Restrict
physical access to the network for unintended users. This will stop the
attacker from installing the packet sniffer on the network.<o:p></o:p></span></div>
<br />
<div style="margin-left: .5in; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<!--[if !supportLists]--><span style="color: #073763; font-family: Symbol; font-size: 16.0pt; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Use
encryption on the network so that even if the attacker manages to sniff the
packets, he will not be able to see the information in a plain text format.<o:p></o:p></span></div>
<br />
<div style="margin-left: .5in; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<!--[if !supportLists]--><span style="color: #073763; font-family: Symbol; font-size: 16.0pt; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Permanently
adding the MAC address of the gateway to the ARP cache will prevent the
attacker from ARP spoofing the gateway.<o:p></o:p></span></div>
<br />
<div style="margin-left: .5in; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<!--[if !supportLists]--><span style="color: #073763; font-family: Symbol; font-size: 16.0pt; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">In
case of a small network using static IP addresses and static ARP tables will
prevent hackers from adding spoofed ARP entries.<o:p></o:p></span></div>
<br />
<div style="margin-left: .5in; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<!--[if !supportLists]--><span style="color: #073763; font-family: Symbol; font-size: 16.0pt; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">In
case of a large network install switches that come with port security features
which makes it impossible to spoof.<o:p></o:p></span></div>
<br />
<div style="margin-left: .5in; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<!--[if !supportLists]--><span style="color: #073763; font-family: Symbol; font-size: 16.0pt; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Use
tools like <b>Arpwatch </b>or an <b>IDS </b>(Intrusion Detection System) to
monitor and detect sniffing activities on the network.<o:p></o:p></span></div>
<br />
<br /></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3078132662608425729.post-55255947603161100142015-04-21T10:50:00.003-07:002015-04-21T10:50:47.785-07:00What is DoS?<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEihzmlp5-OT1cN4Ue9UmxiE8Y_2aysGj_dmNGEi4BrpAFAL2NHdoZpaZcBgpaSaZMmTULY6gDA4THMYY9o_IrJ81lC-fgn1_0dtkX72GlFnE73wbMei8nLfZLJ13Q-IaRHZUaQnxw6MXjY/s1600/DoS.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEihzmlp5-OT1cN4Ue9UmxiE8Y_2aysGj_dmNGEi4BrpAFAL2NHdoZpaZcBgpaSaZMmTULY6gDA4THMYY9o_IrJ81lC-fgn1_0dtkX72GlFnE73wbMei8nLfZLJ13Q-IaRHZUaQnxw6MXjY/s1600/DoS.png" height="314" width="640" /></a></div>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">In this post we will take a closer look at what exactly are <b>denial
of service (DoS) </b>attacks, their different types and tools used to perform
them. In the recent years, DoS<b> </b>attacks have simply grown from mere
annoyances to more serious and high-profile threats<b> </b>to business and
e-commerce websites. This is the type of attack that the hackers have<b> </b>successfully
used to temporarily bring down major online providers like <i>Yahoo!</i>, <i>eBay
</i>and<b> </b>other big players. So, having a clear understanding of the DoS
attacks and their working<b> </b>principle seems highly essential for anyone
who needs to excel in the field of ethical<b> </b>hacking.<o:p></o:p></span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">WHAT IS DENIAL OF SERVICE (DOS) ATTACK?<o:p></o:p></span></b><br />
<br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">A <b>denial of service (DoS) </b>attack is an attempt to make a
system, service or network completely unusable to its intended users or
significantly slow down its performance by overloading its resources.<o:p></o:p></span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">In most cases, if an attacker is unable to gain unauthorized
access to the target system he finally decides to carry out a DoS attack by
trying to crash its resources. The aftermath of the DoS attack can lead to financial
losses especially if the affected website or server is associated with
e-commerce activities. It may also affect the goodwill of the company or
organization that has become a victim of the attack as there is a clear chance
of people losing trust in using its services.<o:p></o:p></span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Objectives of DoS Attacks<o:p></o:p></span></b><br />
<br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">The objective of a DoS attack is not to gain unauthorized access
to the system but rather to prevent the legitimate users of its service from
accessing it. To accomplish this, an attacker may use different means such as:<o:p></o:p></span><br />
<br />
<div style="margin-left: .5in; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<!--[if !supportLists]--><span style="color: #073763; font-family: Symbol; font-size: 16.0pt; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Attempt
to <b>flood the traffic </b>to the target network so as to make it unreachable
to its intended users.<o:p></o:p></span></div>
<div style="margin-left: .5in;">
<br /></div>
<div style="margin-left: .5in; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<!--[if !supportLists]--><span style="color: #073763; font-family: Symbol; font-size: 16.0pt; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Attempt
to <b>disrupt connections </b>between two machines on the network which may
lead to denial of service.<o:p></o:p></span></div>
<div class="MsoListParagraph">
<br /></div>
<div style="margin-left: .5in;">
<br /></div>
<br />
<div style="margin-left: .5in; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<!--[if !supportLists]--><span style="color: #073763; font-family: Symbol; font-size: 16.0pt; mso-bidi-font-family: Symbol; mso-bidi-font-weight: bold; mso-fareast-font-family: Symbol;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;">
</span></span><!--[endif]--><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Attempt to <b>prevent a particular individual </b>from accessing
the service or <b>disrupt only a specific service </b>from getting accessed.<b><o:p></o:p></b></span></div>
<div style="margin-left: .5in; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span></div>
<br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">DoS Attack Techniques<o:p></o:p></span></b><br />
<br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">The following are some of the common techniques employed in
denial of service attack:<o:p></o:p></span><br />
<br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">1. Smurf Attack (ICMP flood)<o:p></o:p></span></b><br />
<br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">In this type of DoS attack, the attacker broadcasts a large
amount of Internet Control Message Protocol (ICMP) echo request packets to a
computer network with a spoofed IP address of the target host (victim). This
will flood the target host with lots of ping replies (ICMP echo replies) from
the network which makes it impossible to handle. There is also a variant of
smurf attack called <b>fraggle </b>attack where UDP packets are used instead of
ICMP packets. The following figure illustrates the mechanism of a smurf attack:<o:p></o:p></span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<br />
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg3ZrjsWgXpfFbn63o8_ZlHOIhrPt2tQx52FC65TSY4kFXzMtdJjtaRka57GGNsSeVvMdQ6sEuPdFjYyHq65vHOeeq_dMvrX8zSRr4nxKNIyq3f7hXnNQ_fm2PJAIDnDXp_wFJbHxWcarE/s1600/smurf.PNG" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg3ZrjsWgXpfFbn63o8_ZlHOIhrPt2tQx52FC65TSY4kFXzMtdJjtaRka57GGNsSeVvMdQ6sEuPdFjYyHq65vHOeeq_dMvrX8zSRr4nxKNIyq3f7hXnNQ_fm2PJAIDnDXp_wFJbHxWcarE/s1600/smurf.PNG" height="344" width="640" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">Mechanism Of Smurf Attack</td></tr>
</tbody></table>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">2. Ping of Death (POD)<o:p></o:p></span></b><br />
<br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">In this kind of attack, the attacker deliberately sends an IP
packet larger than the allowed size of 65,535 bytes. Since the size exceeds the
maximum allowed limit, it is split across multiple IP packets known as
fragments and sent to the target host. However, when the target tries to
reassemble the packet on its end, the fragments add up to more than the allowed
size of 65,535 bytes. Being unable to handle oversized packets, the operating system
will freeze, reboot or simply crash thereby causing all the services running on
it to become unavailable to the legitimate users.<o:p></o:p></span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">In this way, the attacker becomes successful in causing a denial
of service using the <b>ping of death </b>technique.<o:p></o:p></span><br />
<br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">3. Teardrop Attack<o:p></o:p></span></b><br />
<br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Teardrop attack involves sending IP fragments with oversized
payload and overlapping offset value especially in the second or later
fragment. If the receiving operating system is unable to aggregate the packets
accordingly, it can lead to system crash.<o:p></o:p></span><br />
<br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">4. SYN Flood Attack<o:p></o:p></span></b><br />
<br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">The SYN flood attack exploits a known weakness in the TCP
connection sequence called the “three-way handshake”. According to this, a host
sends <b>SYN Request </b>to the target server which responds with a <b>SYN-ACK </b>back
to the host. Finally the requesting host sends an <b>ACK Response </b>back to
the server which completes the three-way handshake process to establish the
connection.<o:p></o:p></span><br />
<br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">However, in case of a SYN attack, a large number bogus TCP SYN
requests are sent to the target server but the SYN-ACK response sent back from
the server is not answered.<o:p></o:p></span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Sometimes the attacker may even use a spoofed IP address while
sending a SYN request. <o:p></o:p></span><br />
<div style="margin-left: .5in; mso-list: l0 level1 lfo1; text-indent: -.25in;">
</div>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">For each SYN request from the attacker, the victim server
allocates resources and keeps waiting for the ACK from the requesting source
(attacker). Since no ACK is received, the server gets flooded with a large
amount of half-open connections thereby leading to resource exhaustion
resulting in a denial of service. SYN flood attack is demonstrated in the
following figure.<o:p></o:p></span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<br />
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggIH_Jhn5c-wy8vNmNdM5tCOZhRGfGTzQIwMGwkgCpTpeZjp-kW7-uDRWziOj2bhPnod4eo_x6XBoXDxeOZf9XAUBeL0JQ0TFzDCFQ664ugQch6fJ812isM3KoazIFBwQQH4ez35L2yM4/s1600/SYSfloodattack.PNG" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggIH_Jhn5c-wy8vNmNdM5tCOZhRGfGTzQIwMGwkgCpTpeZjp-kW7-uDRWziOj2bhPnod4eo_x6XBoXDxeOZf9XAUBeL0JQ0TFzDCFQ664ugQch6fJ812isM3KoazIFBwQQH4ez35L2yM4/s1600/SYSfloodattack.PNG" height="314" width="640" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">SYN flood attack</td></tr>
</tbody></table>
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Tools for DoS Attacks<o:p></o:p></span></b><br />
<br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Now, let us look at some of the popular tools used for DoS
attacks.<o:p></o:p></span><br />
<br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">1. Slowloris<o:p></o:p></span></b><br />
<br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Slowloris </span></b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">is a tool built for Linux platform
that targets hosts running web servers such as <i>Apache</i>, <i>dhttpd</i>, <i>Tomcat
</i>and <i>GoAhead</i>. This tool works by sending too many HTTP headers to the
target server but never completes it. Slowloris is designed to take down a
target web server from a single machine by holding as many connections to it as
possible.<o:p></o:p></span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">This will eventually overflow the maximum connections that the
target web server can handle thereby leading to a denial of service for other
legitimate connections.<o:p></o:p></span><br />
<br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">2. QSlowloris<o:p></o:p></span></b><br />
<br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">This tool works on the same principle as that of Slowloris but
has a graphical user interface for ease of use and works on Windows platform.<o:p></o:p></span><br />
<br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">3. PyLoris<o:p></o:p></span></b><br />
<br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">PyLoris </span></b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">is basically a testing tool for
servers but can also be used to perform DoS attacks. It can target various
protocols including <i>HTTP</i>, <i>FTP</i>, <i>SMTP</i>, <i>IMAP </i>and <i>Telnet</i>.<o:p></o:p></span><br />
<br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">4. LOIC (Low Orbit Ion Cannon)<o:p></o:p></span></b><br />
<br />
<br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">LOIC </span></b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">is an open-source network stress testing and DoS tool. It floods
the target server with a large amount of TCP or UDP packets resulting in a
denial of service.<o:p></o:p></span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACK<o:p></o:p></span></b><br />
<br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">A distributed denial of service attack happens when the attack
on the target host originates from multiple compromised systems. Before
launching the attack, the attacker compromises multiple systems from one or
more networks using trojans and other techniques. These compromised systems are
known as <b>zombies </b>where the attacker uses them to launch a DDoS attack on
the final target.<o:p></o:p></span><br />
<br />
<br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">The advantages of distributed denial of service is that since
multiple systems are used, the target can easily be flooded with too much
traffic eventually causing it to go down. A more clear understanding can be
obtained using the following figure which illustrates the mechanism involved in
a typical DDoS attack.<o:p></o:p></span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<br />
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgKoKPqjT2suG5aN_9e4IZkHvt5AAfNnod1SZqtRIZF7sYr1_LOodpZzfaaLQ4K8-0D58UM2UTiOhDzyGQGN5bjUiyGLdxznAhygPAxO3L778GSDRsz0HlAm7ct3WrgOkJsLvCbYjoVNYA/s1600/DDOSmechanism.PNG" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgKoKPqjT2suG5aN_9e4IZkHvt5AAfNnod1SZqtRIZF7sYr1_LOodpZzfaaLQ4K8-0D58UM2UTiOhDzyGQGN5bjUiyGLdxznAhygPAxO3L778GSDRsz0HlAm7ct3WrgOkJsLvCbYjoVNYA/s1600/DDOSmechanism.PNG" height="402" width="640" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">DDoS Mechanism</td></tr>
</tbody></table>
<br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Characteristics of DDoS Attack<o:p></o:p></span></b><br />
<br />
<div style="margin-left: .5in; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<!--[if !supportLists]--><span style="color: #073763; font-family: Symbol; font-size: 16.0pt; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">When
compared to a DoS attack, DDoS is a large scale coordinated attack on the
target using large number of pre-compromised systems (zombies). <o:p></o:p></span></div>
<br />
<div style="margin-left: .5in; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<!--[if !supportLists]--><span style="color: #073763; font-family: Symbol; font-size: 16.0pt; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">DDoS
attack works under two levels. The final target which is under direct attack is
known as the “primary victim” while the zombies used to attack it are referred
to as “secondary victims”.<o:p></o:p></span></div>
<br />
<div style="margin-left: .5in; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<!--[if !supportLists]--><span style="color: #073763; font-family: Symbol; font-size: 16.0pt; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">As
the attack originates from multiple network locations and involves large number
of zombies, it is often hard to detect or prevent.<o:p></o:p></span></div>
<br />
<div style="margin-left: .5in; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<!--[if !supportLists]--><span style="color: #073763; font-family: Symbol; font-size: 16.0pt; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">A
simple DoS attack which originates from a single IP address can easily be
blocked at the firewall level. But a DDoS attack which originates from twenty
to thirty thousand different systems (IP addresses) is extremely hard to
detect.<o:p></o:p></span></div>
<br />
<br />
<div style="margin-left: .5in; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<!--[if !supportLists]--><span style="color: #073763; font-family: Symbol; font-size: 16.0pt; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Even
if the company makes a guess work and manages to block multiple IP addresses at
its firewall, there is a clear chance of real users being adversely affected as
it is hard to differentiate between genuine and malicious traffic.<o:p></o:p></span></div>
<div style="margin-left: .5in; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span></div>
<br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">DDoS Attack Mechanism<o:p></o:p></span></b><br />
<br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Now let us look at some of the DDoS attack models that are
commonly in place:<o:p></o:p></span><br />
<br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Agent Handler Model<o:p></o:p></span></b><br />
<br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Agent handler model </span></b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">is one of the popular
DDoS mechanisms where the attacker cleverly designs the attack in a
hierarchical manner so as to improve its effectiveness and also make it hard to
detect and trace back.<o:p></o:p></span><br />
<br />
<div style="margin-left: .5in; mso-list: l0 level1 lfo1; text-indent: -.25in;">
</div>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">At the first level, the attacker compromises a set of computers
and installs a handler program on them. At the second level, the attacker
compromises another large set of computers commonly referred to as “agents” or
“zombies” which are controlled by the “handlers”.<o:p></o:p></span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<br />
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhatiwP7mbTNBIp22MPjwA0HPlVpQy1EmFRu-9BF8wKDX6mC5J_Incs8OgA0AYmb22s_59aJqpvoBDfeecbSsh7bnyikgKr0UzFkvQQN8wefsH5rpdvyrfazi5TrziNYVG6AG0MNiBtf8c/s1600/agenthandlermodel.PNG" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhatiwP7mbTNBIp22MPjwA0HPlVpQy1EmFRu-9BF8wKDX6mC5J_Incs8OgA0AYmb22s_59aJqpvoBDfeecbSsh7bnyikgKr0UzFkvQQN8wefsH5rpdvyrfazi5TrziNYVG6AG0MNiBtf8c/s1600/agenthandlermodel.PNG" height="466" width="640" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">Agent Handler Model</td></tr>
</tbody></table>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">So, during the time of attack, the attacker cleverly sits at the
top of the hierarchy controlling the handlers which in turn initiate the agents
(zombies) to attack the target host (victim). Since the attacker safely hides
in the background, this type of attack makes it really hard to trace back to
the source.<o:p></o:p></span><br />
<br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">IRC Based Model<o:p></o:p></span></b><br />
<br />
<br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">IRC based model </span></b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">is similar to the above
discussed “agent handler model” but the only difference is that, the attacker
makes use of an “Internet Relay Chat (IRC) network” instead of handlers to
connect to the agents.<o:p></o:p></span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<br />
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWx8-8nK84j_3ivN3GdCU0YSqeawCDdkIOGUW1vZRX7X2HIUIFrTTuKGNUV2cA3hcQ2i13fWJuRXEpwOckulPx_IAPe4dJ4igJnJTa5zh1Z-Rk5GzDc3hpKFaMLNssiEEJeHBS38xMwj0/s1600/IRCbasedmodel.PNG" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWx8-8nK84j_3ivN3GdCU0YSqeawCDdkIOGUW1vZRX7X2HIUIFrTTuKGNUV2cA3hcQ2i13fWJuRXEpwOckulPx_IAPe4dJ4igJnJTa5zh1Z-Rk5GzDc3hpKFaMLNssiEEJeHBS38xMwj0/s1600/IRCbasedmodel.PNG" height="470" width="640" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">IRC Based Model</td></tr>
</tbody></table>
<br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">The advantage of this model is that the attacker can use
legitimate IRC port to easily connect himself to agents and initiate the
attack. Also, huge amount of traffic on IRC network makes it difficult for the
network administrator to trace the presence of attacker on the server.<o:p></o:p></span><br />
<br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Tools for DDoS Attacks<o:p></o:p></span></b><br />
<br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">The following are some of the popular tools used in performing
DDoS attacks:<o:p></o:p></span><br />
<br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">1. Trinoo<o:p></o:p></span></b><br />
<br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Trinoo </span></b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">is a popular tool for DDoS attacks
that has a record of taking down large sites like Yahoo! It is designed to
cause coordinated DDoS attacks on the target from different locations. This
tool basically uses the “remote buffer overrun” vulnerability of systems to get
installed and later use them as zombies.<o:p></o:p></span><br />
<br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">2. DDoSim<o:p></o:p></span></b><br />
<br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">DDoSim </span></b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">also known as <i>Layer 7 DDoS
simulator </i>is an excellent tool to carry out DDoS attack on the target by
simulating several zombies. These zombies create full TCP connection to the
target using random IP addresses. It can also perform HTTP based DDoS attacks
with both valid and invalid requests.<o:p></o:p></span><br />
<br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">3. Tor’s Hammer<o:p></o:p></span></b><br />
<br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">This is another nice DDoS tool written in Python. It is a highly
effective tool that has the capability to take down machines running Apache and
IIS servers in a very short time.<o:p></o:p></span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">The advantage of this tool is that it has the ability to run
through a TOR network (anonymous network) to keep the whole attack
unidentified.<o:p></o:p></span><br />
<br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">4. Davoset<o:p></o:p></span></b><br />
<br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Davoset </span></b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">is yet another impressive tool for
performing DDoS attacks. It makes use of the “abuse of functionality”
vulnerability on sites to use them as zombies and cause DDoS attacks on the
target.<o:p></o:p></span><br />
<br />
<br />
<br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">COUNTERMEASURES<o:p></o:p></span></b><br />
<br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">After exploring a fair amount of information about different
types DoS attacks, their mechanism and various tools used in performing them,
let us now look at some of the countermeasures that one can take to stop or
mitigate such attacks from happening on your systems.<o:p></o:p></span><br />
<div style="margin-left: .5in; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<br /></div>
<div style="margin-left: .5in; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<br /></div>
<div style="margin-left: .5in; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<!--[if !supportLists]--><span style="color: #073763; font-family: Symbol; font-size: 16.0pt; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Using
an <b>IDS </b>(Intrusion Detection System) and <b>IPS </b>(Intrusion prevention
System) can be of a great advantage when it comes to detection and prevention
of DoS/DDoS attacks at an early stage.<o:p></o:p></span></div>
<br />
<div style="margin-left: .5in; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<!--[if !supportLists]--><span style="color: #073763; font-family: Symbol; font-size: 16.0pt; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Blacklist
IP addresses that are found to be the source of a possible DoS attack. <b>Ingress
Filtering: </b>Make sure that the incoming packets are coming from a valid
source.<o:p></o:p></span></div>
<br />
<div style="margin-left: .5in; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<!--[if !supportLists]--><span style="color: #073763; font-family: Symbol; font-size: 16.0pt; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Egress
Filtering: </span></b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Scan all the outgoing packets for malicious data before they
actually leave the network.<o:p></o:p></span></div>
<br />
<div style="margin-left: .5in; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<!--[if !supportLists]--><span style="color: #073763; font-family: Symbol; font-size: 16.0pt; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Since
it is possible to easily spoof the IP address of incoming DDoS packets, there
is a good chance that the packets will not represent a valid source. So,
configure the firewall to drop packets that do not represent a valid source
address.<o:p></o:p></span></div>
<br />
<div style="margin-left: .5in; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<!--[if !supportLists]--><span style="color: #073763; font-family: Symbol; font-size: 16.0pt; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Place
a firewall or packet sniffer that filters out all incoming traffic that does
not have an originating IP address.<o:p></o:p></span></div>
<br />
<div style="margin-left: .5in; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<!--[if !supportLists]--><span style="color: #073763; font-family: Symbol; font-size: 16.0pt; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Increase
the available bandwidth or resources to prevent the services from going down
quickly during an attack.<o:p></o:p></span></div>
<br />
<div style="margin-left: .5in; mso-list: l0 level1 lfo1; text-indent: -.25in;">
</div>
<div style="margin-bottom: .0001pt; margin-bottom: 0in; margin-left: .5in; margin-right: 0in; margin-top: 0in; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<!--[if !supportLists]--><span style="color: #073763; font-family: Symbol; font-size: 16.0pt; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Load
Balancing: </span></b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Use a multiple server architecture and balance the incoming load
on each server. This can help improve performance as well as mitigate the
effects of DDoS attacks.<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span></div>
</div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3078132662608425729.post-76593779828097051342015-04-21T07:04:00.001-07:002015-04-21T07:21:59.603-07:00Hacking Internet Users<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjoZqt1mWWbOdd6TAih9JdtGpPkbA64LkngDr9jPXRYGQTzAaysCTsf7TeEzl2tfZyRDjtFxa4X7olXEJ1SrALv7QqQ4RQwe4PhGN4NcYWPEb7PJSgs_OOYVOhCVal4_8Waz8je6T3VUFI/s1600/InternetUserHacking.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjoZqt1mWWbOdd6TAih9JdtGpPkbA64LkngDr9jPXRYGQTzAaysCTsf7TeEzl2tfZyRDjtFxa4X7olXEJ1SrALv7QqQ4RQwe4PhGN4NcYWPEb7PJSgs_OOYVOhCVal4_8Waz8je6T3VUFI/s1600/InternetUserHacking.png" height="346" width="640" /></a></div>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt; line-height: 107%; mso-ansi-language: EN-US; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: HI; mso-fareast-language: EN-US;"><br /></span>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Due to a rapid increase in the number of Internet users in the
recent years, malicious hackers have now started to target individual users for
their attack. Numerous client side vulnerabilities such as browser flaws and
lack of security awareness among the Internet users has made them an easy
target for hackers.<o:p></o:p></span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt; line-height: 107%; mso-ansi-language: EN-US; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: HI; mso-fareast-language: EN-US;"><br /></span>
<b><span style="color: #073763; font-family: 'Adobe Myungjo Std M', serif; font-size: x-large; line-height: 107%;">Objectives of Hacking Internet Users</span></b><br />
<b><span style="color: #073763; font-family: 'Adobe Myungjo Std M', serif; line-height: 107%;"><span style="font-size: large;"><br /></span></span></b>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Hackers target individual users for a wide variety of reasons as
mentioned below:<o:p></o:p></span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"> <o:p></o:p></span><br />
<div style="margin-left: .5in; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<!--[if !supportLists]--><span style="color: #073763; font-family: Symbol; font-size: 16.0pt; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">For
gaining access to confidential information such as credit cards details, bank
logins, account information etc.<o:p></o:p></span></div>
<br />
<div style="margin-left: .5in; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<!--[if !supportLists]--><span style="color: #073763; font-family: Symbol; font-size: 16.0pt; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">To
take control of user’s online accounts such as Email, Facebook and other social
network accounts.<o:p></o:p></span></div>
<br />
<div style="margin-left: .5in; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<!--[if !supportLists]--><span style="color: #073763; font-family: Symbol; font-size: 16.0pt; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">To
earn advertising revenue by forcefully driving users to online advertisements
such as banners and pop-ups.<o:p></o:p></span></div>
<br />
<div style="margin-left: .5in; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<!--[if !supportLists]--><span style="color: #073763; font-family: Symbol; font-size: 16.0pt; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">To
use individual users for attacking other systems such as causing a DDoS attack.<o:p></o:p></span></div>
<br />
<br />
<div style="margin-left: .5in; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<!--[if !supportLists]--><span style="color: #073763; font-family: Symbol; font-size: 16.0pt; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Sometimes
even for fun or to show-off talent among the hacker’s community.<o:p></o:p></span></div>
<div style="margin-left: .5in; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span></div>
<b><span style="color: #073763; font-family: 'Adobe Myungjo Std M', serif;"><span style="font-size: x-large;">COMMON HACKING TECHNIQUES</span><span style="font-size: 16pt;"><o:p></o:p></span></span></b><br />
<br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">The following are some of the popularly used techniques to hack
individual users on the Internet:<o:p></o:p></span><br />
<br />
<b><span style="color: #073763; font-family: 'Adobe Myungjo Std M', serif;"><span style="font-size: x-large;">Session Hijacking (Cookie Hijacking)</span><span style="font-size: 16pt;"><o:p></o:p></span></span></b><br />
<br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Since web pages have no memories, they have to use a means to
identify and authenticate individual users accessing web pages. Especially when
people are accessing restricted pages or secure area which require password
authentication, the website needs a means to remember users individually after
their successful logins. For example, when people log into their Facebook account
(by entering password), they may access several different pages until they
finally sign out. It would be impractical to ask users to re-enter password
each time they access a different page.<o:p></o:p></span><br />
<br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Session Cookies<o:p></o:p></span></b><br />
<br />
<div style="margin-left: .5in; mso-list: l0 level1 lfo1; text-indent: -.25in;">
</div>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Therefore, in order to remember individual users, websites store
a small file called <b>session cookie </b>on the client side (in the user’s
browser) which contains unique authentication<b> </b>information about the
user’s active session. These cookies help identify individual users<b> </b>throughout
the website. When the user hits the log out button or closes the browser, the<b>
</b>session is said to expire.<b><o:p></o:p></b></span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">So, when a hacker manages to steal the cookies of an active
session he may inject them to his browser to gain unauthorized to any online
account such as emails, social media accounts and so on. This technique is
known as <b>session hijacking </b>(also referred to as <b>cookie hijacking </b>or
<b>cookie stealing</b>).<o:p></o:p></span><br />
<br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Session Hijacking Demo<o:p></o:p></span></b><br />
<br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Below is a demonstration of typical session hijacking performed
on a sample Facebook account. Here the hacker may use different techniques such
as <i>cross-site scripting (XSS) </i>or <i>packet sniffing </i>to steal the
target user’s session cookies.<o:p></o:p></span><br />
<br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Even though Facebook stores several cookies in the browser after
successful login, there are only two important cookies that contains
authentication data to decide an active session. The names of these two cookies
are as follows:<o:p></o:p></span><br />
<br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">1. <b>c_user<o:p></o:p></b></span><br />
<br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">2. <b>xs<o:p></o:p></b></span><br />
<br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt; line-height: 107%; mso-ansi-language: EN-US; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: HI; mso-fareast-language: EN-US;">In order to hijack an active
session, one has to gain access to the contents of the above two cookies.
