Saturday, October 24, 2009

Earn Money @ home !!!!!




Hey boys and girls,



I want to tell you about great site I found. They pay me to read e-mail,
visit web sites and much more.

It's free to join and easy to sign up! CLICK THIS
LINK TO VISIT:

http://mailsmoney.net/pages/index.php?refid=gayasharp

Monday, October 5, 2009

Capture a Screen Shot with Mac OS X

1. To capture the entire desktop, press Command-Shift-3. The screen shot will be automatically saved as a PNG file on your desktop.


  1. To copy the entire desktop, press Command-Control-Shift-3. The screen shot will be placed on your clipboard for you to paste into another program.

  2. To capture a portion of the desktop, pressCommand-Shift-4. A cross-hair cursor will appear and you can click and drag to select the area you wish to capture. When you release the mouse button, the screen shot will be automatically saved as a PNG file on your desktop. (The file is saved as PDF in Mac OS 10.3 and earlier.)

  3. To capture a specific application window, pressCommand-Shift-4, then press the Spacebar. The cursor will change to a camera, and you can move it around the screen. As you move the cursor over an application window, the window will be highlighted. The entire window does not need to be visible for you to capture it. When you have the cursor over a window you want to capture, just click the mouse button and the screen shot will be saved as a PNG file on your desktop. (The file is saved as PDF in Mac OS 10.3 and earlier.)

  4. Add Control to the two shortcuts above to place the screen shot on the clipboard instead of saving it to the desktop.

  5. Another method for capturing screen shots in Mac OS X is by using the bundled Apple utility, Grab, located in the Applications > Utilities folder. Grab is useful if you need to include a cursor or a menu in your screen shot, or if you want to save your screen shot to TIFF format. To include a cursor, first go to Grab Preferences and select the cursor icon you wish to have in your screen shot. To capture the screen with Grab, run Grab, then choose of the capture modes from the "Capture" menu: Selection, Window, Screen, Timed Screen.

  6. When you choose the Selection mode in Grab, you can capture a specific region of the screen by dragging around it. Grab will display a tooltip showing the size of the region you have selected and the screen shot will open in a window when you release the mouse button. The cursor will not be included.

  7. When you choose the Window mode in Grab, an instruction window will appear asking you to select the window you wish to capture, then click the "Choose Window" button. When you click the button, the instructions will disappear and the window you click ill be captured, including the mouse cursor at the position where you click (if a cursor was selected in Preferences).

  8. When you choose the Screen mode in Grab, an instruction window will appear asking you to click the screen when you are ready to capture. The mouse cursor will be included in your screen shot at the position where you click (if a cursor was selected in Preferences).

  9. When you choose the Timed Screen mode in Grab, an instruction window will appear, allowing you to prepare your screen for capture. When you are ready, press the "Start Timer" button and you will have ten seconds before the screen is captured. This allows you to open menus and sub-menus, if necessary. After ten seconds the entire screen will be captured. The mouse cursor will be included in your screen shot if a cursor was selected in Preferences.

Saturday, September 26, 2009

nabling and using the "root" user in Mac OS X

Summary

The root user in Mac OS X is disabled by default. Follow the steps in this article to enable and use it, if needed.

Important: If you are not familiar with the meaning of "root user," read this entire article to learn important precautionary information before using the root user. You must have an administrator account and password to complete the steps below.

Note: If you are using Mac OS X Server, root is already enabled by default. Advice contained in this article to disable root access when used infrequently does not apply to Mac OS X Server. It should remain enabled. For more information on related behavior, see this article.

Products Affected

Mac OS X 10.4, Mac OS X 10.3, Mac OS X 10.2, Mac OS X 10.1, Mac OS X 10.0, Mac OS X 10.5

About the root user

The user named "root" is a special user in UNIX-style operating systems that has read and write privileges to all areas of the file system. The root user should only be used for specific administration or monitoring tasks. After completing a task as the root user, you should log out of Mac OS X and log back in using a normal or administrator account. You should disable root access if you do not use it often.

The root user does not appear in Users or Accounts preferences.

Important notes

  • Only the owner of a computer or its designated administrator(s) should have an administrator account or the root password.
  • Any user with an administrator account can become the root user or reset the root password.
  • A root password should be difficult to guess, containing both numbers and letters within the first eight characters.
  • A root user has the ability to access other users' files.
  • The root user has the ability to relocate or remove required system files and to introduce new files in locations that are protected from other users.

How to enable the root user

Mac OS X 10.5 or later

  1. From the Finder's Go menu, choose Utilities.
  2. Open Directory Utility.
  3. Click the lock in the Directory Utility window.
  4. Enter an administrator account name and password, then click OK.
  5. Choose Enable Root User from the Edit menu.
  6. Enter the root password you wish to use in both the Password and Verify fields, then click OK.

Note: If you are troubleshooting an issue that prevents you from logging in as an administrator, follow the steps in this article to enable the root user.


