Thursday 24 March 2011

Earn Money Online Free


Hello readers,
                  Many of us finding online jobs to meet our financial problems.
every body wana find a job on internet for part time so dont worry the job link we are providing here is totally 100% Genuine job in which you dont have to spend a single money from your pocket but the job provider will give you a 10$ free bonus when u sign up.
You just have to sign up and start ur work and earn online with just working 2-3 hours daily..You can also get more Money by Reffering people.All information u will find on this website so readers enjoy and make money online as we are also making 250-320$ a month by working as a part time job for just for 2-3 hours....
Here is a link:
http://www.earnparttimejobs.com/index.php?id=3206859


ENJOY.....

Tuesday 15 March 2011

LINUX COMMANDS




Hello readers,
                  Today we share with you some linux commands which will helps you to operate linux.This post is made specially for those persons who are intreasted in Linux and want to make an Advanced user of linux.
So,readers check these commands and if you like this post dont forget to make a comment on it.....ENJOY


Commands:

1) send a circular

echo “dear admin, please ban johnlame” | wall
Broadcast Message from root@urfix.com
(/dev/pts/2) at 20:32 …
dear admin, please ban johnlame

2) Find usb device

diff <(lsusb) <(sleep 3s && lsusb)

I often use it to find recently added or removed device, or using find in /dev, or anything similar.
Just run the command, plug the device, and wait to see him and only him

3) Use file(1) to view device information

file -s /dev/sd*
file(1) can print details about certain devices in the /dev/ directory
(block devices in this example).
This helped me to know at a glance the location and revision of my bootloader, UUIDs,
filesystem status,
which partitions were primaries / logicals, etc.. without running several commands.
See also
file -s /dev/dm-* file -s /dev/cciss/*
etc..

4) Stop Flash from tracking everything you do.


for i in ~/.adobe ~/.macromedia ; do ( rm $i/ -rf ; ln -s /dev/null $i ) ; done

Brute force way to block all LSO cookies on a Linux system with the non-free Flash
browser plugin. Works just fine for my needs. Enjoy.

5) send a circular part 2

wall <<< “Broadcast This”


6) Single use vnc-over-ssh connection

ssh -f -L 5900:localhost:5900 your.ssh.server “x11vnc -safer -localhost -nopw -once -display :0″; vinagre localhost:5900

7) Compare copies of a file with md5

cmp file1 file2

8) back ssh from fire walled hosts

ssh -R 5497:127.0.0.1:22 -p 62220 user@public.ip
host B (you) redirects a modem port (62220) to his local ssh.
host A is a remote machine (the ones that issues the ssh cmd).
once connected port 5497 is in listening mode on host B.
host B just do a
ssh 127.0.0.1 -p 5497 -l user
and reaches the remote host’ssh. This can be used also for vnc and so on.

9) Run a program transparently, but print a stack trace if it fails

gdb -batch -ex “run” -ex “bt” ${my_program} 2>&1 | grep -v ^”No stack.”$
For automated unit tests I wanted my program to run normally, but if it crashed, to add
a stack trace to the output log. I came up with this command so I wouldn’t have to mess around with core files.
The one downside is that it does smoosh your program’s stderr and stdout together.

10) rename files according to file with colums of corresponding names

xargs -n 2 mv < file_with_colums_of_names
Maybe simpler, but again, don’t know how it will work with space in filename.

11) Create a new file

> file

12) stderr in color

mycommand 2> >(while read line; do echo -e “\e[01;31m$line\e[0m"; done)

13) Rename HTML files according to their title tag

perl -wlne'/title>([^<]+)/i&&rename$ARGV,”$1.html”‘ *.html
The above one-liner could be run against all HTML files in a directory. It renames the HTML files based on
the text contained in their title tag. This helped me in a situation where I had a directory containing
thousands of HTML documents with meaningless filenames.

14) Make vim open in tabs by default (save to .profile)

alias vim="vim -p"
I always add this to my .profile rc so I can do things like: "vim *.c" and the files are opened in tabs.

15) Look for English words in /dev/urandom

head -100000 /dev/urandom | strings|tr '[A-Z]' '[a-z]'|sort >temp.txt && wget -q http://www.mavi1.org/web_security/wordlists/webster-dictionary.txt -O-|tr '[A-Z]' '[a-z]'|sort >temp2.txt&&comm -12 temp.txt temp2.txt

16) Find a CommandlineFu users average command rating

wget -qO- www.commandlinefu.com/commands/by/PhillipNordwall | awk -F\> '/num-votes/{S+=$2; I++}END{print S/I}'

17) Set laptop display brightness

echo > /proc/acpi/video/VGA/LCD/brightness
Run as root. Path may vary depending on laptop model and video card (this was tested on an Acer laptop with ATI HD3200 video).
cat /proc/acpi/video/VGA/LCD/brightnessto discover the possible values for your display.

