Sunday, November 30, 2008

Find Missing .DLL Files

This is another useful website I have come cross during the weekend. It has .dll file for almost all the windows versions. Next time if you are getting an error or having any issues with a .dll file dll-downloads.com might be a the site to look for. 

Not only the .dll files but you can find .OCX and .DRV files for any windows version s well. 

Missing Micosoft Windows dll files gives a good explanation of how to fix missing .dll files errors. Next time when you come cross .dll files missing error you will be able to fix it without any problem. 

Saturday, November 29, 2008

SilySoft Games For Weekend



If you are looking for something fun for this weekend you would love this strategy games from SilySoft. If your are a strategy game lover you will love this simple free demo version.

Lux Delux allow you to control your army to take over the entire world. Ancient Empires Lux takes you through all the great early civilizations. If you like to go through american history American history lux is the game for you. There is Pax Galaxia which will let you control the whole galaxy. You can find the free demo version for SillySoft website. It is available for MAC, Windows and for Linux as well.

Lux Delux is my favorite.

FREE File Conversion

Do you need to convert from PDF to DOC? DOC to PDF? MPG to AVI? WAV to MP3? or in hundreds of different format?

Well you can do it now using a free online webservice. You will not be required to install a single software on your computer! Now that is Crazzy as well as Cool!

Visit

http://www.zamzar.com/

Wednesday, November 26, 2008

Ronnie Coleman Vs Arnold Schwarzenegger






























Who is the greatest Bodybuilder of all time?

Who is a better person?

Who has their body in better shape? Not just Bulky and Big but great cuts??

You Decide!

Ronnie Coleman: He won the Mr. Olympia contest from 1998 - 2005!!
He has the world record of 8 straight wins in Mr. Olympia
He has a degree in accounting
He was a police officer
He has not admitted yet of taking steroids or illegal drugs. Only the the legal ones! Hard to believe though

Arnold Schwarzenegger: He won the Mr. Olympia contest from 1970-1975 and then 1980. Seven times
He is 61yrs old in 2008 (born 1941)
He was a famous hollywood actor
He is the current Governor of California
He was a migratant to America from one of the poorest countries in Europe (Austria)
He admitted publicly that he has taken steroids for muscle maintenance

Archive and Preserve any webpage or website

Archive and Preserve any webpage or have your own backup so next time when a webpage is taken down or the site disappear you still have a copy of it.

visit www.iterasi.com

follow these simple steps
  1. Create a free user account - all you really need an existing email address to signup
  2. Download a small bookmarklet into your browser. Google search for bookmarklets if you need more info about them. They are essential a bookmark which when you click on invokes a javascript which does all the talking to the server - in this case to the Iterasi server to capture the website you are currently visiting
  3. Go to the webpage you want to archive . e.g. https://crazzycool.blogspot.com/ and click on the bookmarklet that you downloaded from iterasi. You can add it to folders and also add tags to it for your organising purpose. Click OK and it will save the page on iterasi server in couple of seconds.
  4. Visit My Pages on Iterasi under your account and you can view any of the pages that you saved using the iterasi viewer. You have your own backup of the webpage!
No matter what changes happen on the webpage you will have your own backup or a snapshot forever!

How to Syncing your Google Calendar

If you are used to or cannot avoid Apple Ical, Mozilla Sunbird, Microsoft Outlook or BlackBerry but still love to sync with Google Calendar this will be a good news. Google calendar can be sync with any of the above mention calendar programs.

Speacially at work or organisation you have to stick with one calendar program. In such cases this would be ideal.

Follow these simple tutorial
* Google Calendar Sync: Overview (Outlook)

For Apple iCal and Mozilla Sunbird
For BrackBerry


Official Gmail Blog: Syncing your Google Calendar

Good Forensic Science Blogs

Here is couple of really good blogs that talk about computer and internet forensic.  

Thoughts, musings, knowledge, etc. about digital forensics. As well as how computer science, IT (information technology) and IS (information security) relate
http://www.forensicblog.org/

FORENSIC INCIDENT RESPONSE
http://forensicir.blogspot.com

Building a Computer Forensics Lab
http://computerforensicslab.blogspot.com/index.html

World of Replicants
http://worldofreplicants.blogspot.com/

Computer Forensics/E-Discovery Tips/Tricks and Information
http://cfed-ttf.blogspot.com

Monday, November 24, 2008

Computer and Internet Forensic for your life

Computer and Internet Forensic is investigation of computer and internet related crimes. Good definition for computer forensic can be found in Wikipedia. You might be thinking why should you have a knowledge about computer forensic as you are not going to investigate crimes. Of course you are not. But most of the methods, techniques and tools used in computer forensic can be really useful in data recovery. Specially if your operating system crash and you want to retrieve your important data out of your computer. 