Mac OS X 10.4.x or earlier

  1. Click the Finder icon in the Dock.
  2. From the Go menu, choose Applications.
  3. Open the Utilities folder.
  4. Open the NetInfo Manager utility.
  5. Click the lock in the NetInfo Manager window.
  6. Enter an administrator account name and password, then click OK.
  7. For Mac OS X 10.2 and later, choose Enable Root User from the Security menu.
  8. For Mac OS X 10.0 and 10.1, choose Security from the Domain menu, then Enable Root User from the submenu.
  9. If you have not previously set a root password, an alert box may appear that says "NetInfo Error," indicating that the password is blank. Click OK.
  10. Enter the root password you wish to use and click Set.
  11. Enter the password again for verification and click Verify.
  12. Click the lock again to prevent changes.

How to log in as root

Use these steps for Mac OS X 10.2 or later:

  1. If you are logged in, choose Log Out from the Apple menu.
  2. If you are logging in from a list of usernames with pictures, click Other.
  3. In the Name field, type: root
  4. In the Password field, type the password you defined in the steps above.

Mac OS X 10.0 to 10.1.5

After enabling the root user, you must log out from Mac OS X and log back in as the root user. Logging in to Mac OS X from a list of usernames is the default behavior for later versions of Mac OS X. Logging in by typing your username in a text entry field is the default behavior in earlier versions of Mac OS X. You can choose either method in Login preferences. The root user does not appear in the list, so you need the text entry option. If necessary, follow these steps to change the login method to text entry:

  1. From the Apple menu, choose System Preferences.
  2. From the View menu, choose Login.
  3. Click the Login Window tab.
  4. Select the radio button for "Name and password entry fields."

Follow these steps to log in as root:

  1. If you are logged in, choose Log Out from the Apple menu.
  2. In the Name field, type: root
  3. In the Password field, type the password you defined in the steps above.


How to disable the root user

Mac OS X 10.5 or later

  1. Click the Finder icon in the Dock.
  2. From the Go menu, choose Utilities.
  3. Open Directory Utility.
  4. Click the lock in the Directory Utility window.
  5. Enter an administrator account name and password, then click OK.
  6. Choose Disable Root User from the Edit menu.

Mac OS X 10.4.x or earlier

  1. Open NetInfo Manager. It's in the Utilities folder.
  2. Click the lock.
  3. Enter the name and password for an administrator account, then click OK.
  4. For Mac OS X 10.2 and later, choose Disable Root User from the Security menu.
  5. For Mac OS X 10.0 and 10.1, choose Security from the Domain menu, then Disable Root User from the submenu.


What is the root directory?

It helps to know that the term root is used in two distinct ways: The "root user" and the "root directory." The root directory is the highest directory level of a disk. The files and folders you see when you open (double-click) your hard disk icon are the contents of that disk's root directory. A directory is represented graphically as a folder. You may know your home directory as your "home folder." The terms "folder" and "directory" are generally interchangeable.

A user's short name is also the name of his home directory.

The Finder and the Terminal show different contents for the root directory. Some items in the root directory are made invisible when viewed in the Finder. This reduces visual clutter and enhances simplicity. Users familiar with UNIX-style command line may use the Terminal utility to view everything in a directory.


Tuesday, September 8, 2009

Installing Wine on Mac OS X

Part 1: Install MacPorts

MacPorts is a package manager that makes installing open source programs much easier. In particular, trying to install a large program like Wine without the help of a package manager would be tremendously difficult. Fortunately, MacPorts itself is simple to install.

  1. On the MacPorts website, go to the Download and Installation page and download the appropriate "dmg" disk image for your computer.
  2. Double-click the file you downloaded, and double-click the .pkg file to run the installer. You're almost done!
  3. Open up the Terminal and copy and paste the following into it. Remember not to include the dollar sign ($) at the beginning.copy all as a one line..

$ echo export PATH=/opt/local/bin:/opt/local/sbin:\$PATH$'\n'export MANPATH=/opt/local/man:
\$MANPATH | sudo tee -a /etc/profile

The Terminal will ask for your password: this is the password to the
Admin account on your computer. As a security measure, the Terminal
does not display anything as you type, not even asterisks (*). Type your password anyway, and press enter. If you ran the command correctly, the Terminal should respond with:

export PATH=/opt/local/bin:/opt/local/sbin:$PATH
export MANPATH=/opt/local/man:$MANPATH

If you didn't get that response, it might be because the Admin account doesn't have a password set. Setting a password is required.
4. Close the Terminal. MacPorts has been installed!

Part 2: Install Wine Using MacPorts

Let's start using MacPorts right away! To tell MacPorts that you want it to install Wine for you, all you have to do is open up the Terminal again and enter this command (without the $):

$ sudo port install wine

You may be asked for your Admin account password again. The Terminal will start displaying lots of information. This is absolutely normal — MacPorts is just keeping you updated on what it's doing. This flow of information will be your guide to let you know whether or not the computer is still working. It will take a while for the install to finish: at least half an hour. As long as the Terminal keeps on giving you more information about what it's doing, don't interrupt it. Feel free to leave and do something else while the computer is installing Wine. When the Terminal stops giving you more information and is ready for another command, Wine is installed and ready to go!