18) Send your terminfo to another machine

infocmp rxvt-unicode | ssh 10.20.30.40 "mkdir -p .terminfo && cat >/tmp/ti && tic /tmp/ti"
I frequently use this trick to send my terminal settings to HPUX and older RHEL systems.
This is due to the fact that terminfo support for rxvt-unicode (my preferred terminal app) does
not exist on many older Linux and Unices.

19) Efficient remote forensic disk acquisition gpg-crypted for multiple recipients

dd if=/dev/sdb | pigz | gpg -r -r -e --homedir /home/to/.gnupg | nc remote_machine 6969
Acquires a bit-by-bit data image, gzip-compresses it on multiple cores (pigz) and encrypts the
data for multiple recipients (gpg -e -r). It finally sends it off to a remote machine.

20) Look up a unicode character by name

exec 5< <(grep -i "$*" $(locate CharName.pm));while read
<&5;do h=${REPLY%% *};/usr/bin/printf "\u$h\tU+%s\t%s\n"  "$h"  "${REPLY##$h }";done

21) strips the first field of each line where the delimiter is the first ascii character



cut -f2 -d`echo -e '\x01'` file

22) shell equivalent of a boss button

cat /dev/urandom | hexdump -C | highlight ca fe 3d 42 e1 b3 ae f8 | perl -MTime::HiRes -pnE "Time::HiRes::usleep(rand()*1000000)"
Nobody wants the boss to notice when you're slacking off. This will fill your shell with random data, parts of it highlighted.
Note that 'highlight' is the Perl module App::highlight, not "a universal sourcecode to formatted text converter." You'll also need Term::ANSIColor.

23) Open Remote Desktop (RDP) from command line having a custom screen size

xfreerdp --plugin rdpsnd -g 1280x720 -a 24 -z -x m -u $username -p $password 10.20.30.40
This example uses xfreerdp, which builds upon the development of rdesktop. This example usage will also send you the remote machine's sound.

24) Show memory stats on Nexenta/Solaris

echo ::memstat | mdb -k


25) Create a pdf version of a main page

man -t manpage | ps2pdf - filename.pdf

Monday 14 March 2011

PING OF DEATH..



Hello readers,
          We want to share with you some tips about "How to send a DOS attack with your home Pc to any website u want to be killed!!?"


DOS attack stands for Denial of service attack

  • What is DOS?
 
    A:Denial of Service (DoS) attackes are aggressive attacks on an individual Computer or WebSite with intent to deny services to intended users.
    DoS attackes can target end-user systems, servers, routers and Network links(websites)

    Requirements:
    1- Command Prompt (CMD or DOS) Which is usually integrated in all Windows.
    2- Ip-Address of Targeted Site.

    "HOW TO GET IP OF ANY SITE??"
    No problem.. here is the solution..
    open ur CMD (command prompt).. and type
    nslookup Site-Name
    (e.g nslookup www.google.com)

    It will show u ip of the site.
    ok now write this command in CMD For Attack on Any Site/ Server..

    ping SITE-IP -l 65500 -n 10000000 -w 0.00001
    -n 10000000= the number of DoS attemps.. u can change the value "10000000" with ur desired value u want to attempt attack.

    SITE-IP= Replace the text with the ip address of the site u want to be attacked..

    -w 0.00001 = It is the waiting time after one ping attack.

    NOTE: Dont Change or Remove -l, -n and -w in this command.. otherwise u will not able to attack!!
    This All System Is Known As "PING OF DEATH"

     This Tutorial Is Made For Educational Purposes Only!!

    Sunday 13 March 2011

    Windows 7 secrets PDF free download


                         Here we share with our readers Windows 7 secrets and full product guide,which will help them to make their windows 7 better and most power full security than other Windows.This post is diamond for our those readers who are using window 7 and want to make it better than now.
    In this Guide we share with you following Chapters..