In one of the old post about I explained how to access your files in a situation that your OS is not working properly. This can happened due to change you made to OS related file or virus attack or hardware problem. If it is not serious hardware problem (power supply or mother board ) you can easily recover the files using Linux liveware such as SLAX. You can find free such liveware specially deign for forensic purposes. Helix is such free liveware comes with lots of forensic tools. You can run Helix on Windows or Mac environment as a normal program directly from CD as well you can boot up and it will run Linux base OS directly from the CD

One of the most important concept of Computer and Internet forensic is should not take any action with out knowing the result. If you are note sure what you are doing or if you are not specially trained or have proper authorisation to do it you must not do it. Because such single act may change the evidence your looking for and and it will not be valid any more. You do not have that strict environment in your day to day life. But information you trying to retrieve is quite important you should not experiment with it. If any of your experiments can make it impossible or harder and expensive to retrieve that data. 

In future posts I will go through these forensic tools and will explain how you can use them to overcome problems related to computer and internet

Related Posts

Sunday, November 23, 2008

Rank and Comment Google Result

I have notice a cool feature with Google during this weekend. When I Google something for example 'CrazzyCool' using Google Chrome browser result allow me to rank the result I am getting plus adding public comments. Using the arrows next to the result you can move it up or down.

Still I am not sure impact onactual Google Page Ranking and this, but I am sure this is another beta testing Google is trying out with Google. You will not see this feature in FireFox or Internet Explorer.


Thursday, November 20, 2008

PIMP your GMAIL inbox with colors and themes

Gmail come up with crazzycool 30 odd themes to PIMP your Gmail inbox. They are going beyond the colour customization.

You can change themes by going to Theme Tab under Setting. As usual Gmail give it out slowly. So you might not see this option yet but sooner you will get this option.


Whats your favorite theme? Or you prefer plain Gmail?

Official Gmail Blog: Spice up your inbox with colors and themes

Tuesday, November 18, 2008

How to Prevent SQL Injection

Last time we discuss the simplest logic behind the SQL injection. Even though it looks like simple it can do a real damage to your website and its valuable data. If you are a webmaster or blogmaster you can follow this simple rules to prevent your website been attacked by SQL injection.

Validate user input 

Always remember to validate user input before it send to the SQL query. Always check whether user enters special characters (= ' ') or key words from scripts. You should apply user input validation for all the user input. Any of the user 

couple of good website tutorial teach you how to validate.

Validating user input in PHP - Nice tutorial explain the importance of user input validation. Tutorial start from 'Never trust user input' and go throught basic PHP validation methods.

Secure your web applications by validating user input ith PHP is another short but nicely explained tutorial explains couple of basic user input validations. 

msdn user input validations in asp.net tutorial explains basic asp.net validation for login page. 

Regular Expressions is handy way to vlidate user input.


Change your SQL queries style. 

First Style: Select * from USERS where USERNAME = ' + usernametxt.Text + ' AND PASSWORD = ' + passwordtxt.Text +';
Second Style: 
                      SqlCommand sc = new SQLCommand("Select * from USERS where USERNAME = @username AND PASSWORD = @password;", myconnection);
                      sc.Parameters.AddWithValue("@username", usernametxt.Text);
                      sc.Parameters.AddWithValue("@password", passwordtxt.Text);

If you are following the first style you should change it to the second style. In first style support SQL injection as it creates new SQL query with the user input, where in second method it always take it as a value (string , integer) and assign it to the parameter. It never create a new SQL query with the user input. 

This is two major steps you can take to stop SQL injection. 

Related Reading

Monday, November 17, 2008

Download Fancy Fonts for Free

dafont.com is another crazzycool site you can download heaps of fancy fonts. It is compatible with windows xp, windows vista and Mac OS X
In windows vista you can right click on the downloaded font file and select "Install".
In windows XP simply put the font file in to the C:\Windows\Fonts folder
and in Mac OS X double click on the font file and Install font button to install fancy dafont.com fonts.

dafont.com has more than 8000 fonts and you can even upload your own creations. Fancy, Foreign look, Techno, bitmap, Gothic and Holiday is some one categories you can find over there.