Snapshots of the sample data contained in these two cookies are shown below:</span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt; line-height: 107%; mso-ansi-language: EN-US; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: HI; mso-fareast-language: EN-US;"><br /></span>
<br />
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhsHzjRDFvaFNsnUbBuz88io4Qn4o8l69OumJ_Yne_yGttzB6fuzSHNUcp-z5i8VMnJO__0VbMtYHYBQZGYwf8WNkEjp2iLr_9maujiq5oQYNpcbc1IemNFHZdI1qE28dA9yAuOEb9Sa4M/s1600/cookies_c_user.PNG" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhsHzjRDFvaFNsnUbBuz88io4Qn4o8l69OumJ_Yne_yGttzB6fuzSHNUcp-z5i8VMnJO__0VbMtYHYBQZGYwf8WNkEjp2iLr_9maujiq5oQYNpcbc1IemNFHZdI1qE28dA9yAuOEb9Sa4M/s1600/cookies_c_user.PNG" height="360" width="640" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">c_user</td></tr>
</tbody></table>
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi4EROhH4Mq7ndV4s-ZwsknYK9_s67kpOt6o5HqVaTfcBfvH5MfWyC-nFitYjGpui_vI7FSckMb99JkxQW4etmYnrp1YQ5m3qeiJVkvsZpI8iiBe09RwOYnuW4GfP015BUecoi90dB8S9U/s1600/cookies_xs.PNG" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi4EROhH4Mq7ndV4s-ZwsknYK9_s67kpOt6o5HqVaTfcBfvH5MfWyC-nFitYjGpui_vI7FSckMb99JkxQW4etmYnrp1YQ5m3qeiJVkvsZpI8iiBe09RwOYnuW4GfP015BUecoi90dB8S9U/s1600/cookies_xs.PNG" height="358" width="640" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">xs</td></tr>
</tbody></table>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt; line-height: 107%; mso-ansi-language: EN-US; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: HI; mso-fareast-language: EN-US;"><br /></span>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Once you have access to the contents of the above two session
cookies “<b>c_user” </b>and “<b>xs” </b>it is time to inject them to your
browser and gain access to the target user’s Facebook<b> </b>account. A Firefox
extension called “<b>Advanced Cookie Manager</b>” makes this job a lot<b> </b>simpler.
It provides an option to add and edit cookies stored on Firefox. Here is a
step-bystep<b> </b>instruction to inject cookie to Firefox browser:<b><o:p></o:p></b></span><br />
<br />
<div style="margin-left: .5in; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<!--[if !supportLists]--><span style="color: #073763; font-family: Symbol; font-size: 16.0pt; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Install
the add-on <b>Advanced Cookie Manager </b>to your Firefox browser and open it
by clicking the icon present in the toolbar.<o:p></o:p></span></div>
<br />
<div style="margin-left: .5in; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<!--[if !supportLists]--><span style="color: #073763; font-family: Symbol; font-size: 16.0pt; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Switch
to the “Manage Cookies” tab and click on the “Add Cookies” button.<o:p></o:p></span></div>
<br />
<br />
<div style="margin-left: .5in; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<!--[if !supportLists]--><span style="color: #073763; font-family: Symbol; font-size: 16.0pt; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">To
create the “<b>c_user</b>” cookie fill in all the details exactly as shown in
the below snapshot expect for the “Value” field which has to be replaced by the
content from the hijacked cookie. Once you are done click on “Add” button.<o:p></o:p></span></div>
<div style="margin-left: .5in; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg7-Wj44luEsQ3Vwg4-4Ha4jpyfU2BU-2NttQRxweY53PIvbk9os0NQeIiK7JcIdL2oLEO7rgiwnz_gQZY9Vr0IYNERuiLcKeU1f-RZcmBR_zoLxoR4GGA4yCUbtYad4RJhF3g_SOP1htI/s1600/AdvanceCookiesManager_AddCookies.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg7-Wj44luEsQ3Vwg4-4Ha4jpyfU2BU-2NttQRxweY53PIvbk9os0NQeIiK7JcIdL2oLEO7rgiwnz_gQZY9Vr0IYNERuiLcKeU1f-RZcmBR_zoLxoR4GGA4yCUbtYad4RJhF3g_SOP1htI/s1600/AdvanceCookiesManager_AddCookies.PNG" height="352" width="640" /></a></div>
<div style="margin-left: .5in; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span></div>
<br />
<div style="margin-left: .5in; mso-list: l0 level1 lfo1; text-indent: -.25in;">
</div>
<div style="margin-left: .5in; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<!--[if !supportLists]--><span style="color: #073763; font-family: Symbol; font-size: 16.0pt; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Again
click on “Add Cookie” button to create the cookie “<b>xs</b>” in the same way.
After filling the details as shown below click on “Add” button. Do not forget
to replace the “Value” field with the content from your hijacked “xs” cookie:<o:p></o:p></span></div>
<div style="margin-left: .5in; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span></div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div style="margin-left: .5in; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhbyozolHUNpIfE8RGWYqcWqVauAzt6cZ96RhLN7L47-CZUijSP20rdiVKMouYfaIQ89NSrEtZg7OarH34ZR20j-DtVSWDZscBQXLlxdoWQ0ZRq9DslESM8DMJKO3OpWHzFkKxRbVlnn5o/s1600/AdvanceCookiesManager_xs.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhbyozolHUNpIfE8RGWYqcWqVauAzt6cZ96RhLN7L47-CZUijSP20rdiVKMouYfaIQ89NSrEtZg7OarH34ZR20j-DtVSWDZscBQXLlxdoWQ0ZRq9DslESM8DMJKO3OpWHzFkKxRbVlnn5o/s1600/AdvanceCookiesManager_xs.PNG" height="352" width="640" /></a></div>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span></div>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Once you are logged, you can access the account as long as the target
user’s session is active. That means, you can access the account in parallel
from your own computer until the user hits “Log Out” button on his/her
computer.<o:p></o:p></span><br />
<br />
<br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Session Hijacking Countermeasures</span></b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><o:p></o:p></span><br />
<br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">The following are some of the countermeasures to prevent session
hijacking on your computer:<o:p></o:p></span><br />
<br />
<div style="margin-left: .5in; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<!--[if !supportLists]--><span style="color: #073763; font-family: Symbol; font-size: 16.0pt; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Use
encryption standards such as SSL (HTTPS) to prevent cookie hijacks via packet
sniffing.<o:p></o:p></span></div>
<br />
<div style="margin-left: .5in; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<!--[if !supportLists]--><span style="color: #073763; font-family: Symbol; font-size: 16.0pt; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Use
an up-to-date browser program to prevent browser exploits.<o:p></o:p></span></div>
<br />
<div style="margin-left: .5in; mso-list: l0 level1 lfo1; text-indent: -.25in;">
</div>
<div style="margin-left: .5in; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<!--[if !supportLists]--><span style="color: #073763; font-family: Symbol; font-size: 16.0pt; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Configure
browser to stop running unverified scripts and also avoid using browser
plug-ins from untrusted sources.<o:p></o:p></span></div>
<div style="margin-left: .5in; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span></div>
<b><span style="color: #073763; font-family: 'Adobe Myungjo Std M', serif;"><span style="font-size: x-large;">Email Hacking</span><span style="font-size: 16pt;"><o:p></o:p></span></span></b><br />
<br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Email hacking is one of the prevailing hot topics in the field
of ethical hacking. A hacker can gain access to a wide variety of private
information about the target user if he manager to hack his/her email account.
Some of the possible ways to hack email accounts are discussed below.<o:p></o:p></span><br />
<br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Keylogging<o:p></o:p></span></b><br />
<br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Using a spyware program such as keylogger is the easiest way to
hack an email or any other online account password. All you need to do is just
install the keylogger program on the computer where the target user is likely
to access his/her email account from. These spyware programs are designed to
operate in a total stealth mode and hence remains completely hidden from normal
users. Once the keystrokes are recorded you can unlock the program using a hot
key combination or password to view the logs. The logs contain all the
keystrokes typed on the computer keyboard including the usernames and
passwords.<o:p></o:p></span><br />
<br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Modern keylogger programs like <b><a href="http://www.spytech-web.com/realtime-spy.shtml">Realtime-Spy</a></b>, <b><a href="http://www.spytech-web.com/spyagent.shtml">SpyAgent</a> </b>and <b><a href="http://www.sniperspy.com/">SniperSpy</a> </b>supports remote monitoring
feature where you can view the logs even from a remote location.<o:p></o:p></span><br />
<br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Some of them also have a feature to send logs through email and
FTP.<o:p></o:p></span><br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Even though keyloggers can make the hacking process a lot
simpler, they have a few drawbacks. Most of these programs have to be installed
manually on the target computer for which you need to have physical access to
it. Also, there is a chance of anti-spyware programs detecting and deleting the
keylogger installation on the computer.<o:p></o:p></span><br />
<br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Phishing<o:p></o:p></span></b><br />
<br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Phishing is another popular and highly effective technique used
by attackers to hack email and other online accounts. Most Internet users would
easily fall prey and become victims to this type of attack. However, to device
a phishing attack, one has to have at least a basic knowledge of HTML and
programming.<o:p></o:p></span><br />
<br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Steps Involved in Phishing Attack:<o:p></o:p></span><br />
<br />
<div style="margin-left: .5in; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<!--[if !supportLists]--><span style="color: #073763; font-family: Symbol; font-size: 16.0pt; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">The
hacker first creates a replica of the target login page such as Gmail, Yahoo!
Or any other online account.<o:p></o:p></span></div>
<br />
<div style="margin-left: .5in; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<!--[if !supportLists]--><span style="color: #073763; font-family: Symbol; font-size: 16.0pt; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">This
page is designed to submit all login information (username and password) on the
form fields to a local database instead of the actual website. Hacker would use
a scripting language such as PHP and a database such as MySQL to accomplish
this.<o:p></o:p></span></div>
<br />
<div style="margin-left: .5in; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<!--[if !supportLists]--><span style="color: #073763; font-family: Symbol; font-size: 16.0pt; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Once
the page is integrated to the script and database, the hacker uploads the whole
setup to a hosting server so as to make the phishing page go online.<o:p></o:p></span></div>
<br />
<div style="margin-left: .5in; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<!--[if !supportLists]--><span style="color: #073763; font-family: Symbol; font-size: 16.0pt; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">The
hacker chooses a matching domain (such as <i>gamil.com</i>, <i>gmail-account.com</i>,
<i>yahoo-mail.com </i>etc.) for his phishing page so as to avoid any suspicion.<o:p></o:p></span></div>
<br />
<div style="margin-left: .5in; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<!--[if !supportLists]--><span style="color: #073763; font-family: Symbol; font-size: 16.0pt; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Once
the phishing page is live and working, the hacker drives people to this
phishing page by spreading the phishing link via email, Internet Messenger and
forums.<o:p></o:p></span></div>
<br />
<div style="margin-left: .5in; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<!--[if !supportLists]--><span style="color: #073763; font-family: Symbol; font-size: 16.0pt; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Since
phishing pages look exactly the same as the real one, people enter their login
details on these pages where they are stolen away and gets stored in the
hacker’s database.<o:p></o:p></span></div>
<br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Session Hijacking<o:p></o:p></span></b><br />
<br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">As discussed earlier, it is possible to gain access to an email
account through session hijacking. By stealing the cookies of an active session
and injecting them to one’s own browser, it is possible to gain access to the
target email account. However, if the target user closes his/her ongoing
session by logging out, you will no longer be able to access the account. Also,
unlike keylogging and phishing, this method does not grant you the password of
the target account and hence you will not be able to re-access it at a later
time.<o:p></o:p></span><br />
<br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Unlocking Stored Passwords<o:p></o:p></span></b><br />
<br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Most users prefer to store the password details of email and
other online accounts in the browser to enable speedy access. Sometimes login
details of offline email clients such as Outlook are also stored on the computer.
This makes them vulnerable to hackers. <b><a href="http://www.nirsoft.net/password_recovery_tools.html">Nirsoft</a></b> provides
a handful of free tools to recover such stored passwords on Windows. You can download
the tools from the link provided below:<o:p></o:p></span><br />
<br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Download: <a href="http://www.nirsoft.net/password_recovery_tools.html">http://www.nirsoft.net/password_recovery_tools.html</a><o:p></o:p></span></b><br />
<br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Email Hacking Countermeasures<o:p></o:p></span></b><br />
<br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Below are some of the countermeasures that you can adopt to
prevent your email and other online accounts from getting hacked:<o:p></o:p></span><br />
<br />
<div style="margin-left: .5in; mso-list: l2 level1 lfo3; text-indent: -.25in;">
<!--[if !supportLists]--><span style="color: #073763; font-family: Symbol; font-size: 16.0pt; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Install
a good antivirus and anti-spyware program on your computer and keep them up-to-date.<o:p></o:p></span></div>
<br />
<div style="margin-left: .5in; mso-list: l2 level1 lfo3; text-indent: -.25in;">
<!--[if !supportLists]--><span style="color: #073763; font-family: Symbol; font-size: 16.0pt; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Password
protect your operating system so that no one can access your computer in your
absence.<o:p></o:p></span></div>
<br />
<div style="margin-left: .5in; mso-list: l2 level1 lfo3; text-indent: -.25in;">
<!--[if !supportLists]--><span style="color: #073763; font-family: Symbol; font-size: 16.0pt; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Always
perform a malware scan on programs before installing them.<o:p></o:p></span></div>
<br />
<div style="margin-left: .5in; mso-list: l2 level1 lfo3; text-indent: -.25in;">
<!--[if !supportLists]--><span style="color: #073763; font-family: Symbol; font-size: 16.0pt; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Avoid
accessing your accounts in public places such as cyber cafes.<o:p></o:p></span></div>
<br />
<div style="margin-left: .5in; mso-list: l2 level1 lfo3; text-indent: -.25in;">
<!--[if !supportLists]--><span style="color: #073763; font-family: Symbol; font-size: 16.0pt; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Make
sure that HTTPS is on when you are accessing your emails.<o:p></o:p></span></div>
<br />
<div style="margin-left: .5in; mso-list: l2 level1 lfo3; text-indent: -.25in;">
<!--[if !supportLists]--><span style="color: #073763; font-family: Symbol; font-size: 16.0pt; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Do
not click on the links in your email or forum to enter the login page. Instead always
type the URL of the website in the browser’s address bar and also make sure that
HTTPS is enabled on your login page.<o:p></o:p></span></div>
<br />
<div style="margin-left: .5in; mso-list: l2 level1 lfo3; text-indent: -.25in;">
<!--[if !supportLists]--><span style="color: #073763; font-family: Symbol; font-size: 16.0pt; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Avoid
storing your login details on the browser unless you are the only user on the computer.<o:p></o:p></span></div>
<br />
<b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif;"><span style="font-size: x-large;">Other Ways to Hack Internet Users</span><span style="font-size: 16pt;"><o:p></o:p></span></span></b><br />
<br />
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">The following are some of the other hacking methods that are
common in practice:<o:p></o:p></span><br />
<br />
<div style="margin-left: .5in; mso-list: l1 level1 lfo2; text-indent: -.25in;">
<!--[if !supportLists]--><span style="color: #073763; font-family: Symbol; font-size: 16.0pt; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">JavaScript:
</span></b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Since most client-side applications are written in JavaScript,
it also makes a wonderful tool for hackers to write malicious programs for
exploiting browser vulnerabilities. Due to lack of security awareness among
users, they can easily be fooled into entering sensitive information or
navigating to malicious websites. It can also be used to carry out other
attacks such as cross-site scripting and phishing.<o:p></o:p></span></div>
<br />
<div style="margin-left: .5in; mso-list: l1 level1 lfo2; text-indent: -.25in;">
<!--[if !supportLists]--><span style="color: #073763; font-family: Symbol; font-size: 16.0pt; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Malware:
</span></b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Using malware is another popular way of hacking Internet users.
Hackers make use of malware programs like virus and Trojan horses to accomplish
their task by affecting large number of people. A popular example of such
attack is the use of “<b><a href="http://en.wikipedia.org/wiki/DNSChanger">DNSChanger</a></b>”
Trojan which affected millions of Internet users by hijacking their DNS
servers.<o:p></o:p></span></div>
<br />
<div style="margin-left: .5in; mso-list: l0 level1 lfo1; text-indent: -.25in;">
</div>
<div style="margin-left: .5in; mso-list: l1 level1 lfo2; text-indent: -.25in;">
<!--[if !supportLists]--><span style="color: #073763; font-family: Symbol; font-size: 16.0pt; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Instant
Messaging: </span></b><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Attackers can also target IM users by sending them unsolicited offers
in the form of files and links. This may mislead the users into installing malware
or navigating to malicious websites.<o:p></o:p></span></div>
</div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3078132662608425729.post-79282858912610353342015-04-16T14:35:00.000-07:002015-04-18T19:37:57.548-07:00Keyboard Shortcuts For Windows<div dir="ltr" style="text-align: left;" trbidi="on">
<div align="center" style="text-align: center;">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhQySN8clo9ynfNBm18VdY8FIzwo-4iv-7WrNttnYe14KyExYWRC2oS8qT8LWseZckixYKE_V47h2dEgmsNKq_qt5p5HmFFIPE1J-zFB4IIwk_FLDlxcG7Lj4rft_axWI8w2xe75QN4OmI/s1600/keyboardshortcutsforwindowspc.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhQySN8clo9ynfNBm18VdY8FIzwo-4iv-7WrNttnYe14KyExYWRC2oS8qT8LWseZckixYKE_V47h2dEgmsNKq_qt5p5HmFFIPE1J-zFB4IIwk_FLDlxcG7Lj4rft_axWI8w2xe75QN4OmI/s1600/keyboardshortcutsforwindowspc.png" height="374" width="640" /></a></div>
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><span id="goog_1538036422"></span><span id="goog_1538036423"></span> </span></div>
<div align="center" style="text-align: center;">
<b style="color: #073763; font-family: 'Adobe Myungjo Std M', serif;"><span style="font-size: x-large;">General Keyboard Shortcuts</span></b><br />
<br />
<span style="font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><span style="color: #3d85c6;">CTRL+C </span><span style="color: #073763;"><o:p></o:p></span></span></div>
<div align="center" style="text-align: center;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"> (Copy)<o:p></o:p></span></div>
<div align="center" style="text-align: center;">
<br /></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><span style="color: #3d85c6;">CTRL+X
</span><span style="color: #073763;"><o:p></o:p></span></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">(Cut)<o:p></o:p></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<br /></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><span style="color: #3d85c6;">CTRL+V
</span><span style="color: #073763;"><o:p></o:p></span></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">(Paste)<o:p></o:p></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<br /></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><span style="color: #3d85c6;">CTRL+Z
</span><span style="color: #073763;"><o:p></o:p></span></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">(Undo)<o:p></o:p></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<br /></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><span style="color: #3d85c6;">DELETE
</span><span style="color: #073763;"><o:p></o:p></span></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">(Delete)<o:p></o:p></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<br /></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><span style="color: #3d85c6;">SHIFT+DELETE
</span><span style="color: #073763;"><o:p></o:p></span></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">(Delete
the selected item permanently without placing the item in the Recycle Bin)<o:p></o:p></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<br /></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="color: #3d85c6; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">CTRL</span><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">
while dragging an item <o:p></o:p></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">(Copy
the selected item)<o:p></o:p></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<br /></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="color: #3d85c6; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">CTRL+SHIFT</span><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">
while dragging an item <o:p></o:p></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">(Create
a shortcut to the selected item)<o:p></o:p></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<br /></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><span style="color: #3d85c6;">F2
key </span><span style="color: #073763;"><o:p></o:p></span></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">(Rename
the selected item)<o:p></o:p></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<br /></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><span style="color: #3d85c6;">CTRL+RIGHT
ARROW </span><span style="color: #073763;"><o:p></o:p></span></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">(Move
the insertion point to the beginning of the next word)<o:p></o:p></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<br /></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><span style="color: #3d85c6;">CTRL+LEFT
ARROW </span><span style="color: #073763;"><o:p></o:p></span></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">(Move
the insertion point to the beginning of the previous word)<o:p></o:p></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<br /></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><span style="color: #3d85c6;">CTRL+DOWN
ARROW </span><span style="color: #073763;"><o:p></o:p></span></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">(Move
the insertion point to the beginning of the next paragraph)<o:p></o:p></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<br /></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><span style="color: #3d85c6;">CTRL+UP
ARROW </span><span style="color: #073763;"><o:p></o:p></span></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">(Move
the insertion point to the beginning of the previous paragraph)<o:p></o:p></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<br /></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="color: #3d85c6; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">CTRL+SHIFT</span><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">
with any of the arrow keys <o:p></o:p></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">(Highlight
a block of text)<o:p></o:p></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<br /></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="color: #3d85c6; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">SHIFT</span><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">
with any of the arrow keys <o:p></o:p></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">(Select
more than one item in a window or on the desktop, or select text in a document)<o:p></o:p></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<br /></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><span style="color: #3d85c6;">CTRL+A
</span><span style="color: #073763;"><o:p></o:p></span></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">(Select
all)<o:p></o:p></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<br /></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><span style="color: #3d85c6;">F3
key </span><span style="color: #073763;"><o:p></o:p></span></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">(Search
for a file or a folder)<o:p></o:p></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<br /></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><span style="color: #3d85c6;">ALT+ENTER
</span><span style="color: #073763;"><o:p></o:p></span></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">(View
the properties for the selected item)<o:p></o:p></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<br /></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><span style="color: #3d85c6;">ALT+F4
</span><span style="color: #073763;"><o:p></o:p></span></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">(Close
the active item, or quit the active program)<o:p></o:p></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<br /></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><span style="color: #3d85c6;">ALT+ENTER
</span><span style="color: #073763;"><o:p></o:p></span></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">(Display
the properties of the selected object)<o:p></o:p></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<br /></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><span style="color: #3d85c6;">ALT+SPACEBAR
</span><span style="color: #073763;"><o:p></o:p></span></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">(Open
the shortcut menu for the active window)<o:p></o:p></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<br /></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><span style="color: #3d85c6;">CTRL+F4
</span><span style="color: #073763;"><o:p></o:p></span></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">(Close
the active document in programs that enable you to have multiple documents open
simultaneously)<o:p></o:p></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<br /></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><span style="color: #3d85c6;">ALT+TAB
</span><span style="color: #073763;"><o:p></o:p></span></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">(Switch
between the open items)<o:p></o:p></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<br /></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><span style="color: #3d85c6;">ALT+ESC
</span><span style="color: #073763;"><o:p></o:p></span></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">(Cycle
through items in the order that they had been opened)<o:p></o:p></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<br /></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><span style="color: #3d85c6;">F6
key </span><span style="color: #073763;"><o:p></o:p></span></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">(Cycle
through the screen elements in a window or on the desktop)<o:p></o:p></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<br /></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><span style="color: #3d85c6;">F4
key </span><span style="color: #073763;"><o:p></o:p></span></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">(Display
the Address bar list in My Computer or Windows Explorer)<o:p></o:p></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<br /></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><span style="color: #3d85c6;">SHIFT+F10
</span><span style="color: #073763;"><o:p></o:p></span></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">(Display
the shortcut menu for the selected item)<o:p></o:p></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<br /></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><span style="color: #3d85c6;">ALT+SPACEBAR
</span><span style="color: #073763;"><o:p></o:p></span></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">(Display
the System menu for the active window)<o:p></o:p></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<br /></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><span style="color: #3d85c6;">CTRL+ ESC
</span><span style="color: #073763;"><o:p></o:p></span></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">(Display
the Start menu)<o:p></o:p></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<br /></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="color: #3d85c6; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">ALT + </span><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">Underlined
letter in a menu nam</span><span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">e <o:p></o:p></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">(Display
the corresponding menu)<o:p></o:p></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<br /></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><span style="color: #3d85c6;">F10
key </span><span style="color: #073763;"><o:p></o:p></span></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">(Activate
the menu bar in the active program)<o:p></o:p></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<br /></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><span style="color: #3d85c6;">RIGHT
ARROW </span><span style="color: #073763;"><o:p></o:p></span></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">(Open
the next menu to the right, or open a submenu)<o:p></o:p></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<br /></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><span style="color: #3d85c6;">LEFT
ARROW </span><span style="color: #073763;"><o:p></o:p></span></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">(Open
the next menu to the left, or close a submenu)<o:p></o:p></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<br /></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><span style="color: #3d85c6;">F5
key </span><span style="color: #073763;"><o:p></o:p></span></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">(Update
the active window)<o:p></o:p></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<br /></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><span style="color: #3d85c6;">BACKSPACE
</span><span style="color: #073763;"><o:p></o:p></span></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">(View
the folder one level up in My Computer or Windows Explorer)<o:p></o:p></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<br /></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><span style="color: #3d85c6;">ESC
</span><span style="color: #073763;"><o:p></o:p></span></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">(Cancel
the current task)<o:p></o:p></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<br /></div>
<div align="center" style="margin-bottom: .0001pt; margin-bottom: 0in; margin-left: .25in; margin-right: 0in; margin-top: 0in; text-align: center;">
<span style="font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><span style="color: #3d85c6;">CTRL+SHIFT+ESC
</span><span style="color: #073763;"><o:p></o:p></span></span></div>
<br />
<div align="center" style="margin-bottom: .0001pt; margin-bottom: 0in; margin-left: .25in; margin-right: 0in; margin-top: 0in; text-align: center;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">(Open
Task Manager)<o:p></o:p></span></div>
<div align="center" style="margin-bottom: .0001pt; margin-bottom: 0in; margin-left: .25in; margin-right: 0in; margin-top: 0in; text-align: center;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="color: #073763; font-family: 'Adobe Myungjo Std M', serif;"><b><span style="font-size: x-large;">Microsoft Natural Keyboard Shortcuts</span></b><span style="font-size: 16pt;"><o:p></o:p></span></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<br /></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><span style="color: #3d85c6;">Windows
Logo </span><span style="color: #073763;"><o:p></o:p></span></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">(Display
or hide the Start menu)<o:p></o:p></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<br /></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><span style="color: #3d85c6;">Windows
Logo+D </span><span style="color: #073763;"><o:p></o:p></span></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">(Display
the desktop)<o:p></o:p></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<br /></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><span style="color: #3d85c6;">Windows
Logo+M </span><span style="color: #073763;"><o:p></o:p></span></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">(Minimize
all of the windows)<o:p></o:p></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<br /></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><span style="color: #3d85c6;">Windows
Logo+SHIFT+M </span><span style="color: #073763;"><o:p></o:p></span></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">(Restore
the minimized windows)<o:p></o:p></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<br /></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><span style="color: #3d85c6;">Windows
Logo+E </span><span style="color: #073763;"><o:p></o:p></span></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">(Open
My Computer)<o:p></o:p></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<br /></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><span style="color: #3d85c6;">Windows
Logo+F </span><span style="color: #073763;"><o:p></o:p></span></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">(Search
for a file or a folder)<o:p></o:p></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<br /></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><span style="color: #3d85c6;">CTRL+Windows
Logo+F </span><span style="color: #073763;"><o:p></o:p></span></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">(Search
for computers)<o:p></o:p></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<br /></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><span style="color: #3d85c6;">Windows
Logo+F1 </span><span style="color: #073763;"><o:p></o:p></span></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">(Display
Windows Help)<o:p></o:p></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<br /></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><span style="color: #3d85c6;">Windows
Logo+ L </span><span style="color: #073763;"><o:p></o:p></span></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">(Lock
the keyboard)<o:p></o:p></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<br /></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><span style="color: #3d85c6;">Windows
Logo+R </span><span style="color: #073763;"><o:p></o:p></span></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">(Open
the Run dialog box)<o:p></o:p></span></div>
<div align="center" style="margin-left: .25in; text-align: center;">
<br /></div>
<div align="center" style="margin-bottom: .0001pt; margin-bottom: 0in; margin-left: .25in; margin-right: 0in; margin-top: 0in; text-align: center;">
<span style="font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><span style="color: #3d85c6;">Windows
Logo+U </span><span style="color: #073763;"><o:p></o:p></span></span></div>
<div align="center" style="margin-bottom: .0001pt; margin-bottom: 0in; margin-left: .25in; margin-right: 0in; margin-top: 0in; text-align: center;">
</div>
<div align="center" style="margin-bottom: .0001pt; margin-bottom: 0in; margin-left: .25in; margin-right: 0in; margin-top: 0in; text-align: center;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;">(Open
Utility Manager)<o:p></o:p></span></div>
<div align="center" style="margin-bottom: .0001pt; margin-bottom: 0in; margin-left: .25in; margin-right: 0in; margin-top: 0in; text-align: center;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span></div>
<div align="center" style="margin-bottom: .0001pt; margin-bottom: 0in; margin-left: .25in; margin-right: 0in; margin-top: 0in; text-align: center;">
<span style="color: #073763; font-family: "Adobe Myungjo Std M",serif; font-size: 16.0pt;"><br /></span></div>
</div>
Unknownnoreply@blogger.com1tag:blogger.com,1999:blog-3078132662608425729.post-28890895102742694182015-04-13T19:17:00.001-07:002015-04-13T19:19:59.442-07:00Hacking Windows<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgeZCTE9ML9O-q86G5rJrDTZU6ODx0IzoYD9QpxmbaPP2QK-3VG6RfwPOOWTH9hhn0svdhffd8oxRYlK0kqtjgD31XS2I2k6PBSTOwWX9JE-8seZNVO-9mvA1TBF_JUTwhcSnI8TkeTnVU/s1600/WindowsHacking.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgeZCTE9ML9O-q86G5rJrDTZU6ODx0IzoYD9QpxmbaPP2QK-3VG6RfwPOOWTH9hhn0svdhffd8oxRYlK0kqtjgD31XS2I2k6PBSTOwWX9JE-8seZNVO-9mvA1TBF_JUTwhcSnI8TkeTnVU/s1600/WindowsHacking.png" height="360" width="640" /></a></div>
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">Being
one of the most popular operating systems in the world, Windows has its
presence on almost every computer system today. So, in the field of ethical
hacking understanding the techniques to hack into Windows systems becomes highly
significant. Let us now look into some of these techniques using which you can
successfully manage to hack any<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">Windows
computer.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold; font-size: 16.5pt;">GAINING ACCESS TO THE SYSTEM<o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold; font-size: 16.5pt;"><br /></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">Gaining access to a password protected user account especially the
one with “administrator privileges” forms the key element in hacking Windows.