Note: If you get an error message at this step that reads error: C compiler cannot create executables, it usually means you forgot to install Xcode. See the requirements.


Part 3: Install Windows Programs Using Wine

To install a Windows program, first download the installer file: it should end with .exe. Remember the location you put it, and open up the Terminal again. cd to the location, and use ls to make sure you can see the installer file. Once you are in the correct directory, run the installer through Wine by running the following command in the Terminal:

$ wine $INSTALLER.exe

Where $INSTALLER is the name of the installer file. For example, if the installer file is named setup.exe, you would run:

$ wine setup.exe

X11 will open (if it isn't already), and soon you will see a regular graphical Windows installer. Click through it, and you're done!

Part 4: Run Windows Programs Using Wine

Open up the Terminal and run this to get to your Program Files folder:

$ cd ~/.wine/drive_c/Program\ Files/

Run ls to see what programs you have installed. Pick a program, and enter its directory using cd. (If the folder has a space in it, you must type a \ before the space. For example, Program\ Files. If you're having problems, try using tab autocomplete.) There should be a file that ends in .exe: this is the program file. Type this into Terminal:

$ wine $PROGRAM.exe

Where $PROGRAM is the name of the .exe file. X11 will open (if it isn't already), and the program will pop up, ready to use! It will probably open fullscreen: to reduce it in size, go open the Window menu from the Mac OS X menu bar, and select Zoom Window. You can then resize the program normally. Enjoy using Windows on your Mac, freely and legally!

Keeping Wine Up to Date

Wine is an open source program. That means that programmers around the world are continually improving it, adding new features and squashing bugs. If you don't update Wine, though, it will never get those improvements, so it's generally a good idea to check for updates every so often. We can use MacPorts to keep Wine up to date: it's easy! Just run this command:

$ sudo port selfupdate && sudo port upgrade outdated

Once again, you will need to enter your Admin account password. With this command, MacPorts will first update itself, if any updates are available. It will then find all the outdated software it knows about (including Wine) and upgrade them all to the latest version. Checking for updates isn't strictly necessary, as Wine runs quite well currently. However, it's a good idea to run this command every few months or so.

Uninstalling Wine and MacPorts

If you try Wine and you don't like it, uninstalling it is easy. Just run this command:

$ sudo port uninstall wine

And MacPorts will helpfully remove Wine from your computer. However, in order to install Wine, MacPorts also had to install many other small programs that Wine relies upon to work correctly. (That's why the install process takes so long!) If you want to remove these as well, it's simplest to just delete your entire MacPorts installation with the following command:

$ sudo rm -rf /opt

That command should remove everything that you installed in this tutorial, including MacPorts, Wine, and all the other programs MacPorts installed to get Wine to work correctly.

So why would you ever use the first of those two commands, rather than the second? Well, MacPorts can install a lot more than just Wine. There are a whole bunch of nifty programs you can easily install using MacPorts, such as GraphViz (a very swanky graphing tool), Battle for Wesnoth (a turn-based strategy game), and GIMP (an image editor, like Adobe Photoshop). And just like Wine, every program available on MacPorts is free and open source. Even if you decide Wine isn't for you, MacPorts might have something else you might like. Take a look!





Monday, July 20, 2009

free gprs in sri lanka , why pay for mobile broad band when you can have it for free!!!

By Gayan Ranasinghe

This trick works with mobitel network in sri lanka.And i must say that this is not 100% perfect broadband.This procedure is a little annoying and not totally comfortable BUT its FREE gprs after all!

This trick may be useful for you mainly when using gprs on your phone.you can use this TRICK to download small files less than 800kb or so.(generally,mobitel charges 1cent per kb,so technically you get 8 rupees of gprs for FREE! per session)

Its really simple.Do you have a mobitel connection in your mobile?

theres one condition for our little trick to work

***you must have less than 1.50rs & more than 1.00rs credit to be able to perform this TRICK & basic knowledge of gprs usage***

now open your opera mini browser (if you don't have opera mini installed in your mobile,you can download for free @ www.operamini.com)and browse pages as usual.you will only be able to browse for about 30seconds and you will be able to download upto 800-900kb of data in that time(if you have 3g in your phone,depends on your device).then you have to disconnect your current connection using connection manager(in Nokia phones) or the relevant utility depending on the phone.then you can restart browsing.

Nokia N95

Opera Mini support

Based on testing performed by Opera Software, this device supports Opera Mini 4.

Install via mobile download

  1. Point your phone's WAP browser to http://mini.opera.com/ and click on Download Opera Mini.
  2. Answer 'Yes' to all installation messages and enjoy browsing the full Web, right on your mobile phone!

Problems connecting? Make sure your phone is correctly set up for Internet access.