    Chapter 1: Selecting the Right Windows 7 Edition
    Chapter 2: Installing or Upgrading to Windows 7
    Chapter 3: Hardware and Software Compatibility
    Part II: The New and Improved Windows 7 User Experience
    Chapter 4: What’s New in the Windows 7 User Experience
    Chapter 5: Where’s My Stuff? Finding and Organizing Files
    Chapter 6: Personalizing and Configuring Windows 7
    Part III: Security and Networking
    Chapter 7: Windows 7 Security Features
    Chapter 8: Users, Accounts, and UAC
    Chapter 9: Networking and HomeGroup Sharing
    Chapter 10: Complete Your Home Network with Windows Home Server
    Part IV: Digital Media and Entertainment
    Chapter 11: Digital Music and Audio
    Chapter 12: Organizing, Fixing, and Sharing Digital Photos
    Chapter 13: Digital Videos and DVD Movies
    Chapter 14: Microsoft Zune: A Digital Media Alternative
    Chapter 15: Digital Media in the Living Room
    Chapter 16: Having Fun: Games and Windows 7
    Part V: Mobility
    Chapter 17: Seven to Go: Windows 7 Mobility Features
    Chapter 18: Using Tablet PCs and Ultra-Mobile PCs
    Chapter 19: Windows in Your Pocket—Using a Windows Mobile Smartphone
    Part VI: Windows 7 Online
    Chapter 20: Browsing the Web
    Chapter 21: Managing Email and Contacts
    Chapter 22: Managing Your Schedule
    Chapter 23: Your Life in Sync—Windows 7 and Live Services
    Part VII: Windows 7 Power User
    Chapter 24: Keeping Your Data Safe: File and PC Backup
    Chapter 25: Troubleshooting and Recovering from Disaster
    Chapter 26: IT Pro: Windows 7 at Work

    So.
    download this guide and if you like this post dnt forget to make a comment on it....
    ENJOY..


    Download link:

    http://www.4shared.com/file/7RsDle26/Windows7.html

    Thursday 10 March 2011

    FINDING IP ADDRESS OF WEBSITE



                    Today we share with our readers some steps about finding ip address of any web site by using Command prompt(cmd).These tips are very helpfull to our those readers who learn hacking,,,,
    Here are the Steps:


    1. Click on start

    2. Click on Run and type cmd Press OK ( In Windows XP)

    In Vista use search and type command ,press enter

    2. Command prompt Window will open



    On the command prompt window type

    ping [website URL] press enter.


     

    Now you will get reply from the IP address of the website.



    OR

     
    Open command prompt and type in "tracert" then type in the website url .
     for example "tracert www.google.com" without these things"".



    So,
                practise these steps and if you like this post don,t forget to make a comment on it.....ENJOY

    Tuesday 8 March 2011

    Linux Performance Monitoring and Tuning introduction

                       
            Here we share with our readers a new series on Linux performance monitoring and tuning
    • Linux system administrators should be proficient in Linux performance monitoring and tuning. This article gives a high level overview on how we should approach performance monitoring and tuning in Linux, and the various subsystems (and performance metrics) that needs to be monitored.
    • To identify system bottlenecks and come up with solutions to fix it, you should understand how various components of Linux works. For example, how the kernel gives preference to one Linux process over others using nice values, how I/O interrupts are handled, how the memory management works, how the Linux file system works, how the network layer is implemented in Linux, etc.
    • Please note that understanding how various components (or subsystems) works is not the same as knowing what command to execute to get certain output. For example, you might know that “uptime” or “top” command gives the “load average”. But, if you don’t know what it means, and how the CPU (or process) subsystem works, you might not be able to understand it properly. Understanding the subsystems is an on-going task, which you’ll be constantly learning all the time.


    On a very high level, following are the four subsystems that needs to be monitored.

    • CPU
    • Memory
    • I/O
    • Network


    1. CPU

    You should understand the four critical performance metrics for CPU — context switch, run queue, cpu utilization, and load average.

    Context Switch

    • When CPU switches from one process (or thread) to another, it is called as context switch.
    • When a process switch happens, kernel stores the current state of the CPU (of a process or thread) in the memory.
    • Kernel also retrieves the previously stored state (of a process or thread) from the memory and puts it in the CPU.
    • Context switching is very essential for multitasking of the CPU.
    • However, a higher level of context switching can cause performance issues.

    Run Queue

    • Run queue indicates the total number of active processes in the current queue for CPU.
    • When CPU is ready to execute a process, it picks it up from the run queue based on the priority of the process.
    • Please note that processes that are in sleep state, or i/o wait state are not in the run queue.
    • So, a higher number of processes in the run queue can cause performance issues.

    Cpu Utilization

    • This indicates how much of the CPU is currently getting used.
    • This is fairly straight forward, and you can view the CPU utilization from the top command.
    • 100% CPU utilization means the system is fully loaded.
    • So, a higher %age of CPU utilization will cause performance issues.