The following are the two important techniques using which you can gain access
to any protected account on Windows without actually knowing the password.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold; font-size: 16.5pt;">Resetting the Windows Password<o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;"><br /></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">If you wish to gain access to a Windows computer whose account is
password protected, resetting the password is an easy option. Windows stores
all its account information and encrypted passwords in a file called “SAM”. By
modifying the “SAM” file it is possible to reset the password of any user
account including that of the “administrator”. You can accomplish this task
using a small open-source tool known as </span><a href="http://pogostick.net/~pnh/ntpasswd/"><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">Offline
NT Password &</span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;"> </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">Registry
Editor</span></b></a><span style="font-family: LiberationSerif; font-size: 14.5pt;">. This utility works offline,
that means you need to shut down and boot up the target computer using a CD or
USB device such as thumb drive. The tool has the following features:<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoListParagraphCxSpFirst" style="margin-bottom: 0.0001pt; text-indent: -0.25in;">
<!--[if !supportLists]--><span style="font-family: Symbol; font-size: 14.5pt;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;">
</span></span><!--[endif]--><span style="font-family: LiberationSerif; font-size: 14.5pt;">You </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt;">do not </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt;">need to know the old password to set a new one.<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="margin-bottom: 0.0001pt; text-indent: -0.25in;">
<!--[if !supportLists]--><span style="font-family: Symbol; font-size: 14.5pt;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;">
</span></span><!--[endif]--><span style="font-family: LiberationSerif; font-size: 14.5pt;">This tool will allow you to </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt;">reset </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt;">the
password of any user account.<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpLast" style="margin-bottom: 0.0001pt; text-indent: -0.25in;">
<!--[if !supportLists]--><span style="font-family: Symbol; font-size: 14.5pt;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;">
</span></span><!--[endif]--><span style="font-family: LiberationSerif; font-size: 14.5pt;">This tool can also detect and
</span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt;">unlock </span></b><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt;">locked </span></i><span style="font-family: LiberationSerif; font-size: 14.5pt;">or </span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt;">disabled </span></i><span style="font-family: LiberationSerif; font-size: 14.5pt;">out user accounts.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">You can download the tool from the link below:<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold;">Download: </span></b><a href="http://pogostick.net/~pnh/ntpasswd/"><b><span style="font-family: LiberationSerif-Bold; mso-bidi-font-family: LiberationSerif-Bold; mso-bidi-font-size: 11.0pt;">http://pogostick.net/~pnh/ntpasswd/</span></b></a><b><span style="color: blue; font-family: LiberationSerif-Bold; mso-bidi-font-family: LiberationSerif-Bold; mso-bidi-font-size: 11.0pt;"><o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">Resources
to create a bootable CD and bootable USB device are available for download
separately. Both works similarly and is a matter of your convenience. However,
in this post I will give a demonstration of the USB version to reset the
existing password. To create a bootable USB drive, download and unzip the USB
version of the tool from the above link by following the simple instructions
given in the </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">readme.txt </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">file.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">Once
you have the bootable USB device in your hand, plug-in the device and boot from
it. Make sure that you have enabled the USB boot option and set the top boot
priority for your USB device in BIOS. Step-by-step instructions to complete the
password reset process is given below:<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiymMqvSO9MqnoHKUNun15odpYVdidYJpAcXn1YzSlCgw_tyBMxPpQ9QZmFJOMF_eABeTtgyuAh_yitXySCYmAIEgGSOI2BRvrgj13XDz6YrY0bIapge3RkxxbhJ7A3ZF-2-pBMKoc2x9Y/s1600/windowsresetpassword_menu.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiymMqvSO9MqnoHKUNun15odpYVdidYJpAcXn1YzSlCgw_tyBMxPpQ9QZmFJOMF_eABeTtgyuAh_yitXySCYmAIEgGSOI2BRvrgj13XDz6YrY0bIapge3RkxxbhJ7A3ZF-2-pBMKoc2x9Y/s1600/windowsresetpassword_menu.PNG" height="260" width="640" /></a></div>
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">Once
the tool is running from your USB device, you should see the screen similar to
the one shown above. Just follow the screen instructions and the tool will
automatically detect the partition on which the Windows is installed. Usually
the right options are preloaded in the square bracket as shown in the below
snapshot. So, just pressing </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">Enter </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">key
should work.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhsIqRnxWK7LBubVY5_bsKp1G22R0unBvz1TPqBWWxpGKoWoICT9soaVqYK6ypz1IJwbtqaMXxRX8Z9twDyLdnpTlp8LVCKFq8bGiVO-wAqQp8LJFtFNyH_DU8vQ6FmYxytDOYLfYZ6diQ/s1600/windowsresetpassword_options.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhsIqRnxWK7LBubVY5_bsKp1G22R0unBvz1TPqBWWxpGKoWoICT9soaVqYK6ypz1IJwbtqaMXxRX8Z9twDyLdnpTlp8LVCKFq8bGiVO-wAqQp8LJFtFNyH_DU8vQ6FmYxytDOYLfYZ6diQ/s1600/windowsresetpassword_options.PNG" height="147" width="640" /></a></div>
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">In the
next step, you will be asked to “select which part of the registry to load”.
You need to select the option-</span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">1 </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">that
is “Password rest [sam]” which is preloaded by default as shown below. So just
press </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">Enter </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">to
proceed.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg5AM_94oFbXuABNNKOgIiV809ej4eGDumead7jdMgQbfOlrcvtjuIEhIV4tBsHbyNYXSQ-yV8J2SKuAX5N96MhrbzGLuRS7B0U5o5k3iaeB8aphRynDAeqq2W3jvF1VjwljP4q9HYweYk/s1600/windowsresetpassword_sam.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg5AM_94oFbXuABNNKOgIiV809ej4eGDumead7jdMgQbfOlrcvtjuIEhIV4tBsHbyNYXSQ-yV8J2SKuAX5N96MhrbzGLuRS7B0U5o5k3iaeB8aphRynDAeqq2W3jvF1VjwljP4q9HYweYk/s1600/windowsresetpassword_sam.PNG" height="98" width="640" /></a></div>
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">In the
next step, select the option-</span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">1 </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">which
is “Edit user data and passwords” as shown below and hit </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">Enter</span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjnJsNQX0GsgedaXR_86u0GESrgAvKefrKzc9L6UUXsMkskyywn-IWmlhCKLrKUtEHKr2k5rbNy9EuqkZZk2IjpKFDszzkrHrt2Q3g-UvNJBoJa5M_pONBKmyMCgPUJFHR6fx6gvP2ZgRA/s1600/windowsresetpassword_edit.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjnJsNQX0GsgedaXR_86u0GESrgAvKefrKzc9L6UUXsMkskyywn-IWmlhCKLrKUtEHKr2k5rbNy9EuqkZZk2IjpKFDszzkrHrt2Q3g-UvNJBoJa5M_pONBKmyMCgPUJFHR6fx6gvP2ZgRA/s1600/windowsresetpassword_edit.PNG" height="130" width="640" /></a></div>
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">Now,
you should see a list of “Usernames” and their “Admin” status being displayed.
Select the user who has administrator privilege and hit </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">Enter</span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiV8z81URqEhgFARoXzKBPXRXHbbVL_ZLBYDG714ddflDhSHywa5YR6lSovRQ1b4E8_tr39Rp5nrqYG8NdGYzOJ5bt_r8lpiXHmDTPMnW75PCxfK3CH_ARM9dOREu-0GIaQOsnU7TvP9aU/s1600/windowsresetpassword_listofusernameandadmin.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiV8z81URqEhgFARoXzKBPXRXHbbVL_ZLBYDG714ddflDhSHywa5YR6lSovRQ1b4E8_tr39Rp5nrqYG8NdGYzOJ5bt_r8lpiXHmDTPMnW75PCxfK3CH_ARM9dOREu-0GIaQOsnU7TvP9aU/s1600/windowsresetpassword_listofusernameandadmin.PNG" height="118" width="640" /></a></div>
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">In the
next screen you will be asked to select from a list of options that you may
want to perform on the selected user. Here, just select the option-</span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">1 </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">which is “Clear (blank)
user password” and hit </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">Enter</span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgl2Infj36UZWC5bzoBV2g6C4sK0STQAkt27dg1kq1_a1Dmu_PDLHCvt790A1syr2qrCETXev_UDuF64z4t6TxVNsppKouKtogZaQC5uOQXC3mz7win8k1eizPzPAHwG14_k-X98Plk4gI/s1600/windowsresetpassword_clearpass.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgl2Infj36UZWC5bzoBV2g6C4sK0STQAkt27dg1kq1_a1Dmu_PDLHCvt790A1syr2qrCETXev_UDuF64z4t6TxVNsppKouKtogZaQC5uOQXC3mz7win8k1eizPzPAHwG14_k-X98Plk4gI/s1600/windowsresetpassword_clearpass.PNG" height="88" width="640" /></a></div>
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">This
should reset the password for the user account to make it go blank, so that the
next time you reboot your Windows you should be able to login automatically as
if there was no password set for that user account.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">Now
quit editing user by pressing </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">q </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">and
hit </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">Enter </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">until
you proceed to the screen where you will be asked to confirm “writing back
changes” to the SAM file. This step is very important where you need to press </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">y </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">and hit </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">Enter </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">as shown in
the snapshot below. If you accidentally press </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">Enter
</span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">keeping the default option which is </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">n</span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">, the reset process will
fail and the whole procedure will have to be repeated again from the beginning.
So, changing the default option from </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">n </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">to
</span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">y </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">before
pressing </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">Enter </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">is
very important.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidjrIlDbXZSWJ7aWWk2XjwHIXw74pOVz3IhWR864Uvkym_CCY01zAINpCN2f888e3yw5f_UoKrrpZlx83aliNbcP1jFayZ1iltS6gMn-7Rj5obmEE_jo07pG1vuquVQiYIxIAAGIPL2DU/s1600/windowsresetpassword_writesamfile.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidjrIlDbXZSWJ7aWWk2XjwHIXw74pOVz3IhWR864Uvkym_CCY01zAINpCN2f888e3yw5f_UoKrrpZlx83aliNbcP1jFayZ1iltS6gMn-7Rj5obmEE_jo07pG1vuquVQiYIxIAAGIPL2DU/s1600/windowsresetpassword_writesamfile.PNG" height="116" width="640" /></a></div>
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">This
will complete the reset process where the existing password will be removed and
set to blank. Disconnect the USB device and press </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">CTRL+ALT+DEL </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">to reboot the
computer. Now, the Windows should let you login to the system without insisting
to enter the password.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="color: #a60000; font-family: LiberationSerif-Bold; font-size: 16.5pt; mso-bidi-font-family: LiberationSerif-Bold;">Restoring the Password After Breach<o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">Resetting the password is a wonderful option to easily gain access
to the password protected accounts. However, this method has a clear drawback
as the password reset process is permanent. The administrator of the target
machine will easily come to know about the security breach as thereafter no
password will be asked during the login process. </span><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">To
overcome this drawback, we will have to device a means to restore everything
back to normal once the purpose of breach is completed. For this we will have
to take a backup of the original </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">SAM
</span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">file before modifying it in the password
reset process and safely restore it back to make everything look normal.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">The </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">SAM </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">file is located in the
drive where the Windows is installed (usually </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">C:</span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">)
under the following path: </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">\windows\system32\config</span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">.
You can easily access this location by booting up the computer from your live </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">Kali Linux </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">DVD. Once the
</span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">Kali </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">DVD
is loaded, doubleclick the “Computer Icon” present on the desktop to open up
the explorer window. Now, navigate to the above location to find the </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">SAM </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">file and back it up to a
different location such as a different drive or to your own USB device.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj7yXa9cOEgn3jz2soupSB_72joB6K9Q0UZyJwasaNHRWbPJW3hyBl66C0dzIfjtJUf6u1R2AXeqhD27JK4IaCWM8wrGaBDVnJIel0fiQeijaCGaLtTa0o2YmqnSVoSz8TaDPpEKQ9WSl4/s1600/kalilinuxsam.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj7yXa9cOEgn3jz2soupSB_72joB6K9Q0UZyJwasaNHRWbPJW3hyBl66C0dzIfjtJUf6u1R2AXeqhD27JK4IaCWM8wrGaBDVnJIel0fiQeijaCGaLtTa0o2YmqnSVoSz8TaDPpEKQ9WSl4/s1600/kalilinuxsam.PNG" height="342" width="640" /></a></div>
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">Now
reboot the system and perform the password reset process as discussed earlier.
Once you are done with your work, reboot the system again with </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">Kali </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">DVD and navigate to the
location of </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">SAM </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">file.
Rename the existing file to </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">SAM.OLD </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">and
restore the original </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">SAM </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">file
from the backup location. This should bring everything back to normal and avoid
suspicion.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold; font-size: 16.5pt;">Bypassing the Windows Authentication Process<o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">In the previous section we had discussed on how to reset the
password to gain access to the system. But there is another smart way to gain
access to the Windows system by silently bypassing the authentication process
itself. This is done by applying temporary changes to the Windows kernel on the
fly (while booting) to disable the authentication process. A tool called </span><a href="http://www.piotrbania.com/all/kon-boot/"><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">Kon-Boot</span></b></a><b><span style="color: blue; font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;"> </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt;">allows
you to accomplish this task. You can download it from the link below:<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">Kon-Boot </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">is a handy
tool that allows you to enter any password protected Windows user account
without having to enter the password during the log-in process. The tool allows
you to create a bootable CD or a USB drive. Once you boot the target computer
from this bootable device, it will virtually modify parts of Windows kernel to
load the operating system in a special mode where you will not be insisted to
enter the password. The advantage of this tool is that all the changes are
temporary and disappear after reboot, so that everything looks normal
thereafter and does not arouse suspicion of a possible security breach.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold; font-size: 16.5pt; mso-bidi-font-family: LiberationSerif-Bold;">DUMPING THE PASSWORD HASHES<o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">After
understanding some of the techniques to gain access to the system without
knowing the password, it is time to move on one step further and find out a
means to crack the actual password itself. If it is required to gain access to
the target system multiple times over a period, it is always a good idea to
unveil the password by cracking it so that you can easily login to the system
by entering the password thereby eliminating the need to reset the password
each time you want to gain access.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">Windows
user account passwords are converted into a cryptographic hash format called </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">NTLM (NT LAN MANAGER) </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">hash.
This </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">NTLM </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">hash
along with the user profile details is stored in a special file called </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">Security Accounts Manager </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">or
</span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">SAM</span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">.
The </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">SAM</span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">
file is further encrypted with the </span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Italic;">syskey
</span></i><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">which is stored in a file called </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">SYSTEM</span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">. Both </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">SAM </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">and </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">SYSTEM </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">are located
in the drive where the Windows in installed (usually C:) under the following
path: </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">\windows\system32\config</span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">In
order to crack the password, it is necessary to extract the </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">NTLM </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">hash and user accounts
details stored in the </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">SAM </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">file
from the target system which is known as dumping. The dumped details are
transferred to the hacker’s computer and the password is cracked using an
offline password cracking tool. The following are the two ways to dump password
hashes:<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="color: #a60000; font-family: LiberationSerif-Bold; font-size: 16.5pt; mso-bidi-font-family: LiberationSerif-Bold;">1. Dumping Hashes with Administrator Access<o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">If you have administrator access to the system on which you want
to dump password hashes, you can use a handy tool called </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt;">PWDUMP</span></b><span style="font-family: LiberationSerif; font-size: 14.5pt;">.
This is an open-source command-line tool to quickly dump password hashes onto a
text file. The tool can be downloaded from the link below:<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold;">PWDUMP: </span></b><a href="http://www.tarasco.org/security/pwdump_7/"><b><span style="font-family: LiberationSerif-Bold; mso-bidi-font-family: LiberationSerif-Bold; mso-bidi-font-size: 11.0pt;">http://www.tarasco.org/security/pwdump_7/</span></b></a><b><span style="color: blue; font-family: LiberationSerif-Bold; mso-bidi-font-family: LiberationSerif-Bold; mso-bidi-font-size: 11.0pt;"><o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">This is a very small tool which is less than a MB in size and can
be carried to the target location in a USB thumb drive. To dump the hashes,
just open the command prompt with administrator rights, navigate to the
location of the tool (PwDump7.exe) and run the following command:<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold;">PwDump7.exe >> </span></b><span style="font-family: LiberationSerif;">targetfilename.txt<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">As shown in the below snapshot, I am running the </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt;">PwDump.exe </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt;">from my USB thumb drive (</span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt;">M:</span></b><span style="font-family: LiberationSerif; font-size: 14.5pt;">) and dumping the hash
details in a file called </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt;">hash.txt</span></b><span style="font-family: LiberationSerif; font-size: 14.5pt;">. This file should get created in the same directory from which </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt;">PwDump.exe </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt;">is running.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjUYvMp6GhKSi3OT783CN2ijnc2d8SNn8X513OYc-yu61WjNHY5IPlofUdvi4CenbyIMooI2xwMyseYuszbJJwYGx6-H50cuuFpEqc0Qny2ywQNATKAK22s79RTM5tuQYu3VQ7jh7GJMWk/s1600/pwdumphash.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjUYvMp6GhKSi3OT783CN2ijnc2d8SNn8X513OYc-yu61WjNHY5IPlofUdvi4CenbyIMooI2xwMyseYuszbJJwYGx6-H50cuuFpEqc0Qny2ywQNATKAK22s79RTM5tuQYu3VQ7jh7GJMWk/s1600/pwdumphash.PNG" height="216" width="640" /></a></div>
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">The </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">hash.txt </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">file contains
a list of existing user accounts on the machine and their corresponding </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">NTLM </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">hashes as shown below:<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="color: #a60000; font-family: LiberationSerif-Bold; font-size: 16.5pt; mso-bidi-font-family: LiberationSerif-Bold;">2. Dumping Hashes without Administrator
Access<o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">The previous section shows how to dump password hashes when you
already have administrator access to the target machine. What if you do not
have administrator access?<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">In this case, you can use your </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt;">Kali Linux </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt;">Live DVD to
boot up the system and load the Linux. From here, access the drive on which the
Windows OS is installed and navigate to </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt;">\windows\system32\config\</span></b><span style="font-family: LiberationSerif; font-size: 14.5pt;">.
From here copy the two files </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt;">SAM </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt;">and </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt;">SYSTEM </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt;">on to your USB device so that you can carry them to your computer
for offline password cracking.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhF3YX8_2DzvYj2CFGuBcIvTPfWf3VUeHjRF5u6UFjEqNHrR5IxbgQqoTOCwKElEebC0G7aygNVnKkY3wPlPhJ4UOdYuFYJvu0pq60RtkaKXHNcsSiZIGYB4DqKu7iuQXitAxO2MvPlcK8/s1600/kalilinuxsamsystem.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhF3YX8_2DzvYj2CFGuBcIvTPfWf3VUeHjRF5u6UFjEqNHrR5IxbgQqoTOCwKElEebC0G7aygNVnKkY3wPlPhJ4UOdYuFYJvu0pq60RtkaKXHNcsSiZIGYB4DqKu7iuQXitAxO2MvPlcK8/s1600/kalilinuxsamsystem.PNG" height="448" width="640" /></a></div>
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<span style="font-family: LiberationSerif; font-size: 14.5pt; line-height: 107%; mso-ansi-language: EN-US; mso-bidi-font-family: LiberationSerif; mso-bidi-language: HI; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;"><br clear="all" style="mso-special-character: line-break; page-break-before: always;" />
</span>
<br />
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 16.5pt;">CRACKING THE WINDOWS PASSWORD<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">After successfully dumping the password hashes, we can now easily
crack those using different tools and approaches as mentioned below:<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold; font-size: 16.5pt;">Using Rainbow Tables<o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">As discussed in the previous chapter, a rainbow table contains a
list of pre-computed hashes that can be instantly compared against the dumped
password hash to crack the password. This is so far the best and the fasted
method to successfully crack the Windows password. For this we will use an
open-source tool called </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt;">Ophcrack
</span></b><span style="font-family: LiberationSerif; font-size: 14.5pt;">that can be downloaded from
the link below:<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold;">Ophcrack Website : </span></b><a href="http://ophcrack.sourceforge.net/"><b><span style="font-family: LiberationSerif-Bold; mso-bidi-font-family: LiberationSerif-Bold; mso-bidi-font-size: 11.0pt;">http://ophcrack.sourceforge.net/</span></b></a><b><span style="color: blue; font-family: LiberationSerif-Bold; mso-bidi-font-family: LiberationSerif-Bold; mso-bidi-font-size: 11.0pt;"><o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">From the above link, download the installable version of </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt;">Ophcrack </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt;">(not the Live CD version) and install it on your system. During
the installation process, when the option comes up to download rainbow tables,
uncheck them all and just install the program. It is always better to download
the rainbow tables separately.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">From
the above link, download the installable version of </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">Ophcrack </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">(not the Live
CD version) and install it on your system. During the installation process,
when the option comes up to download rainbow tables, uncheck them all and just
install the program. It is always better to download the rainbow tables
separately.<o:p></o:p></span><br />
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;"><br /></span>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj1Wn8gh9xcz9joeRW855MXtyoW7mk7h960gEaJpCiBIu4UmAyZTwuQdEkZtFLF8QaCqVQlvOQy3Bm6JejApNv-HcyUHWOX0eI3ljr1CLaNEB8q7qvMLc9fF6gwP8onNTtRaRqZ1PWRM4A/s1600/ophcrack.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj1Wn8gh9xcz9joeRW855MXtyoW7mk7h960gEaJpCiBIu4UmAyZTwuQdEkZtFLF8QaCqVQlvOQy3Bm6JejApNv-HcyUHWOX0eI3ljr1CLaNEB8q7qvMLc9fF6gwP8onNTtRaRqZ1PWRM4A/s1600/ophcrack.PNG" height="466" width="640" /></a></div>
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;"><br /></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">Once you have it installed on your system, go to the </span><a href="http://ophcrack.sourceforge.net/"><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">Ophcrack
website</span></b></a><b><span style="color: blue; font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;"> </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt;">from the above link and click on </span><a href="http://ophcrack.sourceforge.net/tables.php"><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">Tables</span></b></a><b><span style="color: blue; font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;"> </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt;">in
the navigation menu. Here you should see a list of rainbow tables you can
download.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">If you
want to crack the passwords of </span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Italic;">Windows
XP </span></i><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">and prior operating systems download the
tables from the </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">LM hashes </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">section.