Install via PC download

  1. Select preferred language for Opera Mini:
  2. Transfer these files to your phone, and install them according to your phone's installation procedure:
    opera-mini-advanced.jad
    opera-mini-advanced.jar

Sunday, July 19, 2009

How can I open an EXE file on a Mac?

I use a Macintosh. It says


    The document "NAV80TRY.EXE" could not be opened, because the application program that created it could not be found.

You can convert exe file to mac .app file through some tools like macpack or also use bootcamp software on Mac for running exe file, it is better and faster than using Virtual PC. Right now it is on R & D stage.link for macpack

Tuesday, July 14, 2009

How to Change Mac IP Address

    Check the IP Address

  1. Step 1

    Launch the Apple Menu. Select "System Preferences." Then click "Network Control

    Things You'll Need:

    • Apple Mac computer
    • Internet connection

    Panels" and click "TCP/IP."

  2. Step 2

    Check the IP address in the list of connections. Your Mac has an IP address, and some of your electronic devices may also have their own IP addresses.

  3. Step 3

    Visit a website such as What Is My IP for a utility that reads your Mac IP address (see Resources below). It will automatically detect your IP address and provide it for you.

  4. Change an IP Address Automatically

  5. Step 1

    Obtain a new IP address from your Internet Service Provider or Network Administrator. This step might not be necessary, as most broadband connections use dynamic IP addresses. This means that every time your Mac connects to the Internet, it will be assigned a new IP address. You might not need to do anything in order to change the address.

  6. Step 2

    Get the new IP address from your ISP, because if two computers have the same address, neither one of them will be able to connect to the Internet.

  7. Step 3

    Realize each computer connecting to the Internet must have its own unique IP address. Have your ISP assign one that nobody else is using or you will waste time trying to guess the right number.

  8. Change Your Mac IP Address Manually

  9. Step 1

    Select the network configuration that has the green dot next to it, from the "TCP/IP" screen you opened before. This is your active connection and will probably be the "Built-In-Ethernet" option in the drop-down box. Then click the "Configure" button at the bottom of the dialog box.

  10. Step 2

    Click the "Configure IPV4" drop down menu next and choose "Manually."

  11. Step 3

    Type in your new IP address in the box under the TCP/IP menu. Simply delete the number that is in there and enter your new one.

  12. Step 4

    Click "Save." Your address has now been changed.

Saturday, July 11, 2009

My ApPlE experience



I tested apple macbook. it performance is maximum. i cant believe hw mac reach that kind of perfonace level, bt hw ever apple mac is da one high performance i hv seen :D

These ar da photoes.....







this video and photos help u to prove it. watch .......
















Tuesday, June 23, 2009

Apple’s easy to hack after all?

Apple apparently left off tools that are available in the GNU compiler collection to protect against exactly this sort of attack. Dai Zovi even says that the current version of OS X is easier to hack than XP. Ouch.

Does this mean that Mac’s are less secure than PC’s? Not really, since they’re still such a small percentage of the market that they’re not under heavy attack by malware. Even though the capability exists to take advantage of this vulnverability, the return on time and effort is still a lot better on the Windows side for malware writers. Of course, someone could always decide that Macs are an underutilized target for malware and create something interesting.

Tracking the source of DOS attack with Cisco IOS

Problem: Enterprise is under Denial Of Service Attack that brings down key elements of the business or the whole network at all.
To track the attacker is the first step in handling the attack and unless the flood is coming from inside (most probably not in a well managed LAN) you will need help of your Service Provider to find out the origin. Unfortunately Service Provider’s (SP) backbone is not well suited for such forensics, as its business role is
to provide uninterrupted connectivity to ALL the clients , not only you, so SP will not enable ACLs/ip accounting/Netflow on their backbone to identify where the attack is coming from . And if source Ip of the attack is spoofed you can’t do much .

For such cases Cisco came with the nice feature called
ip source tracking that will gather flow statistics for specific destination
IPs (of victim) and periodically will export them for viewing, and will do all this without overloading the backbone router it is enabled on (Of course relevant if your SP is using Cisco gear) . Here are details:

– Enable it globally for the victim IP , here IP being attacked is 63.45.33.22

Edge(config)#ip source-track 63.45.33.22

- If you want (and if this is being done by SP they will not) you may create log entries:
Edge1(config)#ip source-track syslog-interval 2
Then you will see in logs (good for reminding to disable this afterwards) :
May 28 10:55:47.105: %DOS_TRACK-5-CFG: IP Source Tracker configured for 1 hosts

- Also you may define how often to export gathered info to be viewed (seems to depend on the platform ) :

Edge(config)#ip source-track export-interval 60

- And finally , you see the data accumulated so far :

Edge#sh ip source-track
Address SrcIF Bytes Pkts Bytes/s Pkts/s
63.45.33.22 Fa0/0 141G 485M 8244 141

Most important here will be the Source interface (in this router there is only 1 ingress interface , in real backbone you will have few feeds) where you see most of the incoming traffic for this destination IP. Then you (SP) would go to the upstream router connected to this local interface, enable the same source tracking and so on. Up to the last point in the backbone where the attacking traffic enters
the backbone of SP out of some upstream SP . Then SP would have option to contact the abuse of this upstream provider for them to investigate the issue further, or at least divert the attack to the black hole at the entry point, so end client would not be affected at all.