If you are looking for some new free fonts for dafont.com would be a great place for that.
Related
How to download Fonts for free

Friday, November 14, 2008

Windows live Introduce SkyDrive

Windows live introduce 5 GB SkyDrive that acts like a online hard drive. In the Windows Experionce Blog they mentioned it as 25GB. So it is basically between 5GB to 25 GB storage.

Couple of good features of SKyDrive is

* you can download photos directly to Windows Live Photo Gallery
* Download as a Zip file
* Move/Copy files between folders.
* Share files directly from the SkyDrive
* Public file share or share with your freinds.

So if you want to keep a reasanble online disk space SkyDrive might be a good option.

Thursday, November 13, 2008

How to find Hacks for anything

Hacks is quite interesting thing which make things possible, easier, faster or get things done cheaper by doing few changes to the original content. With Google you can find pretty much couple of interesting hacks for anything you can think of.
How to do that is simple. Think of a word and add the word hacks at the end. and search it on Google. You will be amazed with the number of hacks you can find of. Next time before you do something try to do a small research on Hacks related to what you going to do. You might able to save some money or get the thing done quite easily with a small hack
Couple of hacks I found quite interesting.
Table hack
A couple of years ago we were in IKEA and saw a coffee table for around fifty dollars. Who could pass up such a deal. We...

Chair Hack

Voice controlled wheel chair - Hack a Day. Not a simple hack but quite good one


Voice controlled wheel chair - Hack a Day

[Amnon] sent in this demo of his groups voice controlled wheel chair. I couldn’t find any details, but sometimes just a demo is enough to find some new ...
Ikea Hack

I think Ikea hack is a pretty popular hack among bloggers.


IKEA Hacks is now syndicated to the blog of Jules the IKEA hacker. ... The IKEA Hacksgroup on Instructables was originally started by Fungus Amungus. ...

WANTED: your ikea hacks. whatever they may be - a funked up klippan sofa, an ingenious idea for your pax wardrobe, a creative twist on your kitchen ...



Desktop Hacks - Seems like Windows does not have Desktop hacks. Most of them are Linux Hacks.

K. Scott Allen : Remote Desktop Hacks

re: Remote Desktop Hacks. You may also turn off or reboot a remote XP ... re: RemoteDesktop Hacks. Very nice! I didn't know any of these shortcut keys. ...

This will not stop from here. Try this with anything comes to your head and check the Google results and if you come a cross anything interesting or crazzycool share with us. If you have a blog, website share it with us.

Wednesday, November 12, 2008

How to upload blogspot Sitemap to Google Webmaster tool

Blogspot (blogger) doesnot allow you to upload any files to it's servers. Basically you cannot add sitemap.xml file to a blogspot blog. However you do not have to create a separate sitemap.xml file it is automatically created for you and it is called atom.xml

So it Google webmaster Tools you can go to upload sitemap and select General Sitemap and type atom.xml in the given text box and submit it.

Domain Hacks

First of all this is not hacking domain name and change DNS record. This is more fun than that. Domain Hacks is about getting the word you want as a combination of Top Level Domains and couple of letters.

Examples for domain hacks

blo.gs
chronolo.gy
tel.ly
del.icio.us
cr.yp.to

These domain hacks make your domain extreamly shorter and make it easy to remember. It is a pretty good solution as all the dictonary word domain names are already taken. You can user Domain hack search utility to get ideas suggestion to creat above type of domain hacks.

Tuesday, November 11, 2008

Analyse your Network: How to see what websites others visiting

Wireshark is a simple free tool that allows you to monitor all the activities in your network. Just go to the Wireshark website and download the file and install it. It works fine with all the windows environments. After successful installation and starting the program you will come to a screen as follows.

Go to 'List all the available networks' from the first icon in the tool bar and it will give a list of IP addresses and select your local area network IP address and see all the communications between the computers inside your network with Internet and even you can see internal communication such as router and computer. Wireshark is simple but really useful tool that can be used to monitor all the activities inside a network as it happened.
You can actually use this for spy on other computers, Detect all the hidden communications between websites and your computer. Also this is a good tool for forensic investigations as you can detect internet activities in other computers without interacting with the computer.