For operating systems after XP such as </span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Italic;">Windows</span></i><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">
</span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Italic;">Vista</span></i><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">,
</span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Italic;">7 </span></i><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">and
</span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Italic;">8 </span></i><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">download
the tables from the </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">NT hashes </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">section.<o:p></o:p></span><br />
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;"><br /></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiqRemwVyqHgsSIT3BDZiaq-80cNr_PJTavht4BWtD8r2CggxVV0H2AQ-IeEFUVpKU9iFcXxPZ-WhamfvAMmyMT-j_upHp6dW3Afiy7tIS0HYonbLkIbWbqrAfg-bqO6IdOv0E6sVAD1pU/s1600/table_xprainbow.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiqRemwVyqHgsSIT3BDZiaq-80cNr_PJTavht4BWtD8r2CggxVV0H2AQ-IeEFUVpKU9iFcXxPZ-WhamfvAMmyMT-j_upHp6dW3Afiy7tIS0HYonbLkIbWbqrAfg-bqO6IdOv0E6sVAD1pU/s1600/table_xprainbow.PNG" height="578" width="640" /></a></div>
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhE9AqobxAfx0mwM3BUbo1qnfBLVZQBLrUUlHSl_qcV1wDYvHnnPRRbaXINs1ClerBuMHsFn_6jldw3IZRjMV98WnDtS2QOVmR3F896cCMDsK-L14Z-TL0-AIu9R6EcSemBX6EmZz8w-Nc/s1600/table_vistarainbow.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhE9AqobxAfx0mwM3BUbo1qnfBLVZQBLrUUlHSl_qcV1wDYvHnnPRRbaXINs1ClerBuMHsFn_6jldw3IZRjMV98WnDtS2QOVmR3F896cCMDsK-L14Z-TL0-AIu9R6EcSemBX6EmZz8w-Nc/s1600/table_vistarainbow.PNG" height="529" width="640" /></a></div>
<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh3qQ5Jk_xDzFslE0VAVAyNfCF0Au2mSmKbHQo-z7tU-7u6LV7buYMGNSSZ5ZNcNijKSxXWgZG0V1722z1UbN4bCtL9olDyii-8yM511qrkbIHh84Xo82KW4EvXywlGotB43xNWfc84YDU/s1600/table_vistarainbow2.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh3qQ5Jk_xDzFslE0VAVAyNfCF0Au2mSmKbHQo-z7tU-7u6LV7buYMGNSSZ5ZNcNijKSxXWgZG0V1722z1UbN4bCtL9olDyii-8yM511qrkbIHh84Xo82KW4EvXywlGotB43xNWfc84YDU/s1600/table_vistarainbow2.PNG" height="640" width="614" /></a></div>
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">As
shown in the above snapshots, as the character set increases the size of the
table grows bigger. Bigger the table higher the chance of successful cracking.
You can download the one that best matches your needs. For the purpose of
demonstration, I am using the “Vista proba free” table on my Windows 8 machine
with </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">Ophcrack</span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">.
Here is a step-by-step guide on how to use this tool to crack passwords.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoListParagraphCxSpFirst" style="margin-bottom: 0.0001pt; text-indent: -0.25in;">
<!--[if !supportLists]--><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif; mso-fareast-font-family: LiberationSerif;">1.<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">Open
the </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">Ophcrack </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">tool
by double-clicking the icon on the desktop.<o:p></o:p></span><br />
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;"><br /></span></div>
<div class="MsoListParagraphCxSpLast" style="margin-bottom: 0.0001pt; text-indent: -0.25in;">
<!--[if !supportLists]--><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif; mso-fareast-font-family: LiberationSerif;">2.<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">From
the main </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">Ophcrack </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">window,
click on “Tables” button and select the table that you have downloaded from the
list. Now click on “Install” button, load the folder that contains the
downloaded tables and click on “OK”.<o:p></o:p></span><br />
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;"><br /></span>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_6audwGIb-NTvZA-EDbj6Fz43TzeGy-s07J5RiBejt2GgJC6uc0Cb6bo9J0Bf3j78h2RcA-NVZOvWpNpzpxsvk7PxcjF47BX5jEtpL2Iwye03Plunpk8f_EWNNU5ov60saxfEqM2Gyc0/s1600/tableselection.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_6audwGIb-NTvZA-EDbj6Fz43TzeGy-s07J5RiBejt2GgJC6uc0Cb6bo9J0Bf3j78h2RcA-NVZOvWpNpzpxsvk7PxcjF47BX5jEtpL2Iwye03Plunpk8f_EWNNU5ov60saxfEqM2Gyc0/s1600/tableselection.PNG" height="416" width="640" /></a></div>
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;"><br /></span></div>
<div class="MsoListParagraph" style="margin: 0in 0in 0.0001pt 1in; text-indent: -0.25in;">
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
</div>
<div class="MsoListParagraph" style="margin-bottom: 0.0001pt; text-indent: -0.25in;">
<!--[if !supportLists]--><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif; mso-fareast-font-family: LiberationSerif;">3.<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">Next,
to load the dumped password hashes, click on “Load” button, select “PWDUMP
file” option and load the </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">hash.txt </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">file
obtained by running the PWDUMP tool on target machine. If you have </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">SAM </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">and </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">SYSTEM </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">files instead
of </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">hash.txt</span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">,
you can choose the option </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">Encrypted SAM </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">instead
of “PWDUMP file” and select the folder which contains those two files.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh4hvSZPpizNW7S-VvwS59oHjUUWuRrr7tTW4T5oVvVKPASJkv5OcG8EePI72OHkKpcGTvtw8Jee-E1RY_ntl0nSObjcXlCkSLmVz4lFqbr2NC23C5t5bHAaMxgZDX96nmaFbiGn4o7D3Q/s1600/ophcrackusers.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh4hvSZPpizNW7S-VvwS59oHjUUWuRrr7tTW4T5oVvVKPASJkv5OcG8EePI72OHkKpcGTvtw8Jee-E1RY_ntl0nSObjcXlCkSLmVz4lFqbr2NC23C5t5bHAaMxgZDX96nmaFbiGn4o7D3Q/s1600/ophcrackusers.PNG" height="338" width="640" /></a></div>
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoListParagraph" style="margin-bottom: 0.0001pt; text-indent: -0.25in;">
<!--[if !supportLists]--><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif; mso-fareast-font-family: LiberationSerif;">4.<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">When
everything is loaded and ready as shown in the above snapshot, click on “Crack”
button and site back patiently. The cracking process will take from anywhere between
few minutes to few hours to complete depending upon the size of the table and
strength of the password. If it is successful, the cracked password will be displayed
along with the time taken to crack as shown below</span><br />
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;"><br /></span>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjmPEFKYwWc0xmsjbTE8qUr5QqwzXYftiMf6WgCKPj8dGX1rYFoiMMNruLqPPf9TnKSmTvfCLFStiD4QQN_yCGOH6wOsTzkzZIOnwYHfGFb3J5LOqWgwUqveaEPp8Ka30OWDIB9BQr6I6A/s1600/ophcrackntpwd.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjmPEFKYwWc0xmsjbTE8qUr5QqwzXYftiMf6WgCKPj8dGX1rYFoiMMNruLqPPf9TnKSmTvfCLFStiD4QQN_yCGOH6wOsTzkzZIOnwYHfGFb3J5LOqWgwUqveaEPp8Ka30OWDIB9BQr6I6A/s1600/ophcrackntpwd.PNG" height="336" width="640" /></a></div>
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;"><br /></span></div>
<div class="MsoNormal" style="margin: 0in 0in 0.0001pt 1in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">If you
become unsuccessful in cracking the password, you may try a different rainbow
table that covers more characters and long passwords.<o:p></o:p></span><br />
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;"><br /></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold; font-size: 16.5pt; mso-bidi-font-family: LiberationSerif-Bold;">Using Brute-Force Approach<o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">Even
though using rainbow tables is by far the fastest and the best approach to
crack passwords, it may not be successful for long and strong passwords as hash
tables for such passwords are hard to find. So, brute-force approach becomes
inevitable under these situations. But remember it may take a very long time
ranging from a few hours to few days to complete the
cracking process. Since </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt;">Ophcrack </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt;">is not so
effective for the bruteforce</span><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;"> approach,
we will use another powerful tool called </span><a href="http://www.l0phtcrack.com/"><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">L0phtCrack</span></b></a><b><span style="color: blue; font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;"> </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt;">which
is available</span><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;"> from the link
below:<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold;">L0PhtCrack Download: </span></b><a href="http://www.l0phtcrack.com/download.html"><b><span style="font-family: LiberationSerif-Bold; mso-bidi-font-family: LiberationSerif-Bold; mso-bidi-font-size: 11.0pt;">http://www.l0phtcrack.com/download.html</span></b></a><b><span style="color: blue; font-family: LiberationSerif-Bold; mso-bidi-font-family: LiberationSerif-Bold; mso-bidi-font-size: 11.0pt;"><o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">After installing </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt;">L0phtCrack</span></b><span style="font-family: LiberationSerif; font-size: 14.5pt;">, Click on
“Import hashes” button from the main window to load the hashes. You have the
option to load the hashes from both the “PWDUMP file” as well as “SAM file”.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEii9s1D3w4Qyewv4PjaURywzFiaVT37AydTrUnoMlXGGt6-5ND273T6Fqm9Z2gZ79gfNflVaMbFkETIf4ZIOO8KJlui-EqkkKpJj62afCBUXB-OjhRUBX67h-stGBwM2aqkFiCx3rMdLT4/s1600/LOphtCrack.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEii9s1D3w4Qyewv4PjaURywzFiaVT37AydTrUnoMlXGGt6-5ND273T6Fqm9Z2gZ79gfNflVaMbFkETIf4ZIOO8KJlui-EqkkKpJj62afCBUXB-OjhRUBX67h-stGBwM2aqkFiCx3rMdLT4/s1600/LOphtCrack.PNG" height="406" width="640" /></a></div>
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">Click
on the “Session Options” button to further configure different auditing options
such as dictionary and brute-force attacks. You can enable or disable specific
attacks and also customize character set, password length and range options for
brute-force approach.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">Configuring
the auditing options wisely can avoid unnecessary time delay and thereby speed
up the password cracking process.<o:p></o:p></span><br />
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;"><br /></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">Once
you are done with loading the hashes and configuring the options, click on the
“Begin” button. This will initiate the cracking process and the time consumed
to crack the password depends on various factors like the password strength
(length + presence of alphanumeric + special characters), type of attack
(dictionary, hybrid or brute-force) and the speed of your computer.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">If the
password cracking process is successful you should see the cracked password
next to the user name in the </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">L0phtCrack
</span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">window as shown below:<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjR8WCziF5pUmIFyAOIqAxtqnEvJGY875fN0sI47EC0hMkucoJ6hOGm-Zc_5FPk02j3CvSt4B6DNuuvlV7ZRm6e-MOdtNRt8irKNTD-eKBFY-XcDo2_dJmsGGaS9HUungNjHj_m4iJN2Xk/s1600/LOphtCrack+Password+Auditor.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjR8WCziF5pUmIFyAOIqAxtqnEvJGY875fN0sI47EC0hMkucoJ6hOGm-Zc_5FPk02j3CvSt4B6DNuuvlV7ZRm6e-MOdtNRt8irKNTD-eKBFY-XcDo2_dJmsGGaS9HUungNjHj_m4iJN2Xk/s1600/LOphtCrack+Password+Auditor.PNG" height="406" width="640" /></a></div>
<br />
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="color: #a60000; font-family: LiberationSerif-Bold; font-size: 16.5pt; mso-bidi-font-family: LiberationSerif-Bold;">Sniffing Password Hashes on a Network<o:p></o:p></span></b><br />
<b><span style="color: #a60000; font-family: LiberationSerif-Bold; font-size: 16.5pt; mso-bidi-font-family: LiberationSerif-Bold;"><br /></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">If your computer is on a network such as office or school, it is
possible to remotely import the password hashes of other computers on the
network without the need to gain physical access to them. This method is called
sniffing and </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt;">L0phtCrack </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt;">6 and above supports this option.<o:p></o:p></span><br />
<span style="font-family: LiberationSerif; font-size: 14.5pt;"><br /></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">To sniff password hashes from other computers, just click on the “Import
From Sniffer” button on the main window. If more than one network interface is
detected, the “Select Network Interface” dialog box allows you to choose the
interface to sniff on. After choosing your interface, the “SMB Packet Capture
Output” dialog box appears where you need to click on “Start Sniffing”.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;"><br /></span>
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">If the
hashes are captured, they are immediately displayed in the dialog box after
which you can hit “Stop Sniffing” and click on “Import” button to load the
password hashes for cracking.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold; font-size: 16.5pt; mso-bidi-font-family: LiberationSerif-Bold;">COUNTERMEASURES<o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">In
order to secure your Windows computer from all those possible attacks as
mentioned in this chapter, the following are some of the countermeasures that
you need to follow:<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoListParagraphCxSpFirst" style="margin-bottom: 0.0001pt; text-indent: -0.25in;">
<!--[if !supportLists]--><span style="font-family: Symbol; font-size: 14.5pt; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;">
</span></span><!--[endif]--><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">Do not allow strangers to access your
computer during your absence.<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoListParagraphCxSpMiddle" style="margin-bottom: 0.0001pt; text-indent: -0.25in;">
<!--[if !supportLists]--><span style="font-family: Symbol; font-size: 14.5pt; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;">
</span></span><!--[endif]--><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">If the computer is on a public network
such as school or office, password protect those accounts with administrator
access and only give limited accounts to the users.<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoListParagraphCxSpMiddle" style="margin-bottom: 0.0001pt; text-indent: -0.25in;">
<!--[if !supportLists]--><span style="font-family: Symbol; font-size: 14.5pt; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;">
</span></span><!--[endif]--><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">Always use a strong password that is hard
to guess. Strong passwords contain a mix of alphanumeric and special characters
that are long enough to avoid rainbow table and brute-force approaches.<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoListParagraphCxSpMiddle" style="margin-bottom: 0.0001pt; text-indent: -0.25in;">
<!--[if !supportLists]--><span style="font-family: Symbol; font-size: 14.5pt; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;">
</span></span><!--[endif]--><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">Disable access to CD/DVD drives and USB
devices on public networks.<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoListParagraphCxSpMiddle" style="margin-bottom: 0.0001pt; text-indent: -0.25in;">
<!--[if !supportLists]--><span style="font-family: Symbol; font-size: 14.5pt; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;">
</span></span><!--[endif]--><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">Configure BIOS to disable booting from
USB, CD/DVD and other portable devices.<o:p></o:p></span><br />
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;"><br /></span></div>
<div class="MsoListParagraphCxSpLast" style="margin-bottom: 0.0001pt; text-indent: -0.25in;">
<!--[if !supportLists]--><span style="font-family: Symbol; font-size: 14.5pt; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;">
</span></span><!--[endif]--><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">Password protect your computer BIOS so
that it would not be possible for an attacker to modify its settings and gain
access.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<br />
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
</div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3078132662608425729.post-32001528923195410872015-04-12T17:33:00.000-07:002015-04-13T17:58:39.016-07:00Hacking Password<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi2mRKMxaSwFeRJewWiySyDGqMmLiNn7Ybu0FTIz4XUlDterzLQj39cnbw66M4lPfNxUBOhQl30wlx8awddsr4OuhiZu34Vfup4JnA5SSavu9IvsFjjXi1w-_HCCQSJWroPBbIwiRsI6C0/s1600/HackingPassword.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi2mRKMxaSwFeRJewWiySyDGqMmLiNn7Ybu0FTIz4XUlDterzLQj39cnbw66M4lPfNxUBOhQl30wlx8awddsr4OuhiZu34Vfup4JnA5SSavu9IvsFjjXi1w-_HCCQSJWroPBbIwiRsI6C0/s1600/HackingPassword.png" height="360" width="640" /></a></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;"><br /></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;"> Password hacking is one of the hottest and most widely discussed topics in the field of
computer hacking. In today’s world, passwords alone play a key role in deciding
the security of a web server or any other computer system. As a result, hacking
the password is one of the easiest and sometimes the only way to gain access to
the system. In this chapter, you will be introduced to various password hacking
techniques that are frequently used in the hacking industry.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">To
begin with, I will let you know some of the obvious, simple yet effective
techniques to hack passwords:<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-size: large;"><span style="font-family: LiberationSerif;">1. </span><b><span style="font-family: LiberationSerif-Bold;">Social Engineering</span></b></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;"><br /></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">This
type of technique involves psychological manipulation of people into performing
actions that lead to the disclosure of their confidential information. In other
words, social engineering is just a trick played by the hacker to gain the
trust of people so that they reveal the password by themselves.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">Scenario-1</span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">The hacker
may call the target person by pretending himself as a bank official and ask him
to confirm his password stating that this has to be done as a part of an
ongoing verification program. In most cases, the target person on the other end
believes this and reveals his password to the hacker.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">Scenario-2</span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">In order to
avoid suspicion, instead of directly asking the victim to reveal the password,
the hacker may obtain other vital information such as the “Date of Birth”,
“Place of Birth”, “High School Details” etc. from the target person. Using
these details, the hacker can easily reset the password and gain unauthorized
access.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">Even
though social engineering seems simple, it is proven that most people would
easily fall victim to this attack. Lack of awareness among people is the prime
reason for the success behind this trick.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-size: large;"><span style="font-family: LiberationSerif;">2. </span><b><span style="font-family: LiberationSerif-Bold;">Guessing</span></b></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;"><br /></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">As most
people are known to use easy to remember words such as their “pet’s name”,
“phone number”, “child’s name” etc. as their passwords, it is often possible
for the hacker to easily guess the password.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<br />
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-size: large;"><span style="font-family: LiberationSerif;">3. </span><b><span style="font-family: LiberationSerif-Bold;">Shoulder surfing</span></b></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;"><br /></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">It is the act
of spying on one’s keyboard from behind the shoulders as a person types his/her
password. This technique works well particularly in crowded areas such as cyber
cafes and ATMs where people are usually unaware of what is happening behind
their shoulders.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;"><br /></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold;"><span style="font-size: x-large;">Password Hacking</span></span></b><b><span style="font-family: LiberationSerif-Bold;"><span style="font-size: x-large;"> Methods</span><span style="font-size: 20.5pt;"><o:p></o:p></span></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">Now,
let us jump into some of the serious methods that hackers use to crack
passwords:<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold; font-size: 16.5pt;">DICTIONARY ATTACK<o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">A </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt;">dictionary attack </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt;">is a type of password cracking technique where a long list of
words from the dictionary is repeatedly tried against the target until the
right match is found. This technique can be used to crack passwords that
contain words found in the dictionary.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;"><br /></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">Generally, the success of a dictionary attack is based on the fact
that most people have a tendency to use easy to remember passwords that are
found in the dictionary. However, if one uses a strong password with a
combination of alphabets and numbers or introducing a slight variation to the
actual spelling would make it impossible for the dictionary attack to crack
such passwords.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;"><br /></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">One of my favorite tool to carry out the dictionary attack is </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt;">Brutus</span></b><span style="font-family: LiberationSerif; font-size: 14.5pt;">.
It is a remote online password cracker that works on Windows platform and can
be downloaded from the following link:<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold;"><br /></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold;">Brutus Download: </span></b><b><span style="font-family: LiberationSerif-Bold; mso-bidi-font-family: LiberationSerif-Bold; mso-bidi-font-size: 11.0pt;"><a href="http://www.hoobie.net/brutus/">http://www.hoobie.net/brutus/</a></span></b><b><span style="color: blue; font-family: LiberationSerif-Bold; mso-bidi-font-family: LiberationSerif-Bold; mso-bidi-font-size: 11.0pt;"><o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal">
<b><span style="color: red; font-family: LiberationSerif-Bold; font-size: 14.5pt; line-height: 107%; mso-bidi-font-family: LiberationSerif-Bold;">NOTE: </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; line-height: 107%;">Some
antivirus programs are known to have conflict with the </span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt; line-height: 107%;">Brutus </span></i><span style="font-family: LiberationSerif; font-size: 14.5pt; line-height: 107%;">application.</span><span style="color: blue; font-family: LiberationSerif-Bold;"><span style="line-height: 17.1200008392334px;"><b> </b></span></span><span style="font-family: LiberationSerif; font-size: 14.5pt;">So, it is recommend that you temporarily disable your antivirus
before running the </span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt;">Brutus </span></i><span style="font-family: LiberationSerif; font-size: 14.5pt;">application.</span></div>
<div class="MsoNormal">
<span style="font-family: LiberationSerif; font-size: 14.5pt;"><br /></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">Now, let me give you a small demo on how to use </span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt;">Brutus</span></i><span style="font-family: LiberationSerif; font-size: 14.5pt;">. Here is a step-by-step procedure:</span><span style="font-family: LiberationSerif; font-size: 14.5pt;"> </span></div>
<div class="MsoListParagraphCxSpFirst" style="margin-bottom: 0.0001pt; text-indent: -0.25in;">
</div>
<ol style="text-align: left;">
<li><span style="font-family: LiberationSerif; font-size: 14.5pt; text-indent: -0.25in;">After downloading the tool
from the above link, unzip the package into a new empty folder.</span></li>
<li><span style="font-family: LiberationSerif; font-size: 14.5pt; text-indent: -0.25in;"><span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;"> </span></span><span style="font-family: LiberationSerif; font-size: 14.5pt; text-indent: -0.25in;">Run the “BrutusA2.exe” file
to open the application as shown in the figure below: </span><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiQEoWWh13v8bQRYzW4-vVhzremh7JS-EuJtebM3LLaEREGFk6q7kBNkG8srvhX8UmM_dGP_-Z4EU1hla6biI3ezT38Tn1GC-LIJyt3fyr-FQ6EQH1A3kIFbe1Ezm6oEs2WR2FkwJJEJf4/s1600/brutus.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em; text-align: center; text-indent: -0.25in;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiQEoWWh13v8bQRYzW4-vVhzremh7JS-EuJtebM3LLaEREGFk6q7kBNkG8srvhX8UmM_dGP_-Z4EU1hla6biI3ezT38Tn1GC-LIJyt3fyr-FQ6EQH1A3kIFbe1Ezm6oEs2WR2FkwJJEJf4/s1600/brutus.PNG" height="432" width="640" /></a></li>
<li><span style="font-family: LiberationSerif; font-size: 14.5pt; text-indent: -0.25in;">Enter
the </span><i style="text-indent: -0.25in;"><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Italic;">IP address </span></i><span style="font-family: LiberationSerif; font-size: 14.5pt; text-indent: -0.25in;">(or
</span><i style="text-indent: -0.25in;"><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Italic;">domain name</span></i><span style="font-family: LiberationSerif; font-size: 14.5pt; text-indent: -0.25in;">)
of the target server in the “Target” field Select the type of password that you
want to crack from the “Type” field or enter your own custom port number in the
“Port” field”.</span></li>
<li><span style="font-family: LiberationSerif; font-size: 14.5pt; text-indent: -0.25in;">If
you know the </span><i style="text-indent: -0.25in;"><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Italic;">username </span></i><span style="font-family: LiberationSerif; font-size: 14.5pt; text-indent: -0.25in;">for
which you want hack the password for, then check the “Single User” option and
enter the </span><i style="text-indent: -0.25in;"><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Italic;">username </span></i><span style="font-family: LiberationSerif; font-size: 14.5pt; text-indent: -0.25in;">in
the “UserID” field. Otherwise leave the default settings to work as it is so
that the </span><i style="text-indent: -0.25in;"><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Italic;">username list </span></i><span style="font-family: LiberationSerif; font-size: 14.5pt; text-indent: -0.25in;">is
loaded from the “users.txt” file.</span></li>
<li><span style="font-family: LiberationSerif; font-size: 14.5pt; text-indent: -0.25in;">In
the “Pass Mode” field select the option “Word List”. The </span><i style="text-indent: -0.25in;"><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Italic;">list of words </span></i><span style="font-family: LiberationSerif; font-size: 14.5pt; text-indent: -0.25in;">will be
loaded from the “words.txt” file by default which contains around 800+ words.
If you’ve a </span><i style="text-indent: -0.25in;"><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Italic;">.TXT </span></i><span style="font-family: LiberationSerif; font-size: 14.5pt; text-indent: -0.25in;">file
that contains more words, then you can use that by selecting the “Browse”
option. The bigger the list is, better the chances of cracking the password.
Below is an example of how a </span><i style="text-indent: -0.25in;"><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Italic;">username
</span></i><span style="font-family: LiberationSerif; font-size: 14.5pt; text-indent: -0.25in;">and </span><i style="text-indent: -0.25in;"><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Italic;">password
</span></i><span style="font-family: LiberationSerif; font-size: 14.5pt; text-indent: -0.25in;">list might look like:<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjdZN7EQIPf-Mx5AnZPdLoyOtm4sfjq660rGfIoBMt9PpLvAROoRSh8CSaDAYmgV5L7zXRG86pLqV6C70eLm0_Ws_zbKsVIAstAI8dwy9o6-Qqc2PBEkNqPl5_P3oVLmFVWxd0i-85uHJE/s1600/userpassword.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjdZN7EQIPf-Mx5AnZPdLoyOtm4sfjq660rGfIoBMt9PpLvAROoRSh8CSaDAYmgV5L7zXRG86pLqV6C70eLm0_Ws_zbKsVIAstAI8dwy9o6-Qqc2PBEkNqPl5_P3oVLmFVWxd0i-85uHJE/s1600/userpassword.PNG" height="400" width="393" /></a></div>
</span></li>
</ol>
<div class="MsoListParagraphCxSpFirst" style="margin-bottom: 0.0001pt; text-indent: -0.25in;">
<!--[if !supportLists]--><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif; mso-fareast-font-family: LiberationSerif;"> 6.<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">Now,
hit the “Start” button to begin the cracking process. Brutus will try every
word in the </span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Italic;">password list </span></i><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">for
each of the </span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Italic;">usernames </span></i><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">present
in the </span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Italic;">username list</span></i><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">.