Wednesday, June 17, 2009

Ten tweaks that will improve Nokia N95 battery life by 328%

here is no way getting around the fact battery life on the Nokia N95 is less than great. Almost every N95 review addresses this issue in one way or the other. Opinions seem to range from infuriated "Nokia should provide a more powerful battery for this type of device" to apologetic "a communication and multi media power house is bound to run its battery dry in no time".

Whatever the case may be, there are things that can be done to improve upon the «default» N95 battery life time. Improvements come from tweaking a few, selected settings from their default values.

I have divided this authoritative N95 battery tweaking guide into two parts: first I will show you a few basic battery friendly optimizations and habits that can be employed by everyone. Next, I provide a few advanced tweaks that on the one hand might not fit everybody, on the other hand result in the most significant improvements.

Right, let's get cracking!

Basic Optimizations

  • Update phone firmware - new firmware might include improvements to battery management.
  • Bluetooth - keep it off unless needed. Put bluetooth management on «active standby» screen for easy access («Tools» | «Settings» | «General» | «Personalisation» | «Standby mode» | «Active standby apps..»).
  • Brightness timeout …not more than 10 seconds («Tools» | «Settings» | «General» | «Personalisation» | «Display» | «Light time-out»).
  • Screen brightness - turn it down a notch or two («Tools» | «Settings» | «General» | «Personalisation» | «Display» | «Light sensor»).
  • Lower the standby timeout - mine's set to 1 minute («Tools» | «Settings» | «General» | «Personalisation» | «Display» | «Power saver time-out»).
  • Camera - do not walk around with "live" viewfinder1.

Rocket Science Tweaks

  • WLAN scanning - turn it off…scan manually, or turn scanning on when needed («Tools» | «Settings» | «Connection» | «Wireless LAN» | «Scan for networks»).
  • 3G - turn it off - especially in areas with poor coverage, where the N95 otherwise will spend stupefying amounts of power searching for networks («Tools» | «Settings» | «Phone» | «Network» | Set «Network mode» to «GSM»).
  • WLAN transmit power (TX power level) - turn it down to, say, 4 mW. («Tools» | «Settings» | «Connection» | «Wireless LAN» | «Options» | «Advanced settings» - say YES to the prompt - scroll down to TX power level choose options/change/ and select 4 mW.).
  • 10th tweak - it simply amounts to switching the phone into »offline« mode at night. In the »offline« mode, the cellular network connectivity is off (but WLAN and Bluetooth are still available) and the rationale is that since you do not make calls while you are sleeping, you might as well let the battery get some rest too.

Enjoy … and by the way, I have no idea if employing these tweaks will actually lead to a 328% improvement, but it is a nice figure, don't you think?

Monday, June 15, 2009

GPRS, WAP and MMS Settings for Mobitel

Yesterday I found out that Mobitel (Sri Lanka) don’t have their GPRS/MMS settings online like Dialog GSM. Even Google couldn’t find them for me! After a little bit of searching online, I finally gave in and called Mobitel’s customer support. After listening to a few songs and a recording that kept reminding that the call was valuable to them and will be attended to soon, I was finally able to get the settings from them. So to save you the pain here they are:

GPRS Settings:
Access Point: ISP

WAP Settings
- Data bearer: Packet data
- Access point name: isp
- Authentication: Normal
- Homepage: http://wap.mobitel.lk
- Network type : IPv4
- Phone ip address : Atomatic
- Proxy serv. address : 192.168.050.163
- Proxy port number : 0

MMS Settings
- Connection name – MobitelMMS
- Data bearer – Packet data
- Access point name – wapmms
- Authentication – Normal
- Homepage – http://192.168.50.165
- Network type : IPv4
- Phone ip address : Atomatic
- Name server : Atomatic
- Proxy serv. address : 192.168.050.163
- Proxy port number : 8080

Now that Mobitel is supporting 3.5G HSPA technology I’m sure they would add this information to their website soon.

Saturday, June 13, 2009

Tracing an e-mail

Let's discuss, how to trace an email sender from the email header.

Viewing Email Header

Every e-mail comes with information attached to it that tells the recipient of its history. This information called a header. The below is the Full header of email .All this information comes with the email. The header contains the information essential to tracing an e-mail. The main components to look for in the header are the lines beginning with "From:" and "Received:" However, it might be instructive to look at what various different lines in the header mean.