Monday, November 10, 2008

SQL Injection: Crazzy Way to bypass Login

SQL injection is quite simple method of hacking a website login. You do not need much knowledge and it is not a secret any more. Even small kinds can try it. You can find thousands of good articles, e-books and tutorials about SQL injection on net. Because of this many websites blogs been attacked by using SQL injection.

Couple of interesting News you can find on Google News for SQL- Injection

Business Bloggers Leave Blogs Open To HackersZDNet UK, UK - 18 hours agoThe two main threats bloggers face are comment spam and SQL injection attacks. Both Blogger and Wordpress have been vulnerable to SQL injection attacks, ...

Massive SQL Injection Attacks: The Chinese WayCircleID, Canada - 22 Oct 2008... with tools and setting new benchmarks for massive SQL injection attacks, like the case with this one: ”A professional web site vulnerability scanning, ...

Adobe website suffers SQL injection attackIT PRO, UK - 20 Oct 2008Sophos said that Mac/Badsrc-C was a dangerous piece of malware which spread by infecting PCs with SQL injection. This downloaded malicious scripts from the ...

If you interested in reading more news related to SQL Injection Go to Google News.

Yes. it is pretty scary if you manage and website or a blog. It would be quite fun to try SQL injection on websites and see if they haven't handle it well.

If so missed a simple validation at some point your database might be open for a SQL Injection and results would be
unauthorised login in to your members area
SQL injector get hold of all your data and your SQL table structure
Changing your valuable data
Delete a Database table or tables or
if attacker gets lucky may be whole database would be deleted.

How SQL injection Works?

It is pretty simple. I will satart with a simplest example. Imagin Website Database has a Table called 'USER_LOGIN' and there are two columns for 'USERNAME' and 'PASSWORD'. In your webpage loging.aspx or login.php you will have TXTUSERNAME.TEXT and TXTPASSWORD.TEXT. Two text boxes with simple server side validation or no server validation at all. So you will have a simple SQL query in your loging page something similar to

SELECT * FROM USER_LOGIN where USERNAME = '+ TXTUSERNAME.TEXT+' AND PASSWORD = '+TXTPASSWORD.TEXT+';

then you will be checking if the result is greater than or equel to one then you take the user to next step that is login. If your website loging is doing something similar your website might be open for a SQL injection.

Lets see what happend if someone type ' or 1=1 --- in the TXTUSERNAME text box. Above SQL query will be rewritten as follows.

SELECT * FROM USER_LOGIN where USERNAME = '' or 1=1 --- ' AND PASSWORD = 'anything';

In English above SQL query means Select each record which satisfy the condition that USERNAME is equal to '' or 1=1. --- will comment out the rest of the query so it really does not matter what you type on the password. Which will return all the record as 1=1 is always True with the OR condition. Logic is so simple and it is Crazzy.

I will post more about SQL Injection and would like to know what you like to know. I can share some e-books related to SQL Injection and How to protect your website from that.

Further Reading

SQL Injection Attacks By Example

Please do not miss use this.

Sunday, November 9, 2008

Demonoid is open for new Registration

Demonoid is quite interesting site for finding torrents. Today the registration is open. That means you can register without and invitations.

Hurry up they can close this at any time sooner.

Visit Demonoid for registration without invitations now

Thursday, November 6, 2008

CNN Hologram (Complete Video) / CNN Election Night 2008



This is what CNN Election night Hologram. It is pretty amazing.

Imaginations are endless. They will come true with time.

Tuesday, November 4, 2008

Gmail Tip: Your email, wherever you are on the web, with Toolbar

If you are addicted to emails this will be a good news. Now you can add Gmail custom button to alert you when you get a new email. Also, you will get a preview of your mail and you can find any message from the tool bar as well. 


Download Google Toolbar 5 for Internet Explorere and FireFox

Official Gmail Blog: Tip: Your email, wherever you are on the web, with Toolbar

Sunday, November 2, 2008

SMS Text Messaging for chat in Gmail

GMail is allowing you to send SMS via GMail chat. It combines the IM and texting. When you enable this Lab feature even whe you are offline you will get a SMS. Still this feature is in testing mode and probably within 2 weeks it will be enabled.

Official Gmail Blog: Almost new in Labs: SMS Text Messaging for chat

Saturday, November 1, 2008

How to choose a better domain

I will make this really short as it is no need to go into details. This is my top five.

1. Make your domain as short as possible
2. Stick to two or three English words
3. Choose catchy word combination
4. Buy already ranked domain names
5. Include mostly searched words
Blog Widget by LinkWithin