It will take a while for the process to complete and if you’re lucky, you
should get a </span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Italic;">positive</span></i><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">
</span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Italic;">authentication </span></i><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">response
and the cracked password as shown in the below figure:<o:p></o:p></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgaUcXiNOyLX6XV-eY6fVA5n_qu4qJIlHaLyEhjOmS1dYaG9qlGUHqjyy_ONjg6chpbysgQzgAdOsJg7CSaYEvjd02Wm8DHIyQ_PkcDt5Xp5_iZrNftFZHRMIN_LDI05OMG2SFypwjr8-Y/s1600/authenticationresponse.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgaUcXiNOyLX6XV-eY6fVA5n_qu4qJIlHaLyEhjOmS1dYaG9qlGUHqjyy_ONjg6chpbysgQzgAdOsJg7CSaYEvjd02Wm8DHIyQ_PkcDt5Xp5_iZrNftFZHRMIN_LDI05OMG2SFypwjr8-Y/s1600/authenticationresponse.PNG" height="225" width="640" /></a></div>
<div class="MsoListParagraphCxSpFirst" style="margin-bottom: 0.0001pt; text-indent: -0.25in;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;"><br /></span></div>
<div class="MsoListParagraphCxSpLast">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="color: red; font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">NOTE: </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt;">It
is always a smart idea to </span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt;">use
a proxy </span></i><span style="font-family: LiberationSerif; font-size: 14.5pt;">before attempting this
hacking process. This will prevent your real IP address from being stored in
the logs of remote server and thus reduces the chances of being traced back.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;"><br /></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold; font-size: 16.5pt; mso-bidi-font-family: LiberationSerif-Bold;">BRUTE-FORCE ATTACK<o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">Unlike
the dictionary attack which tries only those words present in the list, the </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">brute force attack </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">on the
other hand tries every possible permutation of alphabets, numbers and</span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;"> </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">even special characters
until the right password if found.</span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;"><o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">In
theory, it is possible to crack any password using this approach, but here’s
the catch! </span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Italic;">Brute force attack </span></i><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">takes
a long time to crack passwords. The time actually depends on the speed of the
computer and the complexity of the password.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">For
example, if the target password is small and doesn’t contain any numbers or
special characters, it is fairly easy to crack such passwords using this
approach. However, if the password is lengthy, contains numbers or even special
characters, this approach may take a long time to complete. For some complex
passwords, brute force approach may take up even years to finish the cracking
process as there are billions of permutations to try.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">Here
is how you can configure the </span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Italic;">Brutus
</span></i><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">program to try the brute force approach:<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">1.
Configure the “Target”, “Type” and “Port” in the same way as in case of the </span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Italic;">dictionary attack</span></i><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">.
Under the “Authentication Options”, select the “Pass Mode” as </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">Brute Force </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">and click on
the “Range” button as shown in the Figure below:<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggJ1C00tuYn9YW3Ycz33Hvhx79nROXoRXzYzkIeoaH8wl0Fap6-BVIJXmAistpRx_Smphyphenhyphen08Xsb10-do7gcET-xl4KG0Le9dSxu7gQKUm-oy7l4vjUCSbpT992IqRNeJL-cm2bbAAFFY4/s1600/brutus.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggJ1C00tuYn9YW3Ycz33Hvhx79nROXoRXzYzkIeoaH8wl0Fap6-BVIJXmAistpRx_Smphyphenhyphen08Xsb10-do7gcET-xl4KG0Le9dSxu7gQKUm-oy7l4vjUCSbpT992IqRNeJL-cm2bbAAFFY4/s1600/brutus.PNG" height="432" width="640" /></a></div>
<br />
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;"><br /></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">2.
Once you click on “Range” you will see a number of options to select with such
as “Digits only”, “Lowercase Alpha”, “Uppercase Alpha” and so on. You can also
set the </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">Min Length </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">and
</span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">Max Length </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">to
narrow your brute force attack options.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiMKmSreNIe4cXlsgDFVV8FNSSqsjsYmV7S2bsxY0PElRDSGVgTI0QBd_1CKAUAyZEdYQt04mWeOgsjAwpOKlC2KfH5gX_Yh0LvavteIGjcBhyphenhyphen95em0dYIPTZ2f_MHL_z-wSGYqOujUAaQ/s1600/brutusforcegenerator.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiMKmSreNIe4cXlsgDFVV8FNSSqsjsYmV7S2bsxY0PElRDSGVgTI0QBd_1CKAUAyZEdYQt04mWeOgsjAwpOKlC2KfH5gX_Yh0LvavteIGjcBhyphenhyphen95em0dYIPTZ2f_MHL_z-wSGYqOujUAaQ/s1600/brutusforcegenerator.PNG" height="242" width="400" /></a></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt; text-indent: 0.5in;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;"><br /></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt; text-indent: 0.5in;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">In
the above example, Brutus will try all permutations of lower alphabets ranging
from 0 to 6 characters in length. Going for options like “Mixed Alpha” or
“Alphanumeric” and increasing the </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">Max
Length </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">would increase the success rate of
cracking the password but consequently takes more time to complete.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt; text-indent: 0.5in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">3.
Once your range selection is over, click “OK” and hit the “Start” button. The
brute force cracking attempt will begin and will take anywhere from a few
minutes to a couple of hours to complete. If the crack attempt is successful,
you should see the </span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Italic;">username </span></i><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">and
its corresponding </span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Italic;">password </span></i><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">displayed
on the Brutus window!<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold; font-size: 16.5pt;">RAINBOW TABLE<o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">A </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt;">rainbow table </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt;">is a pre-computed table that contains a long list of password
hashes for dictionary words as well as alphanumeric permutation of words. The
hacker initially generates a long list of password hashes and stores them in a
rainbow table for later use.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;"><br /></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">Although generating a rainbow table initially takes a long time
and utilizes more storage space, once computed it can greatly reduce the time
taken for the password cracking process.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;"><br /></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">Any computer system that requires password authentication will
maintain a table of usernames and passwords in its database. In case if the
hacker manages to steal this table from the database, he would easily be in a
position to gain access to a large number of accounts on the target system. In
order to prevent this from happening, most systems store the passwords in a
cryptographic hash format as opposed to plain text.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;"><br /></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">For example, when a user completes the sign-up process on an
online portal, the system may convert his password to MD5 hash format and store
it in its database table. Suppose if the user has his password as </span><b><span style="color: #c10000; font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">goldfish</span></b><span style="font-family: LiberationSerif; font-size: 14.5pt;">, its MD5 hash would be as follows:<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold;"> MD5 Hash: </span></b><span style="font-family: LiberationSerif;">861836f13e3d627dfa375bdb8389214e<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">Thereafter whenever the user tries to log into the portal, his
password gets converted to the MD5 hash format on the fly and is compared
against the existing hash in the database table. If both the hashes match,
access is granted to the user.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">Now, even if the hacker manages to gain access to the database and
steal the password table, he would only see a long list of cryptographic hashes
and not the actual password.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;"><br /></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">This is where </span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt;">rainbow
tables </span></i><span style="font-family: LiberationSerif; font-size: 14.5pt;">come in handy. The hacker can
use the </span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt;">rainbow tables </span></i><span style="font-family: LiberationSerif; font-size: 14.5pt;">to compare the long list of pre-computed hashes against the stolen
list of password hashes. If the hashes match, the password would be the one
that was initially used to generate the hash. Unlike a </span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt;">brute force </span></i><span style="font-family: LiberationSerif; font-size: 14.5pt;">approach where the hash is computed on every attempt, the </span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt;">rainbow</span></i><span style="font-family: LiberationSerif; font-size: 14.5pt;"> </span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt;">table </span></i><span style="font-family: LiberationSerif; font-size: 14.5pt;">approach on the other hand utilizes a pre-computed list of hashes
to directly compare them against an existing password hash. As the time required
to compute the hash on every attempt is cut down, the </span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt;">rainbow table </span></i><span style="font-family: LiberationSerif; font-size: 14.5pt;">approach takes significantly less time to complete the cracking
process.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold; font-size: 16.5pt; mso-bidi-font-family: LiberationSerif-Bold;">PHISHING ATTACK<o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">Phishing
is a form of social engineering technique used by hackers to gather sensitive
information such as usernames, passwords and credit card details by posing as a
trustworthy person or organization.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;"><br /></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">Phishing
scams usually sends an email message to users requesting for their personal
information, or redirects them to a website where they are required to enter
their personal information. <o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;"><br /></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">In
most cases, a phishing email directs the victims to follow a link leading to a
website where they will have to enter their login details or other confidential
information. In reality this website is a fake one created by the hacker (often
referred to as spoofed website) which is an exact replica of the original or
appears similar. When the victim enters his/her login details on a spoofed page
they are actually stolen away by the hacker.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">For
example, the hacker may send an email that pretends to have been appearing from
the bank where the victim maintains an account and ask him/her to update the
login details by following the link present in the email. The email further
mentions that this update process is mandatory and failing to do so will result
in the bank account being locked. As a response, the victim clicks on the link
where he/she will be taken to the fake login page that looks similar to the
original one. However, when the login details are entered, they are recorded
and stored on the website for later access by the hacker. The victim remains
unaware of the entire process but the hacker skillfully manages to hack the
password.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold; font-size: 16.5pt;">COUNTERMEASURES<o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">After addressing some of the popular password cracking techniques,
let us now look at some of the countermeasures that can be taken to protect
ourselves from the above mentioned attacks.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="color: #a60000; font-family: LiberationSerif-Bold; font-size: 16.5pt; mso-bidi-font-family: LiberationSerif-Bold;">Social Engineering<o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">The measures needed to protect yourself from </span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt;">social engineering </span></i><span style="font-family: LiberationSerif; font-size: 14.5pt;">attacks are pretty simple and straight forward. Never disclose
your password or any other personal information to anyone via phone or email.
Attackers may even try to convince you by pretending to be an authorized person
with whom you can share the personal details with. But remember that passwords
are meant only to be entered on login pages and not to be shared with any
person at all.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="color: #a60000; font-family: LiberationSerif-Bold; font-size: 16.5pt; mso-bidi-font-family: LiberationSerif-Bold;">Guessing and Shoulder Surfing<o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">Always make sure that your password does not contain your pet
names, birth date, family member names or anything as such that are easy to be
guessed. It is recommended that your password contains a combination of hard to
guess words, numbers and special characters.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">As far as the </span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt;">shoulder
surfing </span></i><span style="font-family: LiberationSerif; font-size: 14.5pt;">is concerned, you can avoid
the same by making sure that no one else behind you is watching the movement of
your fingers over the keyboard when you are typing the password.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="color: #a60000; font-family: LiberationSerif-Bold; font-size: 16.5pt; mso-bidi-font-family: LiberationSerif-Bold;">Dictionary Attack<o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">To protect yourself from a </span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt;">dictionary attack</span></i><span style="font-family: LiberationSerif; font-size: 14.5pt;">,
all you need to do is make sure that your password does not contain words from
dictionary. That means, your password is not something like “apple”, “lotus” or
“mango”. Instead use words that are not in the dictionary. You can also use a
phrase like </span><b><span style="color: red; font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">str0ngpAss?? </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt;">As your password so that it cannot be cracked using the dictionary
attack approach.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="color: #a60000; font-family: LiberationSerif-Bold; font-size: 16.5pt; mso-bidi-font-family: LiberationSerif-Bold;">Brute-Force Attack and Rainbow Table<o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt;">Brute-Force </span></i><span style="font-family: LiberationSerif; font-size: 14.5pt;">attacks often become successful when the passwords are short. That
means, by keeping the password long enough you can make it hard for the
attacker to crack it.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">Usually a password whose length is of 8 characters was considered
long enough and safe in the past. However, this is not the case in the present
day scenario as the modern computers have high speed processing capabilities to
try thousands of guesses per second.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">So, in order to make your password immune to brute-force attack
make sure it is larger than 8 characters and is a combinations of alphabets,
numbers and special characters.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">You can avoid rainbow table attack on your passwords by making it
too long. If your password is more than 12 or 14 characters, it would be
extremely time consuming to create tables for them. This should keep you
protected from such attacks.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="color: #a60000; font-family: LiberationSerif-Bold; font-size: 16.5pt; mso-bidi-font-family: LiberationSerif-Bold;">Phishing Attack<o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">You can avoid phishing attack by following the below mentioned
guidelines:</span></div>
<ul style="text-align: left;">
<li><span style="font-family: LiberationSerif; font-size: 14.5pt;">Do not respond to suspicious emails that ask you to give your
personal information. </span><span style="font-family: LiberationSerif; font-size: 14.5pt;">If you are unsure whether an email request is legitimate, verify
the same by calling the respective bank/company. Always use the telephone
numbers printed on your bank records or statements and not those mentioned in
the suspicious email.</span></li>
</ul>
<ul style="text-align: left;">
<li><span style="font-family: LiberationSerif; font-size: 14.5pt;">Do not use the links in an email, instant messenger or chat
conversation to enter a website. Instead, always type the URL of the website on
your browser’s address bar to get into a website.</span></li>
</ul>
<br />
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
</div>
<ul style="text-align: left;">
<li><span style="font-family: LiberationSerif; font-size: 14.5pt;">Legitimate websites always use a secure connection (</span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt;">https://</span></i><span style="font-family: LiberationSerif; font-size: 14.5pt;">) on those pages which are intended to gather sensitive
information such as passwords, account numbers or credit card details. You will
see a lock icon in your browser’s address bar which indicates a secure
connection. On some websites like “PayPal” which uses an extended validation
certificate, the address bar turns </span><b><span style="color: #008100; font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">GREEN </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt;">as shown below:</span></li>
</ul>
<br />
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<b><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgkV-VgyUNcIAQx9B4ifTecSBGpfuOsrXhdgkMkhmeQxqPv8sGcj_2Zc33VKZ6nWe6DNY-FcbEjZ6GRDtCt7SpBAqHn-nhGCjx3oPFjcG60Kppi48_mFRPeDSygCm5f-o1OLYiuYI2U8fs/s1600/paypal.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgkV-VgyUNcIAQx9B4ifTecSBGpfuOsrXhdgkMkhmeQxqPv8sGcj_2Zc33VKZ6nWe6DNY-FcbEjZ6GRDtCt7SpBAqHn-nhGCjx3oPFjcG60Kppi48_mFRPeDSygCm5f-o1OLYiuYI2U8fs/s1600/paypal.PNG" height="46" width="640" /></a></b></div>
<br />
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;"><br /></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
</div>
<ul style="text-align: left;">
<li><span style="font-family: LiberationSerif; font-size: 14.5pt;">Even if the login page is not secure (https://) the target website
may still be legitimate. However, look for misspellings like </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">www.papyal.com</span></b><span style="font-family: LiberationSerif; font-size: 14.5pt;">, </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">www.payapl.com</span></b><span style="font-family: LiberationSerif; font-size: 14.5pt;">
or </span><b><span style="color: red; font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">paypal.somethingelse.com </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt;"> instead of the legitimate
site </span><b><span style="color: #008100; font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;"><a href="http://www.paypal.com/">www.paypal.com</a> </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt;">and</span><b><span style="color: red; font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;"> </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt;">make sure that the login details are only entered on the
legitimate web page.</span></li>
</ul>
<br />
<div style="text-indent: -24px;">
<span style="font-family: LiberationSerif;"><span style="font-size: 19.3333339691162px;"><br /></span></span></div>
<div style="text-indent: -24px;">
<span style="font-family: LiberationSerif;"><span style="font-size: 19.3333339691162px;"><br /></span></span></div>
<!--[if !supportLists]--><br />
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
</div>
<div class="MsoListParagraphCxSpLast" style="margin-bottom: 0.0001pt; text-indent: -0.25in;">
</div>
</div>
Unknownnoreply@blogger.com1tag:blogger.com,1999:blog-3078132662608425729.post-15786539413267323622015-04-08T16:52:00.002-07:002015-04-11T19:31:51.220-07:00How To Hide Information?<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_JlUPTlzfY2trMQPdVNUzPV79y-SwqYoJXs2dGDZnAV4-uWGtdYxIqQgfmnZoHYUArkRurlVpkNIOKmywyLucXJb8iXZR2T4quIJ4S1_5GY9YW_ihmhOHwVGoWEpvjLfCEFsVkte_p4w/s1600/hiddeninfo.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_JlUPTlzfY2trMQPdVNUzPV79y-SwqYoJXs2dGDZnAV4-uWGtdYxIqQgfmnZoHYUArkRurlVpkNIOKmywyLucXJb8iXZR2T4quIJ4S1_5GY9YW_ihmhOHwVGoWEpvjLfCEFsVkte_p4w/s1600/hiddeninfo.png" height="359" width="640" /></a></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;"><br /></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">Once
the hackers gain access and take control of the system, the next step they may
try to do is to hide some critical files and information on it. The hacker may
decide to hide files for later execution or use the victim’s compromised system
to store information secretly so that it can be accessed later and sent to the
final destination where it is intended to go. In this chapter we will discuss
some of the popular techniques to hide files and information on a system. Let
us start with the simple ones and gradually advance to more complex techniques.<o:p></o:p></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<b><span style="font-family: LiberationSerif-Bold; font-size: 16.5pt; line-height: 107%; mso-bidi-font-family: LiberationSerif-Bold;">WINDOWS
HIDDEN ATTRIBUTE<o:p></o:p></span></b></div>
<div class="MsoNormal">
<b><span style="font-family: LiberationSerif-Bold; font-size: 16.5pt; line-height: 107%; mso-bidi-font-family: LiberationSerif-Bold;"><br /></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">Using
the Windows built-in hidden attribute is by far the simple and easiest way to
hide files and folders on a system. To enable hidden attribute just follow the
instructions as given below:<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpFirst" style="margin-bottom: 0.0001pt; text-indent: -0.25in;">
<!--[if !supportLists]--><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif; mso-fareast-font-family: LiberationSerif;">1.<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">Right-click
on the file or folder that you intend to hide and select “Properties” from the
pop-up menu.<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpLast" style="margin-bottom: 0.0001pt; text-indent: -0.25in;">
<!--[if !supportLists]--><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif; mso-fareast-font-family: LiberationSerif;">2.<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">In
the “Properties” window, under the “Attributes” section check the box which
says “Hidden” and click on “OK”. <o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">This
will make the selected file or folder go invisible. To view the hidden files
and folders follow the instruction below:<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoListParagraphCxSpFirst" style="margin-bottom: 0.0001pt; text-indent: -0.25in;">
<!--[if !supportLists]--><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif; mso-fareast-font-family: LiberationSerif;">1.<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">Open
the “Control Panel” by clicking the “Start” button<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="margin-bottom: 0.0001pt; text-indent: -0.25in;">
<!--[if !supportLists]--><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif; mso-fareast-font-family: LiberationSerif;">2.<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">Now
click on “Appearance and Personalization” and then on “Folder Options”.<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpLast" style="margin-bottom: 0.0001pt; text-indent: -0.25in;">
<!--[if !supportLists]--><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif; mso-fareast-font-family: LiberationSerif;">3.<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">Switch
to “View” tab, check the option “Show hidden files, folders and drives” under “Advanced
Settings” and click on “OK”.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgm_8Y2VQ30RSlBCtz2Rr_Lg7Gbx4ahEWFolzHrfOZc_05gmy6weon70fJjPLaqREwrTkwrjzsqNn_0xU9I51jxT4eTOH-aDIkv3zMunUMCT-QMl2qcOWjO82SQ_LwBooC1lFd5-zc8vxk/s1600/folderoptions_view.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgm_8Y2VQ30RSlBCtz2Rr_Lg7Gbx4ahEWFolzHrfOZc_05gmy6weon70fJjPLaqREwrTkwrjzsqNn_0xU9I51jxT4eTOH-aDIkv3zMunUMCT-QMl2qcOWjO82SQ_LwBooC1lFd5-zc8vxk/s1600/folderoptions_view.PNG" height="627" width="640" /></a></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;"><br /></span></div>
<span style="font-family: LiberationSerif; font-size: 14.5pt; line-height: 107%; mso-ansi-language: EN-US; mso-bidi-font-family: LiberationSerif; mso-bidi-language: HI; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;">This should unhide all the hidden files and folders. However, the drawback
of this method is that most users are aware of this and hence the hidden files
can easily be uncovered. In order to counter this drawback, some of the
advanced information hiding methods are discussed below. </span><br />
<span style="font-family: LiberationSerif; font-size: 14.5pt; line-height: 107%; mso-ansi-language: EN-US; mso-bidi-font-family: LiberationSerif; mso-bidi-language: HI; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;"><br /></span>
<br />
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold; font-size: 16.5pt; mso-bidi-font-family: LiberationSerif-Bold;">NTFS ALTERNATE DATA STREAMS<o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">Alternate Data Stream (ADS) </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">is
a Windows hidden stream supported on NTFS file system used to store metadata of
a file such as attributes, word count, access and modification time etc.
Whenever a file is created on NTFS file system, Windows automatically creates
an ADS for it. Even in directory listing only the actual file is visible but
its ADS is kept hidden.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">It is
even possible to add additional ADS to an existing file to store hidden
information in it. Hackers often use this technique to store malicious codes in
compromised systems without the knowledge of the victims.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">Suppose
if you want to hide information inside an image or any other file, just follow
the steps mentioned below:<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoListParagraphCxSpFirst" style="margin-bottom: 0.0001pt; text-indent: -0.25in;">
<!--[if !supportLists]--><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif; mso-fareast-font-family: LiberationSerif;">1.<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">Open
the Windows command prompt.<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoListParagraphCxSpLast" style="margin-bottom: 0.0001pt; text-indent: -0.25in;">
<!--[if !supportLists]--><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif; mso-fareast-font-family: LiberationSerif;">2.<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">Type
the following command and hit Enter.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoListParagraph" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold; font-size: 14pt;">Command Syntax: </span></b><b><span style="color: red; font-family: LiberationSerif-Bold; font-size: 14.0pt; mso-bidi-font-family: LiberationSerif-Bold;">notepad </span></b><span style="color: red; font-family: LiberationSerif; font-size: 14.0pt; mso-bidi-font-family: LiberationSerif;">file-name:ADS-name<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoListParagraph" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold; font-size: 14pt;">Example Command: </span></b><b><span style="color: red; font-family: LiberationSerif-Bold; font-size: 14.0pt; mso-bidi-font-family: LiberationSerif-Bold;">notepad </span></b><span style="color: red; font-family: LiberationSerif; font-size: 14.0pt; mso-bidi-font-family: LiberationSerif;">pooja.jpg:hiddeninfo<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiQmjmhDMbj5ruFqQ2kPFTtYTFtCJvpXtViKYinNbvxqOQLU1W3ldfWkYuNyu8Uc5JpbCmwd5M0VigC331ZZDmdmdeh2jXza7WrKkPJdDAqUOrsOX1t3O0sYspShmEBr4rS8jJ4tGhDzVo/s1600/ads_hiddeninfo.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiQmjmhDMbj5ruFqQ2kPFTtYTFtCJvpXtViKYinNbvxqOQLU1W3ldfWkYuNyu8Uc5JpbCmwd5M0VigC331ZZDmdmdeh2jXza7WrKkPJdDAqUOrsOX1t3O0sYspShmEBr4rS8jJ4tGhDzVo/s1600/ads_hiddeninfo.PNG" height="298" width="640" /></a></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;"><br /></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoListParagraph" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">As shown in the above snapshot, I am issuing the above command
on </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">pooja.jpg </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">present
inside the folder named </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">HiddenInfo</span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoListParagraph" style="margin-bottom: 0.0001pt; text-indent: -0.25in;">
<!--[if !supportLists]--><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif; mso-fareast-font-family: LiberationSerif;">3.<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">Now
Windows will create a new </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">ADS </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">for
the specified file and open it in a new notepad with a message window “Do you
want to create a new file?” as shown below.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin: 0in 0in 0.0001pt 0.5in;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi8_BuLq2IIWjTjpw3VnIaUdqgQbPaZNe5V90LsaUwLzpTm122tql8aii8zkfhnV9ZEoC2KwoDfDJAHV6L7oR5F64WG4joCTCmW9DkHZFO62MSnMIMRYEIW9jS224eoNQnkOUf_mvrP-No/s1600/ads_newfile.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi8_BuLq2IIWjTjpw3VnIaUdqgQbPaZNe5V90LsaUwLzpTm122tql8aii8zkfhnV9ZEoC2KwoDfDJAHV6L7oR5F64WG4joCTCmW9DkHZFO62MSnMIMRYEIW9jS224eoNQnkOUf_mvrP-No/s1600/ads_newfile.PNG" height="412" width="640" /></a></div>
<div class="MsoNormal" style="margin: 0in 0in 0.0001pt 0.5in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoListParagraph" style="margin-bottom: 0.0001pt; text-indent: -0.25in;">
<!--[if !supportLists]--><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif; mso-fareast-font-family: LiberationSerif;">4.<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">Click
on “Yes”, and type the content that you wish to hide on to it and once you are
done save and close the notepad.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoListParagraph" style="margin-bottom: 0.0001pt; text-indent: -0.25in;">
<!--[if !supportLists]--><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif; mso-fareast-font-family: LiberationSerif;">5.<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;"> </span></span><!--[endif]--><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">Now,
all your secret message will be stored in a new </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">ADS </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">called </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">hiddeninfo </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">inside the
file </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">pooja.jpg</span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin: 0in 0in 0.0001pt 1in;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEihAR3ZjHGx4p17uYc7xVUkjPYIak6eUtQhIhXvkEqUIOApJKKGfdsNZ4ijqlSTkyg5zuRWIzhLR7HRX6O4tO7bc6_l1QePo5ks-Wk47TAmud_YGaqWWXvYGC3CI73RzUM4nqe32lgod4c/s1600/pooja.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEihAR3ZjHGx4p17uYc7xVUkjPYIak6eUtQhIhXvkEqUIOApJKKGfdsNZ4ijqlSTkyg5zuRWIzhLR7HRX6O4tO7bc6_l1QePo5ks-Wk47TAmud_YGaqWWXvYGC3CI73RzUM4nqe32lgod4c/s1600/pooja.jpg" height="318" width="640" /></a></div>
<div class="MsoNormal" style="margin: 0in 0in 0.0001pt 1in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">Note:
You can change image file name, but it should have same ADS name to see the
same ADS file or your secret message.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;"> </span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjLhHHblcTdFRQDRGPefUPYLYIa_H-olXbDNmq6im29SWrBTXKaPjCSy8Jwmk4RIbajuDHl-TgkAxiCacrdgkXR16884oJTCCNbhnH2C7Zy-lQXRta8xV5MquwwObfoG35uXs1AOtTfVZA/s1600/filerename.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjLhHHblcTdFRQDRGPefUPYLYIa_H-olXbDNmq6im29SWrBTXKaPjCSy8Jwmk4RIbajuDHl-TgkAxiCacrdgkXR16884oJTCCNbhnH2C7Zy-lQXRta8xV5MquwwObfoG35uXs1AOtTfVZA/s1600/filerename.PNG" height="202" width="640" /></a></div>
<o:p></o:p><br />
<br />
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjAtB54v3Dh7DXjyWSqMMdipU1LRO8w1ObuJTJos6BxVwLY2EmKsCnANtMR5jiKPI_ni7SK6luvt1ExsLcqnBwQ_GCOHsCY2TkCakhIzT4Ix-qJohJCe5a-V5wi_JKuwmBLtvH32hygmis/s1600/chetan.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjAtB54v3Dh7DXjyWSqMMdipU1LRO8w1ObuJTJos6BxVwLY2EmKsCnANtMR5jiKPI_ni7SK6luvt1ExsLcqnBwQ_GCOHsCY2TkCakhIzT4Ix-qJohJCe5a-V5wi_JKuwmBLtvH32hygmis/s1600/chetan.jpg" height="354" width="640" /></a></div>
<span style="font-family: LiberationSerif; font-size: 14.5pt; line-height: 107%; mso-ansi-language: EN-US; mso-bidi-font-family: LiberationSerif; mso-bidi-language: HI; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;"><br /></span>
<span style="font-family: LiberationSerif; font-size: 14.5pt; line-height: 107%; mso-ansi-language: EN-US; mso-bidi-font-family: LiberationSerif; mso-bidi-language: HI; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;"><br /></span>
<br />
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold; font-size: 16.5pt; mso-bidi-font-family: LiberationSerif-Bold;">STEGANOGRAPHY<o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">Steganography </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">is a means of
obscuring data where secret messages are hidden inside computer files such as
images, sound files, videos and even executable files, so that no one except
the creator will know about the existence of stealth information in it.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">Steganography
may also involve the usage of cryptography where the message is first encrypted
before it is concealed in another file. Generally, the messages appear to be
something else such as an image, sound or video so that the presence of secret
data in it remains unsuspected.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">The
main advantage of steganography over other information hiding methods is that,
it will not arose suspicion even if the files fall in the hands of a third
party. Unlike cryptography which only encrypts information, stegnography uses
both encryption and obscurity of data in a normal file. This makes
stegnanography hard to detect as the files look completely normal from outside.