Some e-mail programs, like Yahoo or Hotmail, have their full headers hidden by default In order to view the full header, you must specifically turn on that option. Some ways of doing this in different e-mail programs follow here:

Viewing full Header in Yahoo and Hotmail
Yahoo

Click Options -> Click Mail Preferences -> Click Show Headers -> Click "All" -> Click "Save"

Hotmail

Click Options -> Click Mail Display Headings (under "Additional Options") -> Click Message Headers -> Click "Full" ->Click "OK"

Viewing full Header in Email Clients like (Outlook and Eudora etc)
Outlook Express
If you use OE, you may not have much luck; it sometimes gives little more information than what you can see in the main window. But here's the application path anyway:

Click File/Properties/Details to find the header information.

Outlook
First, highlight the email in your Incoming window, right-click on it, and select Options. The window that comes up will have the headers at the bottom.

Eudora
Be sure the message is open, then Click the 'Blah, Blah, Blah' button from the Tool Bar, and the headers will appear.

Pegasus
Select Reader/Show All Headers/

Netscape Mail
Select Options/Headers/Show All Headers

Netscape Messenger 4.0 and 4.5
Select View/Headers/All

Full header in detail:

Message ID:

It is used to identify the system from which the the message has originated (I.e. from the system the sender has logged in). However, this is too easy to forge, and is consequently not reliable.

X-Headers:

X- headers are user defined headers. They are inserted by email client programs or applications that use email. Here from the X- headers inserted into the email by the email client it is clear that the sender has used Microsoft Outlook Express 6.00.2800.1106 to send this email.

X-Priority: 3

X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2800.1106

MIME-Version:

MIME stands for Multipurpose Internet Mail Extension. It tells the recipient what types of attachments are included in email. It is a format that allows people to send attachments that do not contain Standard English Words, but rather graphics, sounds, and e-mails written with other characters. The Mime-Version field merely confirms that the version of MIME used corresponds to the standard version (which is currently 1.0).

From:

Form is useless in tracing an e-mail. It consists of the email of the sender but this can be obviously be a fake. One can use any fake-mailer to fake the sender's name.

Content-Type:

This line tells the receiving e-mail client exactly what MIME type or types are included in the e-mail message. If the Content–Type is text/plain; charset="us-ascii" just tells us that the message contains a regular text message that uses English characters. ASCII is the American Standard Code for Information Interchange and is the system used to convert numbers to English characters.

Return-Path:

It is the address to which your return e-mail will be sent. Different e-mail programs use other variations of Return-Path:. These might include Return-Errors-To: or Reply-To etc.

Received:

This field is the key to find out the source of any e-mail. Like a regular letter, e-mails gets postmarked with information that tells where it has been. However, unlike a regular letter, an e-mail might get "postmarked" any number of times as it makes its way from its source through a number of mail transfer agents (MTAs). The MTAs are responsible for properly routing messages to their destination.

Let me strip-off the above email header to make the understanding easy. The header is splitted and the two received headers are given below.

Received Header 1:
204.127.198.35 - Tue, 25 Nov 2003 19:56:18 -0800
from rwcrmhc11.comcast.net ([204.127.198.35])
by mc7-f12.hotmail.com
with Microsoft SMTPSVC(5.0.2195.6713)

Received Header 2:
68.37.24.150 - Wed, 26 Nov 2003 03:44:57 +0000
from pavilion (pcp03530790pcs.mnhwkn01.nj.comcast.net[68.37.24.150])
by comcast.net (rwcrmhc11)
with SMTP
id <20031126034457013001nk6pe>

The MTAs are "stamped" on the e-mail's header so that the most recent MTA is listed on the top of the header and the first MTA through which the e-mail has passed in listed on the bottom of the header. In the above sample e-mail header, e-mail first passed through 68.37.24.150 (pcp03530790pcs.mnhwkn01.nj.comcast.net), and at last made its way through 204.127.198.35 (rwcrmhc11.comcast.net).

In the Received Header 2, the one marked as "pavilion" is either the domain name of the server from which the email has originated or the name of the computer from which the email has been sent. By doing a DNS query for "pavilion", it is confirmed that it is not a know host name hence, must be the name of the computer from which the mail has originated. "68.37.24.150" is the IP address from which the mail might have originated or it is the IP address of the ISP (Internet Service Provider) to which the user was logged on while sending the mail.

Trace who owns the IP address
Every computers hooked on to internet is assigned with an IP address. Individual users possess a dynamic IP address when they logged on to any ISP to access internet. These IP addresses are assigned by the ISP itself. Organization usually possess static/public IP address which is stored in a database of registries.

There are three major registries covering different parts of the world. They are

www.arin.net => American Registry of Internet Numbers (ARIN) : It assigns IP addresses for the Americas and for sub Saharan Africa.

www.apnic.net => Asia Pacific Network Information Centre (APNIC) : It covers Asia

www.ripe.net => Réseaux IP Européens (RIPE NCC) : It covers Europe

Thus, to find out which organization owns a particular IP address, you can make a "WHOIS" query in the database at any of these registries. You do this by typing the IP address into the "WHOIS" box that appears on each of these websites.

"Received Header" will have the IP address of the ISP in case the users has dialed up to the ISP while sending the email. But if the user has send the email from within the corporate then the corporate public/static IP address is logged.