    Load Average

    • This indicates the average CPU load over a specific time period.
    • On Linux, load average is displayed for the last 1 minute, 5 minutes, and 15 minutes. This is helpful to see whether the overall load on the system is going up or down.
    • For example, a load average of “0.75 1.70 2.10″ indicates that the load on the system is coming down. 0.75 is the load average in the last 1 minute. 1.70 is the load average in the last 5 minutes. 2.10 is the load average in the last 15 minutes.
    • Please note that this load average is calculated by combining both the total number of process in the queue, and the total number of processes in the uninterruptable task status.

    2. Network

    • A good understanding of TCP/IP concepts is helpful while analyzing any network issues. We’ll discuss more about this in future articles.
    • For network interfaces, you should monitor total number of packets (and bytes) received/sent through the interface, number of packets dropped, etc.,

    3. I/O

    • I/O wait is the amount of time CPU is waiting for I/O. If you see consistent high i/o wait on you system, it indicates a problem in the disk subsystem.
    • You should also monitor reads/second, and writes/second. This is measured in blocks. i.e number of blocks read/write per second. These are also referred as bi and bo (block in and block out).
    • tps indicates total transactions per seconds, which is sum of rtps (read transactions per second) and wtps (write transactions per seconds).

    4. Memory

    • As you know, RAM is your physical memory. If you have 4GB RAM installed on your system, you have 4GB of physical memory.
    • Virtual memory = Swap space available on the disk + Physical memory. The virtual memory contains both user space and kernel space.
    • Using either 32-bit or 64-bit system makes a big difference in determining how much memory a process can utilize.
    • On a 32-bit system a process can only access a maximum of 4GB virtual memory. On a 64-bit system there is no such limitation.
    • The unused RAM will be used as file system cache by the kernel.
    • The Linux system will swap when it needs more memory. i.e when it needs more memory than the physical memory. When it swaps, it writes the least used memory pages from the physical memory to the swap space on the disk.
    • Lot of swapping can cause performance issues, as the disk is much slower than the physical memory, and it takes time to swap the memory pages from RAM to disk.
    All of the above 4 subsystems are interrelated. Just because you see a high reads/second, or writes/second, or I/O wait doesn’t mean the issue is there with the I/O sub-system. It also depends on what the application is doing. In most cases, the performance issue might be caused by the application that is running on the Linux system.
    Remember the 80/20 rule — 80% of the performance improvement comes from tuning the application, and the rest 20% comes from tuning the infrastructure components.
    There are various tools available to monitor Linux system performance. For example: top, free, ps, iostat, vmstat, mpstat, sar, tcpump, netstat, iozone, etc., We’ll be discussing more about these tools and how to use them in the upcoming articles in this series.
    Following is the 4 step approach to identify and solve a performance issue.
    • Step 1 Understand (and reproduce) the problem: Half of the problem is solved when you clearly understand what the problem is. Before trying to solve the performance issue, first work on clearly defining the problem. The more time you spend on understanding and defining the problem will give you enough details to look for the answers in the right place. If possible, try to reproduce the problem, or at least simulate a situation that you think closely resembles the problem. This will later help you to validate the solution you come up to fix the performance issue.
    • Step 2Monitor and collect data: After defining the problem clearly, monitor the system and try to collect as much data as possible on various subsystems. Based on this data, come up list of potential issues.
    • Step 3Eliminate and narrow down issues: After having a list of potential issues, dive into each one of them and eliminate any non issues. Narrow it down further to see whether it is an application issue, or an infrastructure issue. Drill down further and narrow it down to a specific component. For example, if it is an infrastructure issue, narrow it down and identify the subsystem that is causing the issue. If it is an I/O subsystem issue, narrow it down to a specific partition, or raid group, or LUN, or disk. Basically, keep drilling down until you put your finger on the root cause of the issue.
    • Step 4One change at a time: Once you’ve narrowed down to a small list of potential issues, don’t try to make multiple changes at one time. If you make multiple changes, you wouldn’t know which one fixed the original issue. Multiple changes at one time might also cause new issues, which you’ll be chasing after instead of fixing the original issue. So, make one change at a time, and see if it fixes the original problem.

    Thursday 3 March 2011

    Free A+ Certification Course



                                
                         Hello readers,today we share with you A+ Certification course.This course includes..


    Objectives:
    * Identify the fundamental principles of networks
    * Define various network technologies
    * Install and configure networks
    * Identify tools, diagnostic procedures, and techniques for troubleshooting networks



    Topics:
    * Network protocols and hardware
    * Network technologies
    * Installing and configuring networks
    * Troubleshooting networks



                   This is Complete 4 hours training and totally free so with wasting a minute just do it and enjoy...
    Here is a link:
    http://www.e-learningcenter.com/free_aplus_course.html