Stegnographic tools implement intelligent algorithms to carefully embed the
encrypted text messages or binary data inside other larger files such as an
image, audio, video or an executable file. Some tools will embed the encrypted
data at the end of another file so that there will be enough room for storing
larger data.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">There
are many steganograpic tools available online but only a few are able to work
flawlessly. I did not find any tool that worked perfectly on both small and large
data. To counter this problem, I have managed to develop my own tool that can
work perfectly on all types of files and all size of data. I have named the
tool as </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">StegoMagic</span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">.
You can download it from the following link.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<a href="http://www.gohacking.com/downloads/resources/StegoMagic.zip"><b><span style="font-family: LiberationSerif-Bold; mso-bidi-font-family: LiberationSerif-Bold; mso-bidi-font-size: 11.0pt;">Download StegoMagic</span></b></a><b><span style="color: blue; font-family: LiberationSerif-Bold; mso-bidi-font-family: LiberationSerif-Bold; mso-bidi-font-size: 11.0pt;"><o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">The
zip file contains two versions of </span><b><i><span style="font-family: LiberationSerif-BoldItalic; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-BoldItalic;">StegoMagic</span></i></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">:
One for encrypting the text messages and the other for encrypting binary files.
</span><b><i><span style="font-family: LiberationSerif-BoldItalic; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-BoldItalic;">StegoMagic_TXT </span></i></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">can
be used to hide text messages in other files such as an image or a sound file. </span><b><i><span style="font-family: LiberationSerif-BoldItalic; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-BoldItalic;">StegoMagic_BIN </span></i></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">can
be used to hide one binary file in another such as an executable file inside an
image or an image inside a video file and so on.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEig-cCc6E8OG_bmich7iqfQGz2unsqynAgK7arogwNIqK9ByCqzn2Rm5SQL8cy_YVAxyVEoSKoolozxI8olXpi6fKzoDDO3d77B-PleA8yi7EUpNRW4K59A_rnxP2D34eN154cquejEFp8/s1600/Steganographics+Data+Encryption.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEig-cCc6E8OG_bmich7iqfQGz2unsqynAgK7arogwNIqK9ByCqzn2Rm5SQL8cy_YVAxyVEoSKoolozxI8olXpi6fKzoDDO3d77B-PleA8yi7EUpNRW4K59A_rnxP2D34eN154cquejEFp8/s1600/Steganographics+Data+Encryption.PNG" height="274" width="640" /></a></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;"><br /></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">With </span><b><i><span style="font-family: LiberationSerif-BoldItalic; font-size: 14.5pt;">StegoMagic</span></i></b><span style="font-family: LiberationSerif; font-size: 14.5pt;">, there is no limitation on the size and type of the file that you
are intending to hide. For example, you can hide a video of size 1 GB in an
image of size 1 MB or hide an executable file inside a WORD document. The tool
is pretty straightforward to use and requires no special understanding of the
concept.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">At the end of the encryption process, a secret decryption key will
be generated and the same is required during the decryption process.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="color: #a60000; font-family: LiberationSerif-Bold; font-size: 16.5pt; mso-bidi-font-family: LiberationSerif-Bold;">How to Use StegoMagic?<o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">Suppose you want to hide a </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt;">text message </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt;">inside a .</span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt;">JPG image </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt;">file:<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoListParagraphCxSpFirst" style="margin-bottom: 0.0001pt; text-indent: -0.25in;">
<!--[if !supportLists]--><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt;">1.<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal; font-weight: normal;">
</span></span></b><!--[endif]--><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt;">Place
the .JPG image file and the text file (.txt) in the same folder as that of </span></b><b><i><span style="font-family: LiberationSerif-BoldItalic; font-size: 14.5pt;">StegoMagic_TXT.exe</span></i></b><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt;"><o:p></o:p></span></b></div>
<div class="MsoListParagraphCxSpMiddle" style="margin-bottom: 0.0001pt; text-indent: -0.25in;">
<!--[if !supportLists]--><span style="font-family: LiberationSerif; font-size: 14.5pt;">2.<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;">
</span></span><!--[endif]--><span style="font-family: LiberationSerif; font-size: 14.5pt;">Run </span><b><i><span style="font-family: LiberationSerif-BoldItalic; font-size: 14.5pt;">StegoMagic_TXT.exe </span></i></b><span style="font-family: LiberationSerif; font-size: 14.5pt;">(with administrator rights) and follow the screen instructions to
embed the text message inside the JPG image.<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="margin-bottom: 0.0001pt; text-indent: -0.25in;">
<!--[if !supportLists]--><span style="font-family: LiberationSerif; font-size: 14.5pt;">3.<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;">
</span></span><!--[endif]--><span style="font-family: LiberationSerif; font-size: 14.5pt;">Note down the </span><b><i><span style="font-family: LiberationSerif-BoldItalic; font-size: 14.5pt;">secret decryption key</span></i></b><span style="font-family: LiberationSerif; font-size: 14.5pt;">.<o:p></o:p></span></div>
<br />
<div class="MsoListParagraphCxSpLast" style="margin-bottom: 0.0001pt; text-indent: -0.25in;">
<!--[if !supportLists]--><span style="font-family: LiberationSerif; font-size: 14.5pt;">4.<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;">
</span></span><!--[endif]--><span style="font-family: LiberationSerif; font-size: 14.5pt;">Now you can send this image
to your friend via email. To decrypt the hidden message, your friend should
load this </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt;">JPG file </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt;">onto the </span><b><i><span style="font-family: LiberationSerif-BoldItalic; font-size: 14.5pt;">StegoMagic </span></i></b><span style="font-family: LiberationSerif; font-size: 14.5pt;">tool
and use the </span><b><i><span style="font-family: LiberationSerif-BoldItalic; font-size: 14.5pt;">secret decryption
key</span></i></b><span style="font-family: LiberationSerif; font-size: 14.5pt;">.<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpLast" style="margin-bottom: 0.0001pt; text-indent: -0.25in;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;"><br /></span></div>
<div class="MsoListParagraphCxSpLast" style="margin-bottom: 0.0001pt; text-indent: -0.25in;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;"><br /></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold; font-size: 16.5pt;">USING TOOLS FOR HIDING INFORMATION<o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">You can also use several open-source tools and programs to hide
important files and folders on a given system. Here is a list of are some of
the handy tools that you can use:<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold; font-size: 16.5pt;">1. </span></b><a href="http://cleanersoft.com/hidefolder/free_hide_folder.htm"><b><span style="font-family: LiberationSerif-Bold; font-size: 16.5pt; mso-bidi-font-family: LiberationSerif-Bold;">Free Hide Folder</span></b></a><b><span style="color: blue; font-family: LiberationSerif-Bold; font-size: 16.5pt; mso-bidi-font-family: LiberationSerif-Bold;"><o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">This is a freeware tool for Windows that can hide any number of
folders and make them go completely invisible for others. You also have the
option to password protect the program for additional safety.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5DxacmEztLMefJObZIhmF-gGuN3dmeL80kKEWdL1rJP9CV4lUiQGtZ4wMOFBUKvub0vvRZZ5f-06oViyRMM-58q566ckkPNFJkUWbjr5kYB66kqTNtBXIXzCqUXql_MVrj9xp3qxPuVg/s1600/FreeHideFolder_maininterface.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5DxacmEztLMefJObZIhmF-gGuN3dmeL80kKEWdL1rJP9CV4lUiQGtZ4wMOFBUKvub0vvRZZ5f-06oViyRMM-58q566ckkPNFJkUWbjr5kYB66kqTNtBXIXzCqUXql_MVrj9xp3qxPuVg/s1600/FreeHideFolder_maininterface.jpg" height="316" width="400" /></a></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold; font-size: 16.5pt;">2. </span></b><a href="http://www.wisecleaner.com/wisefolderhider.html"><b><span style="font-family: LiberationSerif-Bold; font-size: 16.5pt; mso-bidi-font-family: LiberationSerif-Bold;">Wise Folder Hider</span></b></a><b><span style="color: blue; font-family: LiberationSerif-Bold; font-size: 16.5pt; mso-bidi-font-family: LiberationSerif-Bold;"><o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt;">Wise Folder Hider </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt;">is a freeware used to hide your personal folder(s) or file(s) to
somewhere else in your PC or in removable devices, in which way you can protect
your privacy with passwords by following easy steps.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;"><br /></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiAOgJCiup93HohPOjj3sj66_vEM_5n4R2qhIN_PYVaLJt-qiTDNopilvgFx33k6jLimbQUgzcL4kib_e1F5NQldE3U_6EwBmrit07xAR85TVSTmbfUogA1Oh2p_O04XRx2jfJWsD58xc4/s1600/wise_folder_hider.PNG" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiAOgJCiup93HohPOjj3sj66_vEM_5n4R2qhIN_PYVaLJt-qiTDNopilvgFx33k6jLimbQUgzcL4kib_e1F5NQldE3U_6EwBmrit07xAR85TVSTmbfUogA1Oh2p_O04XRx2jfJWsD58xc4/s1600/wise_folder_hider.PNG" height="298" width="640" /></a><span style="font-family: LiberationSerif; font-size: 14.5pt;"><br /></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold; font-size: 16.5pt;">3. </span></b><a href="http://www.winmend.com/folder-hidden/"><b><span style="font-family: LiberationSerif-Bold; font-size: 16.5pt; mso-bidi-font-family: LiberationSerif-Bold;">WinMend
Folder Hidden</span></b></a><b><span style="color: blue; font-family: LiberationSerif-Bold; font-size: 16.5pt; mso-bidi-font-family: LiberationSerif-Bold;"><o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoListParagraphCxSpLast" style="margin-bottom: 0.0001pt; text-indent: -0.25in;">
</div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt;">WinMend Folder Hidden </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt;">is a free file/folder hiding tool. While ensuring the absolute
system safety, this application can quickly hide files and folders on local
partitions and/or on removable devices. The hidden files/folders will be safely
hidden whether the drive is accessed in another operating system on the same
computer or reinstalled on another computer. You can set a password for this
application. Hidden data can be displayed and unhidden only when the user
enters the valid password.<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpLast" style="margin-bottom: 0.0001pt; text-indent: -0.25in;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;"><br /></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgbyTuTSGVR3l_yJmlhPfQ8LhSAF3kiuTlCSwqlQ-FuuNiLtsjMjgK8q7iNp2vPLePrbGoUmeapoqA-ekhr7xnReCHcJ2sxBk3jKaaayTHNaANY6y5Tajye1odCNPCqdPMTRK_2Nmx7Beo/s1600/WinmendFolderHidden.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgbyTuTSGVR3l_yJmlhPfQ8LhSAF3kiuTlCSwqlQ-FuuNiLtsjMjgK8q7iNp2vPLePrbGoUmeapoqA-ekhr7xnReCHcJ2sxBk3jKaaayTHNaANY6y5Tajye1odCNPCqdPMTRK_2Nmx7Beo/s1600/WinmendFolderHidden.PNG" height="353" width="640" /></a></div>
<div class="MsoListParagraphCxSpLast" style="margin-bottom: 0.0001pt; text-indent: -0.25in;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;"><br /></span></div>
</div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3078132662608425729.post-10738163547622305772015-04-05T20:11:00.001-07:002015-04-11T19:32:02.159-07:00How To Conceal Your Identity?<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh2sC2CD20jhA_JhC31iqBnIl5e8LrlqGfOsGkkPmfeAV7bLpMq5wEPwSQcPKME3nQ2uM0qCXZjpiVwBqMT-0a-kIKJpmtbZNsgEQNepXPLoN-izjbQVehRTLSDO9idJZXmAfE2vyXZz3A/s1600/CONCEALING+YOUR+IDENTITY.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh2sC2CD20jhA_JhC31iqBnIl5e8LrlqGfOsGkkPmfeAV7bLpMq5wEPwSQcPKME3nQ2uM0qCXZjpiVwBqMT-0a-kIKJpmtbZNsgEQNepXPLoN-izjbQVehRTLSDO9idJZXmAfE2vyXZz3A/s1600/CONCEALING+YOUR+IDENTITY.png" height="377" width="640" /></a></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold; font-size: 16.5pt; mso-bidi-font-family: LiberationSerif-Bold;"><br /></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt; text-align: center;">
<b><span style="font-family: LiberationSerif-Bold; font-size: 16.5pt; mso-bidi-font-family: LiberationSerif-Bold;">CONCEALING YOUR IDENTITY<o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">Concealing
you true identity during the processes like footprinting and scanning is very much
necessary as there is a real chance of the target tracing back to you. Some of
the methods that you can employ to conceal your identity are discussed below.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold; font-size: 16.5pt; mso-bidi-font-family: LiberationSerif-Bold;">Using a Proxy<o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">A
proxy server can be used to conceal your real IP address while performing
scanning and hack attempts on the target. Since the IP address tells everything
about you, concealing it using a proxy can be highly effective in hiding your
origin.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">Even
though there are different types of proxies available, I recommend using a VPN proxy
service to hide your IP address. VPN services are fast and provide reliable
ways not only to hide your IP address but also to protect your data and
identity over the Internet.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">Here
are a few popular VPN services that you can try:<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<a href="https://www.hidemyass.com/"><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">HideMyAss Proxy</span></b></a><b><span style="color: blue; font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;"><o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<a href="http://www.goldenfrog.com/vyprvpn"><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">VyprVPN
Proxy</span></b></a><b><span style="color: blue; font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;"><o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">Alternatively you can also use a chain of public proxies to
further enhance your stealth operation using free tools like </span><a href="http://www.proxifier.com/"><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">Proxifier</span></b></a><b><span style="color: blue; font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;"> </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt;">and
</span><a href="http://www.ufasoft.com/socks/"><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">SocksChain</span></b></a><span style="font-family: LiberationSerif; font-size: 14.5pt;">. Please note that using public proxies can slow down your speed
and hence VPN proxies are more recommended as they best serve the purpose.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">The other way to hide your identity is by using online tools for
pinging and scanning the target. During the use of online tools, the IP address
of the server hosting the tools is exposed to the target and not the one that
belongs to the actual attacker.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">Once you have gathered a long list of information about the target
through </span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt;">footprinting </span></i><span style="font-family: LiberationSerif; font-size: 14.5pt;">and </span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt;">scanning</span></i><span style="font-family: LiberationSerif; font-size: 14.5pt;">, it is time to analyze them for possible vulnerabilities in the
operating</span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt;"> </span></i><span style="font-family: LiberationSerif; font-size: 14.5pt;">system, technologies or services running on the target. You can
make use of the following</span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt;">
</span></i><span style="font-family: LiberationSerif; font-size: 14.5pt;">websites to find information
about latest vulnerabilities and exploits:</span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt;"><o:p></o:p></span></i></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt;">1.</span><span style="color: blue; font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;"> <a href="http://www.securiteam.com/">http://www.securiteam.com</a><o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">2. </span><b><span style="color: blue; font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;"><a href="http://www.zone-h.org/">http://www.zone-h.org</a><o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">3. </span><b><span style="color: blue; font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;"><a href="http://www.securityfocus.com/">http://www.securityfocus.com</a><o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">4. </span><a href="http://www.packetstormsecurity.com/"><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">http://www.packetstormsecurity.com</span></b></a><b><span style="color: blue; font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;"><o:p></o:p></span></b></div>
<span style="font-family: LiberationSerif; font-size: 14.5pt; line-height: 107%;">5. </span><span style="font-family: "Calibri",sans-serif; font-size: 11.0pt; line-height: 107%; mso-ansi-language: EN-US; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: Mangal; mso-bidi-font-size: 10.0pt; mso-bidi-language: HI; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;"><a href="http://www.cybercrime.gov/"><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; line-height: 107%; mso-bidi-font-family: LiberationSerif-Bold;">http://www.cybercrime.gov</span></b></a></span></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3078132662608425729.post-36799869685327932952015-04-03T17:48:00.004-07:002015-04-11T19:32:27.736-07:00What is OS FINGERPRINTING?<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiXA7Ek5xjB2XyWi-2VbH4Eg-fnoM0UexLZATx5kpcClSK0xW3rZHBqIs6uKYuOa8CbFjfkj0WFYHvFH4pELJiDBp2tk6hQBJVZKQ9K_vCPLB3N8jdSKFck2OxCq6rwKDesGaP0jjz_lAM/s1600/OSfingerprinting.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiXA7Ek5xjB2XyWi-2VbH4Eg-fnoM0UexLZATx5kpcClSK0xW3rZHBqIs6uKYuOa8CbFjfkj0WFYHvFH4pELJiDBp2tk6hQBJVZKQ9K_vCPLB3N8jdSKFck2OxCq6rwKDesGaP0jjz_lAM/s1600/OSfingerprinting.png" height="366" width="640" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt;">OS fingerprinting </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt;">is the process of detecting the operating system of the target
host or a network. The following are some of the commonly used OS
fingerprinting methods.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold; font-size: 16.5pt;">Active Fingerprinting<o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt;">Active fingerprinting </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt;">is the method in which specially crafted packets are sent to the
target system and the response is noted. Since different operating systems
respond to source packets in different ways, this response can be analyzed to
determine the target OS.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">One of the simple example is the use of </span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt;">Nmap tool </span></i><span style="font-family: LiberationSerif; font-size: 14.5pt;">as discussed in the post (url of what_is_scanning Post) which employs </span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt;">active fingerprinting </span></i><span style="font-family: LiberationSerif; font-size: 14.5pt;">method to determine the target OS.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="color: #a60000; font-family: LiberationSerif-Bold; font-size: 16.5pt; mso-bidi-font-family: LiberationSerif-Bold;">Banner Grabbing<o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">Another commonly used method of active fingerprinting is called </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt;">banner grabbing</span></b><span style="font-family: LiberationSerif; font-size: 14.5pt;">. This can be done using a simple tool called </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt;">telnet</span></b><span style="font-family: LiberationSerif; font-size: 14.5pt;">.
Telnet is readily available on Windows XP and previous versions. For Windows
Vista, 7 and 8 machines you need to activate the inbuilt telnet tool before you
can use it. Just search for “how to enable telnet on windows” on Google to find
detailed instructions for enabling telnet client on your computer. Once you
have enabled the telnet client on your computer, banner grabbing is pretty
simple. Just type the following command in the command prompt to detect the
operating system running on the target:<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold;">telnet </span></b><span style="font-family: LiberationSerif;">target-domain-or-IP 80<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">This will open the connection with the target. Next type the text
exactly as follows </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt;">HEAD / HTTP/1.1 </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt;">and hit the </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt;">Enter
</span></b><span style="font-family: LiberationSerif; font-size: 14.5pt;">key twice. This should fetch
results where there is a</span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt;"> </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt;">possibility of the target OS being mentioned as shown in the below
figure.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold; font-size: 16.5pt;">Passive Fingerprinting<o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt;">Passive fingerprinting </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt;">is a technique that uses indirect methods to determine the target
operating system. Unlike active fingerprinting which sends packets to the
target, passive fingerprinting on the other hand uses sniffing technique to analyze
the target network traffic and determine the operating system. It is less
accurate than active fingerprinting. You can use online tools like </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt;">Netcraft </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt;">to perform passive fingerprinting.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold;">Netcraft Tool: </span></b><b><span style="color: blue; font-family: LiberationSerif-Bold; mso-bidi-font-family: LiberationSerif-Bold; mso-bidi-font-size: 11.0pt;">http://toolbar.netcraft.com/site_report<o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<span style="font-family: LiberationSerif; font-size: 14.5pt; line-height: 107%;">Just visit the above link to access the Netcraft tool and
enter the target domain or IP as shown in this figure</span><br />
<span style="font-family: LiberationSerif; font-size: 14.5pt; line-height: 107%;"><br /></span>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjvuVd3gCBGs5k-kSmEkn9Aic98HysWtGl9d9iUtKiMrYYEyhLLx1VGQdAb4iRM8Zc945jH6czCMPTNGLTeMcFWVLciiq55ppQr7BAcbCJ7qBxJM1zxVz2lInlTWibbUae2pUGKI3r8FPo/s1600/netcraft.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjvuVd3gCBGs5k-kSmEkn9Aic98HysWtGl9d9iUtKiMrYYEyhLLx1VGQdAb4iRM8Zc945jH6czCMPTNGLTeMcFWVLciiq55ppQr7BAcbCJ7qBxJM1zxVz2lInlTWibbUae2pUGKI3r8FPo/s1600/netcraft.PNG" height="411" width="640" /></a></div>
<span style="font-family: LiberationSerif; font-size: 14.5pt; line-height: 107%;"><br /></span></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3078132662608425729.post-91361927692217826102015-04-01T18:01:00.001-07:002015-04-11T19:32:51.392-07:00What is Scanning?<div dir="ltr" style="text-align: left;" trbidi="on">
<span style="font-family: LiberationSerif; font-size: 14.5pt; line-height: 107%; mso-ansi-language: EN-US; mso-bidi-font-family: LiberationSerif; mso-bidi-language: HI; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;"><br /></span>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhFjQGcujJeq0Ro6LOnI_WOi1Clnftmzpr2ce9WqG_rt4nxsN_lPuuSECiUW2Wkab4mpY5_fNRADobekCA9tySutiMKrq8DIDTprtSUNiJ8vlIfwasGGXz_pT0nPdD9hqq9q3PHKnA9EbA/s1600/WhatisScanning.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhFjQGcujJeq0Ro6LOnI_WOi1Clnftmzpr2ce9WqG_rt4nxsN_lPuuSECiUW2Wkab4mpY5_fNRADobekCA9tySutiMKrq8DIDTprtSUNiJ8vlIfwasGGXz_pT0nPdD9hqq9q3PHKnA9EbA/s1600/WhatisScanning.png" height="348" width="640" /></a></div>
<span style="font-family: LiberationSerif; font-size: 14.5pt; line-height: 107%; mso-ansi-language: EN-US; mso-bidi-font-family: LiberationSerif; mso-bidi-language: HI; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;"><br /></span>
<span style="font-family: LiberationSerif; font-size: 14.5pt; line-height: 107%; mso-ansi-language: EN-US; mso-bidi-font-family: LiberationSerif; mso-bidi-language: HI; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;">After gathering a variety of
information about the target through </span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt; line-height: 107%; mso-ansi-language: EN-US; mso-bidi-font-family: LiberationSerif-Italic; mso-bidi-language: HI; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;">footprinting</span></i><span style="font-family: LiberationSerif; font-size: 14.5pt; line-height: 107%; mso-ansi-language: EN-US; mso-bidi-font-family: LiberationSerif; mso-bidi-language: HI; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;">, it is time to move on to the next step called </span><b><i><span style="font-family: LiberationSerif-BoldItalic; font-size: 14.5pt; line-height: 107%; mso-ansi-language: EN-US; mso-bidi-font-family: LiberationSerif-BoldItalic; mso-bidi-language: HI; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;">scanning</span></i></b><span style="font-family: LiberationSerif; font-size: 14.5pt; line-height: 107%; mso-ansi-language: EN-US; mso-bidi-font-family: LiberationSerif; mso-bidi-language: HI; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;">.