By giving a "WHOIS" query for 68.37.24.150 at www.arin.net, the following result has been displayed:

Comcast Cable Communications, Inc. JUMPSTART-1 (NET-68-32-0-0-1)
68.32.0.0 - 68.63.255.255
Comcast Cable Communications, Inc. NJ-NORTH-14 (NET-68-37-16-0-1)
68.37.16.0 - 68.37.31.255

# ARIN WHOIS database, last updated 2004-02-04 19:15
# Enter ? for additional hints on searching ARIN's WHOIS database.

From above queries it is found that the IP address (68.37.24.150) is owned "Comcast". By making further queries on "Comcast" it is found that it is the name of the ISP located in NJ, US - 08002. The result of further query is given below:

OrgName: Comcast Cable Communications, Inc.
OrgID: CMCS
Address: 3 Executive Campus
Address: 5th Floor
City: Cherry Hill
StateProv: NJ
PostalCode:08002
Country: US

NetRange: 68.32.0.0 - 68.63.255.255
CIDR: 68.32.0.0/11
NetName: JUMPSTART-1
NetHandle: NET-68-32-0-0-1
Parent: NET-68-0-0-0-0
NetType: Direct Allocation
NameServer: DNS01.JDC01.PA.COMCAST.NET
NameServer: DNS02.JDC01.PA.COMCAST.NET
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
RegDate: 2001-11-29
Updated: 2003-11-05

TechHandle: IC161-ARIN
TechName: Comcast Cable Communications Inc
TechPhone: +1-856-317-7200
TechEmail: cips_ip-registration@cable.comcast.com

OrgAbuseHandle: NAPO-ARIN
OrgAbuseName: Network Abuse and Policy Observance
OrgAbusePhone: +1-856-317-7272
OrgAbuseEmail: abuse@comcast.net

OrgTechHandle: IC161-ARIN
OrgTechName: Comcast Cable Communications Inc
OrgTechPhone: +1-856-317-7200
OrgTechEmail: cips_ip-registration@cable.comcast.com

# ARIN WHOIS database, last updated 2004-02-04 19:15
# Enter ? for additional hints on searching ARIN's WHOIS database.

Now since the IP address found belongs to an ISP, it is clear that the sender has dialed up to this ISP while sending the email. For further enquiry we can then request the ISP to provide us with details of the user who has dialed up to them at that given point of time (Wed, 26 Nov 2003 03:44:57 +0000). If the ISP cooperates, they will check their user and message logs to see who was logged into that particular IP address at that time and date. This will reveals the sender's telephone number from which he/she has dialed to the ISP. Now once we have the telephone number we can easily retrieve the name and address of the sender.

Now the above case is solved but there are also other cases where the IP address found on the email header may be owned by an organisation or a cyber cafe.

Cases1: THE IP ADDRESS OWNED BY AN ORGANISATION

But in case the IP address found belongs to an organisation then you have to request them to provide information about the user who has send the mail from within the organisation network. They must have user and message logs on their firewall / proxy and can trace each of their computers connected at the given point of time. By supplying the organisation with the e-mail header of the offending e-mail, they can check these logs and hopefully produce information of the user of that machine.

Cases2: THE IP ADDRESS OWNED BY A CYBER-CAFE

In case it is found that the sender has sent the email from a cyber-cafe then it becomes a difficult task to trace him/her. The user may not be a frequent visitor to that cyber-cafe. But let's assume that you receive such mails frequently from that particular cyber-cafe then you can install "key-loggers" in the computers at the cafe. These programs records user's keystrokes, thus creating a record of everything that was typed at a particular terminal. By reviewing the key-logger logs you may be able to trace the sender in this case.

Note: These methods would aid greatly in identifying an e-mail sender, they also would impinge on the rights of others using the computers to conduct their personal business. Such a conflict defines the ongoing struggle between the fight against terrorism over the Internet and the right to privacy, which will continue to evolve in the years ahead.

enjoy..

How To Increase IE Download speed, IE download

If you have ever tried to download several things simultaneously through IE then you may have noticed that it doesn't work quite the way you may have hoped it to. This is because IE limits the amount of simultaneous downloads to two. This is done so that the perceived download progress appears to be tolerable. If you have a high speed connection then your browser should be able to handle a few more downloads. Here is 2 different steps I found to increase your number of connections. Have fun!

IE Download Limit
This is to increase the the number of max downloads to 10.
1. Start Registry Editor (Regedt32.exe).
2. Locate the following key in the registry:
HKEY_CURRENT_USER\Software\m*cro$oft\Windows\Curre ntVersion\Internet Settings
3. On the Edit menu, click Add Value (a dword) , and then add the following registry values:
"MaxConnectionsPer1_0Server"=Dword:0000000a "MaxConnectionsPerServer"=Dword:0000000a
4. Quit Registry Editor.

Sunday, May 24, 2009

5 rules to Protecting Information on your Laptop

Business laptops are a treasure for every hacker or corporate spy. The average corporate laptop is full of business email, confidential documents and more often then not, the user of the laptop has the same passwords on the laptop as on his corporate application and e-mail.