Scanning is the second step in the intelligence gathering process of a hacker
where information about specific IP addresses, operating systems, their
architecture and services running on computers can be obtained. Unlike </span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt; line-height: 107%; mso-ansi-language: EN-US; mso-bidi-font-family: LiberationSerif-Italic; mso-bidi-language: HI; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;">footprinting </span></i><span style="font-family: LiberationSerif; font-size: 14.5pt; line-height: 107%; mso-ansi-language: EN-US; mso-bidi-font-family: LiberationSerif; mso-bidi-language: HI; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;">which
gathers information passively from various third party sources, </span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt; line-height: 107%; mso-ansi-language: EN-US; mso-bidi-font-family: LiberationSerif-Italic; mso-bidi-language: HI; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;">scanning </span></i><span style="font-family: LiberationSerif; font-size: 14.5pt; line-height: 107%; mso-ansi-language: EN-US; mso-bidi-font-family: LiberationSerif; mso-bidi-language: HI; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;">involves
actively engaging with the target to obtain information</span><br />
<span style="font-family: LiberationSerif; font-size: 14.5pt; line-height: 107%; mso-ansi-language: EN-US; mso-bidi-font-family: LiberationSerif; mso-bidi-language: HI; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;"><br /></span>
<br />
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold; font-size: 16.5pt;">DETECTING LIVE SYSTEMS<o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold; font-size: 16.5pt;"><br /></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">The first step in the process of scanning is to determine whether
the target is alive or not.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; line-height: 107%;">This can be done using the </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; line-height: 107%;">ping </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; line-height: 107%;">tool that is readily available on both Windows and Linux computers. Just
open the command prompt if you are on Windows or terminal window if you are on
Linux and type ping followed by the target IP address as shown below:</span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; line-height: 107%;"><br /></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold;">ping</span></b><span style="font-family: LiberationSerif; font-size: 14.5pt;"> www.info-website.net<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;"><br /></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">or </span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;"><br /></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold;">ping</span></b><span style="font-family: LiberationSerif; font-size: 14.5pt;"> 199.79.62.128<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold; font-size: 16.5pt;"><br /></span></b></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimuc4RnEV8PlWmP-BNkMqe1zEaI99Nd7XaFBEbe_slbTGjYOAi1cW_0AEBZJ_jpt3vzmZ2H87LbXoxuIl1gjg456Fc2Lpx1aC8lYJ_BMQIKio8OtOAowufdh0miFHCQPPj5m-nZtnk1sc/s1600/ping.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimuc4RnEV8PlWmP-BNkMqe1zEaI99Nd7XaFBEbe_slbTGjYOAi1cW_0AEBZJ_jpt3vzmZ2H87LbXoxuIl1gjg456Fc2Lpx1aC8lYJ_BMQIKio8OtOAowufdh0miFHCQPPj5m-nZtnk1sc/s1600/ping.PNG" height="282" width="640" /></a></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold; font-size: 16.5pt;"><br /></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">If the target is alive and online, you should get a reply from the
target or you if the target is not alive you will get a response saying “ping
request could not find the host www.kevallink.com”.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;"><br /></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgaZRRjoJLJeX9eXBgJsG6cFKkkBgwIe1dp2mk656RAKsYc1NnOBdeQgPOHV5Tr8IeDcK0pOzE30n7-e1hS8bR-k_tHqXb6DWRrVViEf2gVDRfedYNi5N4bHY6Ri8MDTnqupOghdGyZ95Y/s1600/pingfails.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgaZRRjoJLJeX9eXBgJsG6cFKkkBgwIe1dp2mk656RAKsYc1NnOBdeQgPOHV5Tr8IeDcK0pOzE30n7-e1hS8bR-k_tHqXb6DWRrVViEf2gVDRfedYNi5N4bHY6Ri8MDTnqupOghdGyZ95Y/s1600/pingfails.PNG" height="124" width="640" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="color: #a60000; font-family: LiberationSerif-Bold; font-size: 16.5pt; mso-bidi-font-family: LiberationSerif-Bold;">Angry IP Scanner<o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="color: #a60000; font-family: LiberationSerif-Bold; font-size: 16.5pt; mso-bidi-font-family: LiberationSerif-Bold;"><br /></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">You can even ping a range of IP addresses all at once using a nice
tool called “Angry IP Scanner”. It is an open-source cross-platform network
scanner tool packed with several useful features.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
</div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">All you need to do is enter the </span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt;">starting </span></i><span style="font-family: LiberationSerif; font-size: 14.5pt;">and the </span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt;">ending </span></i><span style="font-family: LiberationSerif; font-size: 14.5pt;">IP of the range that you want to ping and click on the “Start”
button as shown in the below figure. This should tell you which of those IPs
are available and which are not.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;"><br /></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgavkDqYAui75Uc1TbjMbuA1_o1aAaihn3eTEDHvsBl5O9kcJiYeHOr3QDKI8aSwumYO3zSq2ZJ3CxvXXeJriunQrdY5wDqLLWN5IyQSswg8siaveV7JXfiA_fV08qIyM_p4iFrGKqckls/s1600/Angry+ip+scanner.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgavkDqYAui75Uc1TbjMbuA1_o1aAaihn3eTEDHvsBl5O9kcJiYeHOr3QDKI8aSwumYO3zSq2ZJ3CxvXXeJriunQrdY5wDqLLWN5IyQSswg8siaveV7JXfiA_fV08qIyM_p4iFrGKqckls/s1600/Angry+ip+scanner.PNG" /></a></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;"><br /></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">Angry IP Scanner is available for both Windows and Linux operating
systems and can be<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">Downloaded from the link below:<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
</div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold;">Angry IP Scanner: </span></b><b><span style="font-family: LiberationSerif-Bold; mso-bidi-font-family: LiberationSerif-Bold; mso-bidi-font-size: 11.0pt;"><a href="http://angryip.org/download/">http://angryip.org/download/</a></span></b><b><span style="color: blue; font-family: LiberationSerif-Bold; mso-bidi-font-family: LiberationSerif-Bold; mso-bidi-font-size: 11.0pt;"><o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><br /></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="color: #a60000; font-family: LiberationSerif-Bold; font-size: 16.5pt; mso-bidi-font-family: LiberationSerif-Bold;">Online Ping Tool<o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">If you would like to ping the target using a third party computer
instead of yours, you can do so using online tools like </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt;">Just-Ping </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt;">which pings the target from 90 different geo locations worldwide.
You can access Just-Ping tool from the link below:<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
</div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold;">Just-Ping: </span></b><b><span style="color: blue; font-family: LiberationSerif-Bold; mso-bidi-font-family: LiberationSerif-Bold; mso-bidi-font-size: 11.0pt;">http://cloudmonitor.ca.com/en/ping.php<o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="color: blue; font-family: LiberationSerif-Bold; mso-bidi-font-family: LiberationSerif-Bold; mso-bidi-font-size: 11.0pt;"><br /></span></b></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJqwNuFPOq0v4suqr0qsxe_nf90nD_3bC4UK0N5ND055A_wOkHkEzyTtLmwGtQF9MzsqzKK_i3voENoFynuHT-3Rt1vxdecP4T_rXDPNi1whIAUFNt1fOEseHL7zT_iS62E60yTipSc5Q/s1600/cloudmonitor_ping.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJqwNuFPOq0v4suqr0qsxe_nf90nD_3bC4UK0N5ND055A_wOkHkEzyTtLmwGtQF9MzsqzKK_i3voENoFynuHT-3Rt1vxdecP4T_rXDPNi1whIAUFNt1fOEseHL7zT_iS62E60yTipSc5Q/s1600/cloudmonitor_ping.PNG" /></a></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="color: blue; font-family: LiberationSerif-Bold; mso-bidi-font-family: LiberationSerif-Bold; mso-bidi-font-size: 11.0pt;"><br /></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold; font-size: 16.5pt; mso-bidi-font-family: LiberationSerif-Bold;">TYPES OF SCANNING<o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">Now,
let us discuss one by one some of the different types of scanning that are in
place.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold; font-size: 16.5pt; mso-bidi-font-family: LiberationSerif-Bold;"><span style="color: #134f5c;">Port Scanning</span></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">Port scanning </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">involves
sending a series of messages to the target computer to discover the types of
network services running on it. Since each service is associated with a “well
known” port number, performing a port scan on the target will reveal the ports
that are open. So, when a port is said to be open the service associated with
it is said to be active and running, thereby opening up the opportunity for the
attacker to break into it.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">For
example, if a port scan on the target shows that port 80 and port 25 are open,
that means the target computer has a HTTP service (web server) and an SMTP
service (email service) running on it respectively.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold; font-size: 16.5pt; mso-bidi-font-family: LiberationSerif-Bold;"><span style="color: #134f5c;">Network Scanning</span><o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">Network scanning </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">is a
procedure for identifying active hosts on the target network either for the
purpose of attacking them or for security assessment. In this way it would be
possible for the hacker to make a list of vulnerable hosts for direct attack or
to use them indirectly to attack other hosts.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold; font-size: 16.5pt; mso-bidi-font-family: LiberationSerif-Bold;"><span style="color: #134f5c;">Vulnerability Scanning</span><o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">Vulnerability scanning </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">involves
the use of automated tools known as </span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Italic;">vulnerability
scanners </span></i><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">to proactively identify security
vulnerabilities of computer systems in a network.</span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Italic;"><o:p></o:p></span></i></div>
<br />
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">These
tools will scan the target to find out the presence of known flaws that are
susceptible to exploits.<o:p></o:p></span></div>
</div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;"><br /></span>
<br />
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold; font-size: 16.5pt;">TOOLS FOR SCANNING<o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">The following are some of the popular tools available for
scanning:<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold; font-size: 16.5pt;"><span style="color: #0b5394;">Nmap</span><o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt;">Nmap </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt;">is
a popular open-source tool for network discovery and security auditing that
works on different platforms like Linux, Windows and Mac. It basically comes in
the form of a command line interface; however, to facilitate the ease of use it
is also available in a GUI format called </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt;">Zenmap</span></b><span style="font-family: LiberationSerif; font-size: 14.5pt;">. For Windows machines, you
can install the “self-installer” version of </span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt;">Nmap </span></i><span style="font-family: LiberationSerif; font-size: 14.5pt;">that comes in the “.exe”
format. The download link for the same in available below:<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<br />
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold;">Nmap Download: </span></b><b><span style="color: blue; font-family: LiberationSerif-Bold; mso-bidi-font-family: LiberationSerif-Bold; mso-bidi-font-size: 11.0pt;">http://nmap.org/download.html<o:p></o:p></span></b></div>
</div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;"><br /></span>
<br />
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">After installing the tool, run the desktop shortcut to open the </span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt;">Zenmap </span></i><span style="font-family: LiberationSerif; font-size: 14.5pt;">window which typically looks as shown below:<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhrS32OlEwxnNJ6LBmAszjedZrthAbqgSafgOWH2Q2c1Phj0aK0WJnqBPsmnNYGOs9cRZG4fZrzV89Jt4wPzPWS4iGjlEzca0evD5rE_selUvFp0-RGMG3yvjIa4yf4Rld2LXD_Vp8ewYs/s1600/zenmapmenu.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhrS32OlEwxnNJ6LBmAszjedZrthAbqgSafgOWH2Q2c1Phj0aK0WJnqBPsmnNYGOs9cRZG4fZrzV89Jt4wPzPWS4iGjlEzca0evD5rE_selUvFp0-RGMG3yvjIa4yf4Rld2LXD_Vp8ewYs/s1600/zenmapmenu.PNG" height="401" width="640" /></a></div>
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">The “Target” box needs to be filled with the target </span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt;">IP address </span></i><span style="font-family: LiberationSerif; font-size: 14.5pt;">or </span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt;">domain name </span></i><span style="font-family: LiberationSerif; font-size: 14.5pt;">on which you want to perform the scan. It also comes pre loaded
with 10 different </span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt;">scan profiles </span></i><span style="font-family: LiberationSerif; font-size: 14.5pt;">that you can select from.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="color: #a60000; font-family: LiberationSerif-Bold; font-size: 16.5pt; mso-bidi-font-family: LiberationSerif-Bold;">Intense Scan<o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">This scan type should be reasonably quick as it only scans TCP
ports. Additionally, it makes an attempt to detect the OS type, various
services and their version numbers that are running on the target machine.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="color: #a60000; font-family: LiberationSerif-Bold; font-size: 16.5pt; mso-bidi-font-family: LiberationSerif-Bold;">Intense Scan Plus UDP<o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">It is the same </span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt;">Intense
scan </span></i><span style="font-family: LiberationSerif; font-size: 14.5pt;">as described above but also
includes scanning of UDP ports.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="color: #a60000; font-family: LiberationSerif-Bold; font-size: 16.5pt; mso-bidi-font-family: LiberationSerif-Bold;">Intense Scan, all TCP Ports<o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">Unlike the normal </span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt;">Intense scan </span></i><span style="font-family: LiberationSerif; font-size: 14.5pt;">which only
scans a list of 1000 most common ports, the “</span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt;">Intense scan, all TCP ports</span></i><span style="font-family: LiberationSerif; font-size: 14.5pt;">”
scans all available 65535 ports.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="color: #a60000; font-family: LiberationSerif-Bold; font-size: 16.5pt; mso-bidi-font-family: LiberationSerif-Bold;">Intense Scan, No Ping<o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">This option will exclude pinging the target from the </span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt;">Intense scan</span></i><span style="font-family: LiberationSerif; font-size: 14.5pt;">. You may use this option when you already know that the target is
up or is blocking ping requests.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="color: #a60000; font-family: LiberationSerif-Bold; font-size: 16.5pt; mso-bidi-font-family: LiberationSerif-Bold;">Ping Scan<o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">This option will only ping the target but does not perform port
scanning of any type.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="color: #a60000; font-family: LiberationSerif-Bold; font-size: 16.5pt; mso-bidi-font-family: LiberationSerif-Bold;">Quick Scan<o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">Scans faster than the </span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt;">Intense scan </span></i><span style="font-family: LiberationSerif; font-size: 14.5pt;">by limiting
the number of TCP ports scanned to only the top 100 most common TCP ports.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="color: #a60000; font-family: LiberationSerif-Bold; font-size: 16.5pt; mso-bidi-font-family: LiberationSerif-Bold;">Quick Scan Plus<o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt;">Quick scan plus </span></i><span style="font-family: LiberationSerif; font-size: 14.5pt;">adds OS detection and a bit of version detection features to </span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt;">Quick scan</span></i><span style="font-family: LiberationSerif; font-size: 14.5pt;">.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="color: #a60000; font-family: LiberationSerif-Bold; font-size: 16.5pt; mso-bidi-font-family: LiberationSerif-Bold;">Quick Traceroute<o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">This option will show you the route that the packets take to reach
the target starting with the localhost (source or your own computer).<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="color: #a60000; font-family: LiberationSerif-Bold; font-size: 16.5pt; mso-bidi-font-family: LiberationSerif-Bold;">Regular Scan<o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">This will perform the ping and TCP port scan of 1000 default ports
on the target.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="color: #a60000; font-family: LiberationSerif-Bold; font-size: 16.5pt; mso-bidi-font-family: LiberationSerif-Bold;">Slow Comprehensive Scan<o:p></o:p></span></b></div>
<span style="font-family: LiberationSerif; font-size: 14.5pt; line-height: 107%;">This scan will try all possible options to uncover as
much information as it can about the target. It uses three different protocols:
TCP, UDP and SCTP in order to detect hosts. Out of all the 10 scanning options,
I reckon </span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt; line-height: 107%;">Intense Scan </span></i><span style="font-family: LiberationSerif; font-size: 14.5pt; line-height: 107%;">to be appropriate under most conditions. Just fill the
“Target” box, select the “Intense scan” profile and hit the “Scan” button. Let
us now analyze the Nmap result output by running it on a sample target. After
the scan is completed the “Nmap Output” tab displays the raw output of all the
scan operations such as the </span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt; line-height: 107%;">date and time </span></i><span style="font-family: LiberationSerif; font-size: 14.5pt; line-height: 107%;">it was performed, the
results from </span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt; line-height: 107%;">ping scan</span></i><span style="font-family: LiberationSerif; font-size: 14.5pt; line-height: 107%;">, discovered </span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt; line-height: 107%;">open ports</span></i><span style="font-family: LiberationSerif; font-size: 14.5pt; line-height: 107%;">, </span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt; line-height: 107%;">target OS </span></i><span style="font-family: LiberationSerif; font-size: 14.5pt; line-height: 107%;">and </span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt; line-height: 107%;">traceroute results </span></i><span style="font-family: LiberationSerif; font-size: 14.5pt; line-height: 107%;">as shown below:</span><br />
<span style="font-family: LiberationSerif; font-size: 14.5pt; line-height: 107%;"><br /></span>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiwe1UbseTa_44X1ZQ287H8XLtHNegRN4cJk0uGGs8BVaA0js-ZHEz2ksgctfLh0DfO7svOqiaaeuPQuEtlBpBtJMXmYr18hLVpnP8JA3xpyTCA6RI7bthceeLHEZt4Y-r0QpHrROnVh5s/s1600/nampoutput.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiwe1UbseTa_44X1ZQ287H8XLtHNegRN4cJk0uGGs8BVaA0js-ZHEz2ksgctfLh0DfO7svOqiaaeuPQuEtlBpBtJMXmYr18hLVpnP8JA3xpyTCA6RI7bthceeLHEZt4Y-r0QpHrROnVh5s/s1600/nampoutput.png" height="640" width="556" /></a></div>
<span style="font-family: LiberationSerif; font-size: 14.5pt; line-height: 107%;"><br /></span>
<span style="font-family: LiberationSerif; font-size: 14.5pt; line-height: 107%;"><br /></span>
<span style="font-family: LiberationSerif;"><span style="font-size: 19.3333339691162px; line-height: 20.6866683959961px;">The other tabs split the same results into an organized manner so as to display them in a </span></span><span style="font-family: LiberationSerif; font-size: 19.3333339691162px; line-height: 20.6866683959961px;">more user friendly manner using GUI interface. The “Ports/Hosts” tab will display a list of </span><span style="font-family: LiberationSerif; font-size: 19.3333339691162px; line-height: 20.6866683959961px;">discovered ports, their status as to whether they are closed or open, the protocol associated </span><span style="font-family: LiberationSerif; font-size: 19.3333339691162px; line-height: 20.6866683959961px;">and the services running on them. A snapshot of the sample output is shown below:</span><br />
<span style="font-family: LiberationSerif;"><span style="font-size: 19.3333339691162px; line-height: 20.6866683959961px;"><br /></span></span>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqQS12l1wL-QQ03yzNMcI6YuQGCWtYKWk7smti0uhn4VVVYaBLUx4bGikcw6C1djVKUA6Y5gFH32YWZJLMVPqdtUaO-oF0OUv93XJxBrxoqzRA-x_3fXCxK8b-12ggXmzHO89WUHqxric/s1600/nmapport.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqQS12l1wL-QQ03yzNMcI6YuQGCWtYKWk7smti0uhn4VVVYaBLUx4bGikcw6C1djVKUA6Y5gFH32YWZJLMVPqdtUaO-oF0OUv93XJxBrxoqzRA-x_3fXCxK8b-12ggXmzHO89WUHqxric/s1600/nmapport.png" height="588" width="640" /></a></div>
<span style="font-family: LiberationSerif;"><span style="font-size: 19.3333339691162px; line-height: 20.6866683959961px;"><br /></span></span>
<span style="font-family: LiberationSerif;"><span style="font-size: 19.3333339691162px; line-height: 20.6866683959961px;">The “Topology” tab displays the result of traceroute command in a graphical manner </span></span><span style="font-family: LiberationSerif; font-size: 19.3333339691162px; line-height: 20.6866683959961px;">showing each hop involved in the path.</span><br />
<span style="font-family: LiberationSerif; font-size: 19.3333339691162px; line-height: 20.6866683959961px;"><br /></span>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEihy1wOUXVPyC_mXyR5pfkHxNxUKUVFz9uiMxB-HvzO9VJhySix0RD20SFRnIBssQDw3jB4nstrZgwhUYrTqK0KWoD-y66n-SSyB0GxdFyt9wXzMb3KP4g2d1B8MkO6D6lSHYOel5UXaoY/s1600/nmaptopology.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEihy1wOUXVPyC_mXyR5pfkHxNxUKUVFz9uiMxB-HvzO9VJhySix0RD20SFRnIBssQDw3jB4nstrZgwhUYrTqK0KWoD-y66n-SSyB0GxdFyt9wXzMb3KP4g2d1B8MkO6D6lSHYOel5UXaoY/s1600/nmaptopology.png" height="640" width="608" /></a></div>
<span style="font-family: LiberationSerif; font-size: 19.3333339691162px; line-height: 20.6866683959961px;"><br /></span>
<span style="font-family: LiberationSerif;"><span style="font-size: 19.3333339691162px; line-height: 20.6866683959961px;"><br /></span></span>
<br />
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">The “Host
Details” tab shows the status of the host, its name, number of ports scanned, uptime,
last boot time, type of operating system running including its version number
and many other details as shown in the below figure:<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;"><br /></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjKihF91L_jIp2uZ1UnL_EmG2OhJa_vqoTI3smqdvvJQqc16F0yQ2phflDXX50ozqdXn8kGUgnw8ttNRoUaXOkf5vzYrExrqxz2GeqOqvB0GmCwG1v8qDSRw0LnK4i8aCwdmTqzOvwvMiA/s1600/hostdetails.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjKihF91L_jIp2uZ1UnL_EmG2OhJa_vqoTI3smqdvvJQqc16F0yQ2phflDXX50ozqdXn8kGUgnw8ttNRoUaXOkf5vzYrExrqxz2GeqOqvB0GmCwG1v8qDSRw0LnK4i8aCwdmTqzOvwvMiA/s1600/hostdetails.png" height="640" width="608" /></a></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;"><br /></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold; font-size: 16.5pt; mso-bidi-font-family: LiberationSerif-Bold;">NetScanTools Pro<o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; line-height: 107%; mso-ansi-language: EN-US; mso-bidi-font-family: LiberationSerif-Bold; mso-bidi-language: HI; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;">NetScanTools Pro </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; line-height: 107%; mso-ansi-language: EN-US; mso-bidi-font-family: LiberationSerif; mso-bidi-language: HI; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;">is
another wonderful program for Windows that has a powerful set of over 50
network tools including both automated and manual ways to retrieve information from
the target.</span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; line-height: 107%; mso-ansi-language: EN-US; mso-bidi-font-family: LiberationSerif; mso-bidi-language: HI; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;"><br /></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiEt3OmPejeNfnkJes0ZSjICNYf5PgOWAN-5A_Nn-WBb9bmMsP82zikTZ2vMZnbTCE7Umf8o680Cs-dEQH4c8sDvT94sTw-cLSWUw9ej_P9hx4IQucuuXn9wQ69LnCta3tAkVHxH2isBAc/s1600/nstprov11portscan.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiEt3OmPejeNfnkJes0ZSjICNYf5PgOWAN-5A_Nn-WBb9bmMsP82zikTZ2vMZnbTCE7Umf8o680Cs-dEQH4c8sDvT94sTw-cLSWUw9ej_P9hx4IQucuuXn9wQ69LnCta3tAkVHxH2isBAc/s1600/nstprov11portscan.gif" height="485" width="640" /></a></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; line-height: 107%; mso-ansi-language: EN-US; mso-bidi-font-family: LiberationSerif; mso-bidi-language: HI; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;"><br /></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; line-height: 107%; mso-ansi-language: EN-US; mso-bidi-font-family: LiberationSerif; mso-bidi-language: HI; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;">You can use the “Automated
Tools” to quickly perform port scan and grab vital information about the target
such as DNS records, Whois data, Traceroute details all from a single place. On
the other hand the “Manual Tools” section contains individual tools specially
crafted to give more control in the scanning process for advanced users.</span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; line-height: 107%; mso-ansi-language: EN-US; mso-bidi-font-family: LiberationSerif; mso-bidi-language: HI; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;"><br /></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold; font-size: 16.5pt;">Online Tools<o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">You can also make use of online tools to perform port scan and
discover important information about the target. The following are some of the
links useful online network tools that are worth considering:<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="color: blue; font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">PenTest-Tools: https://pentest-tools.com/home<o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="color: blue; font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">YouGetSignal: http://www.yougetsignal.com/<o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold; font-size: 16.5pt;">Other Popular Tools<o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">Here is a list of some of the other popular tools that you may
want to explore:<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="color: blue; font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">SuperScan: </span></b><b><span style="color: blue; font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">http://www.mcafee.com/in/downloads/free-tools/superscan.aspx</span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
</div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="color: blue; font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">ipEye: http://www.ntsecurity.nu/toolbox/ipeye/</span></b><span style="font-family: LiberationSerif; font-size: 14.5pt;"><o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="color: blue; font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;"><br /></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="color: blue; font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;"><br /></span></b></div>
</div>
</div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3078132662608425729.post-49929666169284471772015-03-21T19:12:00.000-07:002015-04-11T19:42:37.388-07:00What is Footprinting?<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="MsoListParagraph" style="margin-bottom: 0.0001pt; text-indent: -0.25in;">
<!--[if !supportLists]--><span style="font-family: Symbol; font-size: 14.5pt; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;"> </span><span style="font-family: 'Times New Roman'; font-stretch: normal;"> </span></span><br />
<div class="separator" style="clear: both; text-align: center;">
<span style="font-family: Symbol; font-size: 14.5pt; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;"><span style="font-family: 'Times New Roman'; font-stretch: normal;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjDFUflwy54zCBN0XNwox9WRVZ869AOzC-prprqy1Xeb29d-mL0EcGm31GrXskqFGR5sueMuowAdJ_jK4rsSev-yz4ayUSqBt86xguFqnrFHcijJUUpGm3JP7LdXi3_VFgU4RQFTqSfJeM/s1600/footprinting2.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjDFUflwy54zCBN0XNwox9WRVZ869AOzC-prprqy1Xeb29d-mL0EcGm31GrXskqFGR5sueMuowAdJ_jK4rsSev-yz4ayUSqBt86xguFqnrFHcijJUUpGm3JP7LdXi3_VFgU4RQFTqSfJeM/s1600/footprinting2.png" height="408" width="640" /></a></span></span></div>
<div class="separator" style="clear: both; text-align: center;">
<span style="font-family: Symbol; font-size: 14.5pt; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;"><span style="font-family: 'Times New Roman'; font-stretch: normal;"><br /></span></span></div>
<div class="separator" style="clear: both; text-align: center;">
<span style="font-family: Symbol; font-size: 14.5pt; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;"><span style="font-family: 'Times New Roman'; font-stretch: normal;"><br /></span></span></div>
<span style="font-family: LiberationSerif; font-size: 14.5pt; text-indent: -0.25in;"><b>Footprinting</b></span><span style="text-indent: -0.25in;"><span style="font-family: LiberationSerif;"><span style="font-size: 14.5pt;"> refers to the process of
gathering information about a specific computer system or a network environment
and the company it </span><span style="font-size: 19.3333339691162px;">belongs</span><span style="font-size: 14.5pt;"> to.</span></span></span><br />
<u1:p></u1:p>
<br />
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in; text-indent: -.25in;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">· This is the preparatory phase for
the hacker where he gathers as much information as he can so as to find ways to
intrude into the target.<o:p></o:p></span></div>
<u1:p></u1:p>
<br />
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in; text-indent: -.25in;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">· Footprinting can reveal the
vulnerabilities of the target system and improve the ways in which they can be
exploited.<o:p></o:p></span></div>
<u1:p></u1:p>
<br />
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<span style="font-family: LiberationSerif; font-size: 14.5pt; line-height: 107%;"> Footprinting has to be done in
a slow and methodological manner where the hacker spends 90% of his time in
blueprinting the security profile of the target and only 10% in launching the
attack. Footprinting can actually help hacker decide on the type of attack that
is most suitable for the target.</span><br />
<span style="font-family: LiberationSerif; font-size: 14.5pt; line-height: 107%;"><br /></span></div>
<div class="MsoListParagraph" style="margin-bottom: 0.0001pt; text-indent: -0.25in;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;"><br /></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold; font-size: 16.5pt; mso-bidi-font-family: LiberationSerif-Bold;"><span style="font-size: large;">INFORMATION GATHERING METHODOLOGY</span><o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold; font-size: 16.5pt; mso-bidi-font-family: LiberationSerif-Bold;"><br /></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold; font-size: x-small; line-height: 107%; mso-ansi-language: EN-US; mso-bidi-font-family: LiberationSerif-Bold; mso-bidi-language: HI; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;">Obtaining the Domain Name
Information</span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold; font-size: 16.5pt; line-height: 107%; mso-ansi-language: EN-US; mso-bidi-font-family: LiberationSerif-Bold; mso-bidi-language: HI; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;"><br /></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">Various background information about the target website (domain
name) such as the name of its </span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt;">owner </span></i><span style="font-family: LiberationSerif; font-size: 14.5pt;">and </span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt;">registrar</span></i><span style="font-family: LiberationSerif; font-size: 14.5pt;">, </span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt;">date of its
registration</span></i><span style="font-family: LiberationSerif; font-size: 14.5pt;">, </span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt;">expiry date</span></i><span style="font-family: LiberationSerif; font-size: 14.5pt;">, </span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt;">name servers </span></i><span style="font-family: LiberationSerif; font-size: 14.5pt;">associated, contact details associated with it such as </span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt;">email</span></i><span style="font-family: LiberationSerif; font-size: 14.5pt;">, </span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt;">phone </span></i><span style="font-family: LiberationSerif; font-size: 14.5pt;">and </span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt;">address </span></i><span style="font-family: LiberationSerif; font-size: 14.5pt;">can be found out by performing a </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt;">Whois lookup</span></b><span style="font-family: LiberationSerif; font-size: 14.5pt;">. The
following are some of the popular websites where you can perform Whois lookup
on any domain to uncover its background information:<o:p></o:p></span><br />
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<span style="font-family: LiberationSerif; font-size: 14.5pt;"><br /></span>
<br />
<div class="MsoNormal" style="margin-bottom: 0.0001pt; text-align: left;">
<b><span style="font-family: LiberationSerif-Bold;"><span style="color: #6aa84f; font-size: large;">https://who.is/</span></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt; text-align: left;">
<span style="font-family: Calibri, sans-serif; line-height: 107%;"><b><span style="font-family: LiberationSerif-Bold; line-height: 107%;"><span style="color: #6aa84f; font-size: large;"><a href="http://www.whois.com/whois/">http://www.whois.com/whois/</a></span></span></b></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt; text-align: left;">
<b><span style="font-family: LiberationSerif-Bold;"><a href="http://whois.domaintools.com/"><span style="text-decoration: none;"><span style="color: #6aa84f; font-size: large;">http://whois.domaintools.com/</span></span></a><span style="color: blue;"><o:p></o:p></span></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Calibri, sans-serif; line-height: 107%;"><b><span style="font-family: LiberationSerif-Bold; line-height: 107%;"><br /></span></b></span></div>
</div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">A sample Whois Lookup performed on “www.info-website.net” at </span><a href="http://www.whois.com/whois/"><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">http://www.whois.com/whois/</span></b></a><b><span style="color: blue; font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;"> </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt;">shows
the following information:<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;"><br /></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh3U4yA00Bu6HdqY9k7fZndg0nJc2q8j4NlA0Ar3ZUJiZJCNjF3UCnTyslsFTUPUAgtSPnyLpoaTU_9ttP6wpD5OmRQ-eNhXxu3qwlcjadwIUhw0xfcYOkZWKP2OscQMnXChNBSj6dNOF8/s1600/whois-registry_details.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh3U4yA00Bu6HdqY9k7fZndg0nJc2q8j4NlA0Ar3ZUJiZJCNjF3UCnTyslsFTUPUAgtSPnyLpoaTU_9ttP6wpD5OmRQ-eNhXxu3qwlcjadwIUhw0xfcYOkZWKP2OscQMnXChNBSj6dNOF8/s1600/whois-registry_details.PNG" height="188" width="640" /></a></div>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi3B07KXX1RojcuXbRfXmYvAiHcFizj-hTKYV8BJWY2ilVKsYutk0TNW3GVRovjwvwwpdzyvJX8mxV260UT7ZqTP67xOOQvaDZJ2PYsTBPlYTxNNmkdwhCDrdLi4ZXawgFwZf9pMO3BXsI/s1600/whois-registrar_details_1.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi3B07KXX1RojcuXbRfXmYvAiHcFizj-hTKYV8BJWY2ilVKsYutk0TNW3GVRovjwvwwpdzyvJX8mxV260UT7ZqTP67xOOQvaDZJ2PYsTBPlYTxNNmkdwhCDrdLi4ZXawgFwZf9pMO3BXsI/s1600/whois-registrar_details_1.PNG" height="166" width="640" /></a></div>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_9scwjWXrOe9ltQyZn7ecfVDLYroW2a2uQKEXVopDg22jOU-TFtOZCM9SQQuBD9UxeBwE4vLoKbnzbWZ3-c-P0izBT_5bkvfRJwLA9ZMNGi1gLyLmbHTR1kY4NNJTrBrtXO2dswzEd3I/s1600/whois-registrar_details_2.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_9scwjWXrOe9ltQyZn7ecfVDLYroW2a2uQKEXVopDg22jOU-TFtOZCM9SQQuBD9UxeBwE4vLoKbnzbWZ3-c-P0izBT_5bkvfRJwLA9ZMNGi1gLyLmbHTR1kY4NNJTrBrtXO2dswzEd3I/s1600/whois-registrar_details_2.PNG" height="328" width="640" /></a></div>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEih5F-2x3FONHLgPPsiIb3WpSNyuEoGioD0LLhAYRAx9vjHRUol4wbgdo-vrmY82oqKWIIeK_jOrnnLnuOhZcIQwqbB6CagNsV-IA4DBzllzmjdR_g08WTA2JP5EmqvMWz401kjSR3Shzs/s1600/whois-registrar_details_3.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEih5F-2x3FONHLgPPsiIb3WpSNyuEoGioD0LLhAYRAx9vjHRUol4wbgdo-vrmY82oqKWIIeK_jOrnnLnuOhZcIQwqbB6CagNsV-IA4DBzllzmjdR_g08WTA2JP5EmqvMWz401kjSR3Shzs/s1600/whois-registrar_details_3.PNG" height="428" width="640" /></a></div>
<span style="font-family: LiberationSerif; font-size: 14.5pt;"><br /></span></div>
<div class="MsoListParagraph" style="margin-bottom: 0.0001pt; text-indent: -0.25in;">
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<div class="MsoNormal" style="margin-bottom: 0.0001pt; text-indent: 0px;">
<b><span style="font-family: LiberationSerif-Bold; font-size: 16.5pt;"><span style="font-size: large;">Finding IP Address and Hosting Provider</span><o:p></o:p></span></b><br />
<b><span style="font-family: LiberationSerif-Bold; font-size: 16.5pt;"><span style="font-size: large;"><br /></span></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt; text-indent: 0px;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">Information such as the IP address of the website and its hosting provider can be very crucial. This can be easily found out using the following website:<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt; text-indent: 0px;">
<b><span style="font-family: LiberationSerif-Bold;">WhoIsHostingThis: </span></b><a href="http://www.whoishostingthis.com/"><b><span style="font-family: LiberationSerif-Bold;"><span style="color: #6aa84f;">http://www.whoishostingthis.com/</span></span></b></a><b><span style="color: blue; font-family: LiberationSerif-Bold;"><o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt; text-indent: 0px;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt; text-indent: 0px;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">Just visit the above website and enter the domain name of your choice to obtain its IP address as well as the name of its hosting provider as shown below.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt; text-indent: 0px;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;"> <o:p></o:p></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiltaF7-okzjRHylthyphenhyphenuGmEynnTkwTlzqEWrqGiTKMw5HWmfxX_M2JWiBj_UmOKzaTXSIXKRPyRjtsYpxW-JYBB0dX3C2mn0ZBloN0Wn_Fk1H7QdqVOzok_pbDo3rH2qqI_G3i6DSMNRx4/s1600/whoishostingthis.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiltaF7-okzjRHylthyphenhyphenuGmEynnTkwTlzqEWrqGiTKMw5HWmfxX_M2JWiBj_UmOKzaTXSIXKRPyRjtsYpxW-JYBB0dX3C2mn0ZBloN0Wn_Fk1H7QdqVOzok_pbDo3rH2qqI_G3i6DSMNRx4/s1600/whoishostingthis.PNG" height="332" width="640" /></a></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt; text-indent: 0px;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;"><br /></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt; text-indent: 0px;">
<br /></div>
<div style="text-indent: 0px;">
</div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt; text-indent: 0px;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">As you can see from the above snapshot, a query on “www.info-website.net” reveals its </span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt;">IP address</span></i><span style="font-family: LiberationSerif; font-size: 14.5pt;">, </span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt;">hosting provider </span></i><span style="font-family: LiberationSerif; font-size: 14.5pt;">and also the </span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt;">name servers </span></i><span style="font-family: LiberationSerif; font-size: 14.5pt;">associated with it.</span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt; text-indent: 0px;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt; text-indent: 0px;">
<b><span style="font-family: LiberationSerif-Bold; font-size: 16.5pt;"><span style="font-size: large;">Finding IP Address Location</span><o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt; text-indent: 0px;">
<b><span style="font-family: LiberationSerif-Bold; font-size: 16.5pt;"><br /></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt; text-indent: 0px;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">Finding out the physical location of the IP address is very simple. Just visit the following website and enter the target IP address to reveal its physical location:<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt; text-indent: 0px;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt; text-indent: 0px;">
<b><span style="font-family: LiberationSerif-Bold;">IP2Location: </span></b><b><span style="color: blue; font-family: LiberationSerif-Bold;"><a href="http://www.ip2location.com/demo"><span style="color: #6aa84f;">http://www.ip2location.com/demo</span></a><o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt; text-indent: 0px;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt; text-indent: 0px;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">A snapshot of sample query for the IP address </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt;">199.79.62.128 </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt;">on </span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt;">ip2location.com </span></i><span style="font-family: LiberationSerif; font-size: 14.5pt;">website is shown below:<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt; text-indent: 0px;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt; text-indent: 0px;">
</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5k9o-fE0f9a8JCbAXrVX1zMNWeRMlgTcyWa-3VNY56Rfo2FPg-kDuKUwWWE4Z2QJ22TTXSRa1c-hjzxr4En2-6p_k0PR17MevGPEX6YoGIcCHB15k07QlFw8GUYcSlfO-rF-sstgtqRc/s1600/ip2address.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5k9o-fE0f9a8JCbAXrVX1zMNWeRMlgTcyWa-3VNY56Rfo2FPg-kDuKUwWWE4Z2QJ22TTXSRa1c-hjzxr4En2-6p_k0PR17MevGPEX6YoGIcCHB15k07QlFw8GUYcSlfO-rF-sstgtqRc/s1600/ip2address.PNG" height="628" width="640" /></a></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt; text-indent: 0px;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt; text-indent: 0px;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;"><br /></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt; text-indent: 0px;">
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold;"><span style="font-size: large;">Finding IP Address Range</span><span style="font-size: 16.5pt;"><o:p></o:p></span></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold; font-size: 16.5pt;"><br /></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">While small websites may have a single IP address, big players
such as Google, Facebook and Microsoft have a range of IP addresses allocated
to their company for hosting additional websites and servers. This range of
information can be obtained from the official website of </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt;">American Registry for Internet Numbers (ARIN)</span></b><span style="font-family: LiberationSerif; font-size: 14.5pt;">. The URL for the<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">ARIN website is listed below:<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold;">ARIN Website:<span style="color: #6aa84f;"> </span></span></b><b><span style="font-family: LiberationSerif-Bold;"><a href="https://www.arin.net/"><span style="color: #6aa84f;">https://www.arin.net/</span></a><span style="color: blue;"><o:p></o:p></span></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<span style="font-family: LiberationSerif; font-size: 14.5pt; line-height: 107%;">Visit the above URL and insert the </span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt; line-height: 107%;">IP address </span></i><span style="font-family: LiberationSerif; font-size: 14.5pt; line-height: 107%;">of any given website in the “</span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; line-height: 107%;">Search Whois</span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; line-height: 107%;">” box found at the top
right corner of the web page. Here is a snapshot showing the</span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; line-height: 107%;"> </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; line-height: 107%;">results of a sample query performed on the Info-website's IP address </span><span style="font-size: 14.5pt; line-height: 107%;"><span style="font-family: LiberationSerif-Bold;"><b>199.79.62.128</b></span></span><br />
<span style="font-size: 14.5pt; line-height: 107%;"><span style="font-family: LiberationSerif-Bold;"><b><br /></b></span></span>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_-IeYJgVjNz5c7sLnNS5DyBDUqbDBj31ECv6V33n0BzrPjs17zkMRps_gk6f6o26Qvuzdt_TX2XrdTzUahtoxMUJc4b1wQ2slCfX6Yy0iX9d6uAG_unwmTh75odykKV5QlpTtbyjU4yc/s1600/whoisarin.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_-IeYJgVjNz5c7sLnNS5DyBDUqbDBj31ECv6V33n0BzrPjs17zkMRps_gk6f6o26Qvuzdt_TX2XrdTzUahtoxMUJc4b1wQ2slCfX6Yy0iX9d6uAG_unwmTh75odykKV5QlpTtbyjU4yc/s1600/whoisarin.PNG" height="483" width="640" /></a></div>
<br />
<br />
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold; font-size: 16.5pt; mso-bidi-font-family: LiberationSerif-Bold;">Traceroute<o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Bold;">Traceroute </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">is a network
diagnostic tool to identify the actual path (route) that the information
(packets) takes to travel from source to destination. The source will be your
own computer called </span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Italic;">localhost</span></i><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">.
The destination can be any host or server on the local network or Internet.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">The
traceroute tool is available on both Windows and Linux. The command syntax for<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">Windows
is as follows:<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold; mso-bidi-font-family: LiberationSerif-Bold; mso-bidi-font-size: 11.0pt;">tracert </span></b><span style="font-family: LiberationSerif; mso-bidi-font-family: LiberationSerif; mso-bidi-font-size: 11.0pt;">target-domain-or-IP<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">(<a href="http://computer-trickster.blogspot.in/2014/02/command-prompt-commands-part-6.html"><span style="color: #6aa84f;">Check out more useful cmd prompt commands</span></a>)</span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;"><br /></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">The
command syntax for Linux is as follows:<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold; mso-bidi-font-family: LiberationSerif-Bold; mso-bidi-font-size: 11.0pt;">traceroute </span></b><span style="font-family: LiberationSerif; mso-bidi-font-family: LiberationSerif; mso-bidi-font-size: 11.0pt;">target-domain-or-IP<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">Usually,
the transfer of information from one computer to another will not happen in a
single jump. It involves a chain of several computers and network devices
called </span><i><span style="font-family: LiberationSerif-Italic; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif-Italic;">hops </span></i><span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;">to
transmit information from source to destination. Traceroute identifies each hop
on that list and the amount of time it takes to travel from one hop to another.
A snapshot of the traceroute performed on "www.info-website.net” using a Windows computer
is shown below:<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;"><br /></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjXMCAovKpQ6ONCNVkJRUDx2E9G7SRHY42vdhX16IqLklMgCzhBvDQYuTvS_CUs7BRfDPkWyufZ0T931ZVB0wjybBtxP72k44uWS4gdnwUf65g7N6ypKzyOWqCJqCOo4p_g330EJzIS9EA/s1600/tracert.PNG" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjXMCAovKpQ6ONCNVkJRUDx2E9G7SRHY42vdhX16IqLklMgCzhBvDQYuTvS_CUs7BRfDPkWyufZ0T931ZVB0wjybBtxP72k44uWS4gdnwUf65g7N6ypKzyOWqCJqCOo4p_g330EJzIS9EA/s1600/tracert.PNG" height="482" width="640" /></a></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<span style="font-family: LiberationSerif; font-size: 14.5pt; line-height: 107%; mso-ansi-language: EN-US; mso-bidi-font-family: LiberationSerif; mso-bidi-language: HI; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;">As shown in the above snapshot, the traceroute tool identifies all the hops
present in the path traversed by packets from source to destination. Here </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; line-height: 107%; mso-ansi-language: EN-US; mso-bidi-font-family: LiberationSerif-Bold; mso-bidi-language: HI; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;">10.0.63.254 </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; line-height: 107%; mso-ansi-language: EN-US; mso-bidi-font-family: LiberationSerif; mso-bidi-language: HI; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;">is the
private IP and </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; line-height: 107%; mso-ansi-language: EN-US; mso-bidi-font-family: LiberationSerif-Bold; mso-bidi-language: HI; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;">14.140.14.13 </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; line-height: 107%; mso-ansi-language: EN-US; mso-bidi-font-family: LiberationSerif; mso-bidi-language: HI; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;">is the public IP of the source (my computer). </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt; line-height: 107%; mso-ansi-language: EN-US; mso-bidi-font-family: LiberationSerif-Bold; mso-bidi-language: HI; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;">199.79.62.128 </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt; line-height: 107%; mso-ansi-language: EN-US; mso-bidi-font-family: LiberationSerif; mso-bidi-language: HI; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;">is the
destination IP address (Info-website's server). All the remaining IP addresses shown
in between the source and the destination belong to computers that assist in
carrying the information.</span><br />
<span style="font-family: LiberationSerif; font-size: 14.5pt; line-height: 107%; mso-ansi-language: EN-US; mso-bidi-font-family: LiberationSerif; mso-bidi-language: HI; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;"><br /></span>
<br />
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold; font-size: 16.5pt;">Obtaining Archive of the Target Website<o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold; font-size: 16.5pt;"><br /></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: LiberationSerif; font-size: 14.5pt;">Getting access to the archive of the target website will let you
know how the website was during the time of its launch and how it got advanced
and changed over time. You will also see all the updates made to the website,
including the nature of updates and their dates. You can use the </span><b><span style="font-family: LiberationSerif-Bold; font-size: 14.5pt;">WayBackMachine </span></b><span style="font-family: LiberationSerif; font-size: 14.5pt;">tool to access this information.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold;">WayBackMachine: </span></b><b><span style="font-family: LiberationSerif-Bold;"><span style="color: #6aa84f;">http://archive.org/web/</span><span style="color: blue;"><o:p></o:p></span></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="color: blue; font-family: LiberationSerif-Bold; mso-bidi-font-family: LiberationSerif-Bold; mso-bidi-font-size: 11.0pt;"><br /></span></b></div>
<span style="font-family: LiberationSerif; font-size: 14.5pt; line-height: 107%;">Just use the above link to visit the WayBackMachine
website and type in the URL of the target website. You should get a list of
archives of the website listed in a month by month and yearly basis as shown in
the snapshot below:</span><br />
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt; text-indent: 0px;">
<div class="separator" style="clear: both; text-align: center;">
</div>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjkXCfnBWD8BHVLCTD7PdYm7I3krucpv4wy_uKqPWhbh2MRhA6zvv9uVlhZmZKxNAMqKMiUd4s4zTrag0LoX_EZVIJmr5_0-MDxs0HLVW_7lmQnYQX0VZlmIrznAt4MABiGvZZtUqSHp-Y/s1600/archive.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjkXCfnBWD8BHVLCTD7PdYm7I3krucpv4wy_uKqPWhbh2MRhA6zvv9uVlhZmZKxNAMqKMiUd4s4zTrag0LoX_EZVIJmr5_0-MDxs0HLVW_7lmQnYQX0VZlmIrznAt4MABiGvZZtUqSHp-Y/s1600/archive.PNG" height="308" width="640" /></a></div>
<span style="font-family: LiberationSerif; font-size: 14.5pt;"><br /></span></div>
</div>
</div>
<div class="MsoListParagraph" style="margin-bottom: 0.0001pt; text-indent: -0.25in;">
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: LiberationSerif-Bold; font-size: 16.5pt; mso-bidi-font-family: LiberationSerif-Bold;"><o:p></o:p></span></b></div>
</div>
<div class="MsoListParagraph" style="margin-bottom: 0.0001pt; text-indent: -0.25in;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;"><br /></span></div>
<div class="MsoListParagraph" style="margin-bottom: 0.0001pt; text-indent: -0.25in;">
<span style="font-family: LiberationSerif; font-size: 14.5pt; mso-bidi-font-family: LiberationSerif;"><br /></span></div>
</div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3078132662608425729.post-60585704080090221182015-02-20T18:22:00.003-08:002015-09-08T03:47:42.996-07:00YouTube TrendMap<div dir="ltr" style="text-align: left;" trbidi="on">
<h2 style="text-align: center;">
<span style="background-color: white; font-family: Arial; line-height: 12.8000001907349px; text-align: right;"><span style="color: #134f5c; font-size: large;"><b><a href="http://www.youtube.com/trendsmap">Explore the most popular videos by city and region</a></b></span></span></h2>
<div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg76ibQZWKabTgNueerkjXDmCU02Wcphh9f0_e_pqavwrDVVDMZjDjaiMuLbU5P1xEQ3UVQDehbw0cmrHeVR0NF6BjWKVvJtDcBnSlttvkhl_Dc2YVnD-lWkvl34L68W46Kfigg4FGeokY/s1600/youtubetrendmap1.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="328" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg76ibQZWKabTgNueerkjXDmCU02Wcphh9f0_e_pqavwrDVVDMZjDjaiMuLbU5P1xEQ3UVQDehbw0cmrHeVR0NF6BjWKVvJtDcBnSlttvkhl_Dc2YVnD-lWkvl34L68W46Kfigg4FGeokY/s1600/youtubetrendmap1.PNG" width="640" /></a></div>
<div class="MsoNormal">
<span style="color: #0b5394;"><br /></span></div>
<div class="MsoNormal">
<span style="color: #0b5394;">YouTube ‘<a href="http://www.youtube.com/trendsmap">trendsmap</a>’ page provide awesome information about
most popular video by cities and regions. We can further analysis by breakdown
into Gender, Age and Type.</span><o:p></o:p></div>
<div class="MsoNormal">
<span style="color: #0b5394;"><br /></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEipedTQMyzn65Of84d5VLDZ4opdZjv9jXcuUzBbr0aL3LLqVs6GZeTI5x3q693AGiXolOdVXI4nMWjvCCGCcEUa6BDNPHftsANM5OVTCjAxiGovsKYN2TjpxUkSohJnLtcyNhAS20nNKRU/s1600/basisof.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="38" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEipedTQMyzn65Of84d5VLDZ4opdZjv9jXcuUzBbr0aL3LLqVs6GZeTI5x3q693AGiXolOdVXI4nMWjvCCGCcEUa6BDNPHftsANM5OVTCjAxiGovsKYN2TjpxUkSohJnLtcyNhAS20nNKRU/s1600/basisof.PNG" width="640" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirAA2mqYhihudbCmZyb3kE5HIKj7B2ZW1_rYGMFLKBtCSv4lieY6B3Erp78auPtd_rOCUrBW8f1re08AOaMM63U7ffc8atRn_BaBSe6gjAnuNXTO0BKgGLxwnH2T60wSf4488l-nGK-5o/s1600/youtubetrendmap2.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="243" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirAA2mqYhihudbCmZyb3kE5HIKj7B2ZW1_rYGMFLKBtCSv4lieY6B3Erp78auPtd_rOCUrBW8f1re08AOaMM63U7ffc8atRn_BaBSe6gjAnuNXTO0BKgGLxwnH2T60wSf4488l-nGK-5o/s1600/youtubetrendmap2.PNG" width="400" /></a></div>
<div class="MsoNormal">
<span style="color: #0b5394;"><br /></span></div>
<div class="MsoNormal">
<span style="color: #0b5394;"><br /></span></div>
</div>
<div>
<span style="background-color: white; font-family: Arial; line-height: 12.8000001907349px; text-align: right;"><span style="color: #134f5c; font-size: large;"><b><br /></b></span></span>
<br />
<div class="MsoNormal">
<span style="color: #0b5394;">For Browsing the video with different cities and countries
go to the Dashboard section or ‘<a href="http://www.youtube.com/trendsmap">Treandsdashboard</a>’ page.</span><o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgTIACD7NHyDTUtSgQ1HeVN-4-qJFPv-Wnyp5B71lHDkc_wIM6NqOpzHB0MDnfFqJhuGi7ECjqdP3zmiKT6MzjGTbBhRtEqUryWYDTfrJsYJ5XaFzdrreQ8yaGVxCpSzhSlpo1-p0EBqfM/s1600/trendsdashboard.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="510" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgTIACD7NHyDTUtSgQ1HeVN-4-qJFPv-Wnyp5B71lHDkc_wIM6NqOpzHB0MDnfFqJhuGi7ECjqdP3zmiKT6MzjGTbBhRtEqUryWYDTfrJsYJ5XaFzdrreQ8yaGVxCpSzhSlpo1-p0EBqfM/s1600/trendsdashboard.PNG" width="640" /></a></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="color: #0b5394;"><a href="http://www.youtube.com/trendsmap">Trendsdashboard</a> is also provide facilities to compare video
trends between two different cities or regions. </span><o:p></o:p></div>
<div class="MsoNormal">
<span style="color: #0b5394;"><br /></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi4kcaj8GcTGQu4I5mLtKGcopqE9YN27nW9VWofrjb5iiM1-bRC3_iwZa_WJO-a2uNlj08H6bvK6MZQmoNPigoPvtXWALeRmNT_Sc6Jewbs0oSyDMfuAqp-rslJukYz4OdqFluX2juAPGQ/s1600/trendsdashboardcompare.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="460" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi4kcaj8GcTGQu4I5mLtKGcopqE9YN27nW9VWofrjb5iiM1-bRC3_iwZa_WJO-a2uNlj08H6bvK6MZQmoNPigoPvtXWALeRmNT_Sc6Jewbs0oSyDMfuAqp-rslJukYz4OdqFluX2juAPGQ/s1600/trendsdashboardcompare.PNG" width="640" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEik1hej5My0uyLZmYin8IP7Z0zknuFTQO2LE03_IQgSiVgvVuAQ4WWTtqX0e3u_jBLIU1RdbmjEjmsPQkxlp4bIabMK0ATZuokMBOKtMjhZ05FbTgZqUrTFw_lGCV19STeC6ZgBADitWxY/s1600/trendsdashboardcompare.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEik1hej5My0uyLZmYin8IP7Z0zknuFTQO2LE03_IQgSiVgvVuAQ4WWTtqX0e3u_jBLIU1RdbmjEjmsPQkxlp4bIabMK0ATZuokMBOKtMjhZ05FbTgZqUrTFw_lGCV19STeC6ZgBADitWxY/s1600/trendsdashboardcompare.PNG" /></a></div>
<div class="MsoNormal">
<span style="color: #0b5394;">Blog section of YouTube trendsmap page, it is simple
Blogspot blogging site. It provides statistical information about trending
video and categories into different category.</span><o:p></o:p></div>
<div class="MsoNormal">
<span style="color: #0b5394;"><br /></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6DvDF3FVrh8DFTQoQ0YsxkjqjVahcLi4_ShV7fbCgBlOVgn30UvXCgzrkaC0IMF3mW1pTMUtS-D-neXIm9hgJPJiskPwm4jOwXgADtlLQuKtQPoqvehl_PwprPzZ7NEeAIEmMqJui2cU/s1600/youtube-trends.blogspot.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="418" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6DvDF3FVrh8DFTQoQ0YsxkjqjVahcLi4_ShV7fbCgBlOVgn30UvXCgzrkaC0IMF3mW1pTMUtS-D-neXIm9hgJPJiskPwm4jOwXgADtlLQuKtQPoqvehl_PwprPzZ7NEeAIEmMqJui2cU/s1600/youtube-trends.blogspot.PNG" width="640" /></a></div>
<div class="MsoNormal">
<span style="color: #0b5394;"><br /></span></div>
</div>
</div>
Unknownnoreply@blogger.com0