Here is a truly bizarre example of what could happen: Lifetime of FREE BEER for Laptop
Private laptops are also very interesting (especially those of celebrities)

And yet, the security awareness of the owners of laptops is somewhat lacking. So here are 5 simple rules that can help you keep your laptop safe:

  1. Do not leave a laptop unattended in areas accessible by the general public - Leaving a laptop anywhere where it can be seen and picked up by another person is a very bad idea. This includes the table in your favorite cafe, the company cafeteria, airport lounge or waiting room, even an unlocked office where there is a possibility for an untrusted person to walk in.
  2. If you must leave your laptop, secure it - In the unlikely case where you must leave your laptop, make sure it is very difficult for someone to steal it. Either place it in a cabinet (preferably locked) or use a Kensington Lock to bind your laptop to something difficult to move (office furniture, central heating pipes).
  3. Carry your laptop in an inconspicuous bag - Avoid manufacturer branded laptop cases, since they scream "there is a laptop in here". Simply, invest $30-$40 in a simple unmarked document bag which has a laptop compartment. NOTE:DO NOT go overboard and buy a designer bag costing as much as the laptop, since then the bag itself will be a target for theft.
  4. Do not leave a laptop in a visible place in your car - A lot of petty criminals can see an excellent opportunity to steal any kind of bag left on a seat of a parked vehicle. Ideally, never leave your laptop in the car. If it must be left, place it in the trunk of the car, and check that you have locked the car and fully closed all windows.
  5. Encrypt the entire hard drive - if all else fails, the value of the information within the laptop is usually much greater then the value of the hardware. Encrypting the entire hard drive will make much more difficult for the thief to extract the valuable information, and can prolong the extraction time to a point when the extracted information will be useless. Encrypting the entire hard drive will cause performance reduction of the disk subsystem, but this is always acceptable when compared to the protection it offers, even for home users. There are several products which can perform full drive encryption like Windows Vista BitLocker, a free TrueCrypt software, and several commercial add-on packages. NOTE: Do not try encrypting only part of the hard drive or certain files. This will not add too much security, since the attacker has an entire computer full of data to search for clues to your decryption password.

Further reading

Vista BitLocker at Microsoft

TrueCrypt portal

Comparison of Disk Encryption Software at Wikipedia

A handful of Firefox tweaks that will double your browser speed


Firefox users take note: You need to do this. Now. As in, this instant. More savvy users are probably already familiar with editing Firefox’s configuration file but whether you’re a computer rookie or a seasoned veteran, Gnoted has issued a handful of tweaks that really get Firefox cooking. As much as we all love the fox, it can get a bit slow on occasion - especially if you’re like us and have 35 open tabs spread across four windows at any given time. By tweaking the way Firefox handles some caching functions, you can dramatically improve page load speed and even prevent Firefox from hogging your system resources while minimized. If you don’t currently have any experience playing with your configuration file, don’t be scared. Just follow the simple instructions, take your time and if you want a security blanket to squeeze, jot down each setting before you change it so you can always restore the default configuration if need be. So without further ado, hit the jump and get tweaking - just remember to restart Firefox when you’re done.

Reduce the amount of RAM Firefox uses for its cache feature

1. Type “about:config” (no quotes) in the adress bar in the browser.
2. Find “browser.sessionhistory.max_total_viewer
3. Set it’s value to “0“;(Zero)

Increase the Speed at Which Firefox loads pages

1. Type “about:config” into the address bar and hit Enter.
(Normally the browser will make one request to a web page at a time. When you enable pipelining it will make several at once, which really speeds up page loading.)

2. Alter the entries as follows:
Set “network.http.pipelining” to “true
Set “network.http.proxy.pipelining” to “true
Set “network.http.pipelining.maxrequests” to some number like 10.

This means it will make 10 requests at once.

3. Lastly, right-click anywhere and select New-> Integer. Name it “nglayout.initialpaint.delay” and set its value to “0“;.(Zero)

This value is the amount of time the browser waits before it acts on information it receives. If you’re using a broadband connection you’ll load pages faster now.
Optionally (for even faster web browsing) here are some more options for your about:config (you might have to create some of these entries by Right Click –> New– > Interger or String

network.dns.disableIPv6: set “false”
content.notify.backoffcount”: set “5“; (Five)
plugin.expose_full_path”: set “true”.
ui.submenuDelay”: set “0; (zero)

Reduce RAM usage to 10MB when Firefox is minimized:

This little hack will drop Firefox’s RAM usage down to 10 Mb when minimized:

1. Open Firefox and go to the Address Bar. Type in about:config and then press Enter.
2. Right Click in the page and select New -> Boolean.
3. In the box that pops up enter “config.trim_on_minimize”. Press Enter.
4. Now select True and then press Enter.
5. Restart Firefox.

Thanks...

BlogCatalog

Technology Blogs - BlogCatalog Blog Directory