Sunday 15 April 2012

Intitle:"index.of" [Quick Tips To Search Google Like a Pro]



Search Google Like Geek
This Post is for to Teach how to search on google like pro.



So let us start From Basic


Example: "internet marketing"


Exclude Words:
Lets say you want to search for content about internet marketing, but you want to exclude any results that contain the term advertising. To do this, simply use the "-" sign in front of the word you want to exclude.


Example : Search: internet marketing -advertising



Site Specific Search :
Often, you want to search a specific website for content that matches a certain phrase. Even if the site doesn’t support a built-in search feature, you can use Google to search the site for your term. Simply use the "site:somesite.com" modifier.


Example: "internet marketing" site:www.smallbusinesshub.com


Download :
There is so many fileserver just include them in your search 


For example : Site:mediafire.com books name




Similar Words and Synonyms:
Let’s say you are want to include a word in your search, but want to include results that contain similar words or synonyms. To do this, use the "~" in front of the word.


Example: "internet marketing" ~professional


Specific Document Types:
If you’re looking to find results that are of a specific type, you can use the modifier "filetype:". For example, you might want to find only PowerPoint presentations related to internet marketing.


Example: "internet marketing" filetype:ppt


This OR That:
By default, when you do a search, Google will include all the terms specified in the search. If you are looking for any one of one or more terms to match, then you can use the OR operator. (Note: The OR has to be capitalized).


Example: internet marketing OR advertising


Phone Listing:
Let’s say someone calls you on your mobile number and you don’t know how it is. If all you have is a phone number, you can look it up on Google using the phonebook feature.


Example: phonebook:617-555-1212 (note: the provided number does not work – you’ll have to use a real number to get any results).


Area Code Lookup:
If all you need to do is to look-up the area code for a phone number, just enter the 3-digit area code and Google will tell you where it’s from.


Example: 617


Numeric Ranges:
This is a rarely used, but highly useful tip. Let’s say you want to find results that contain any of a range of numbers. You can do this by using the X..Y modifier (in case this is hard to read, what’s between the X and Y are two periods. This type of search is useful for years (as shown below), prices or anywhere where you want to provide a series of numbers.


Example: president 1940..1950




Calculator:
The next time you need to do a quick calculation, instead of bringing up the Calculator applet, you can just type your expression in to Google.


Example: 48512 * 1.02


Word Definitions:
If you need to quickly look up the definition of a word or phrase, simply use the "define:" command.


Example: define:plethora


This is some Basic For Student Who Always Tell me to give me some resource ,pdf ,ebook videos , links ..


Note:There is some Tools Made By me For Advance Hacking: Google Enumeration Will share with You.


For Advance Google Searching You Must need to Download This Book Name Google Hacking For Penetration Testers 


Download :Simply Type in Google  site:mediafire.com Google Hacking 




Thanks :)




Our Next Post Will come Like How To search Google Like Geek [papa]

How to install Tor on backtrack 5 r2 [Backtrack Tutorials]


Tor is an open source Anonymous Internet tool. It protects your personal identification from tracking systems by changing the source IP address frequently. Application will create many virtual tunnels through the tor network.
By default Tor is not integrated in BackTrack 5. Why use Tor on Backtrack ? Normally Tor is used to protect the browsing security but Tor can be used for network scanning tools and other information gathering tools or by student for Educational Purpose.


In this my article i will show you how to install TOR properly on Backtrack . Dont Be Hesitate If You are Unable to Take Advantage of this post . Put YOUR Question with Me I will quickly give your answer . 


So Let Us Start 
I do not recommend just using TOR for your proxy. It's wise to layer your anonymity (Including your router,  if you're working off a Desktop).




start. Open the Terminal.
step 1. #cd /etc/apt
             #ls

step 2. #vi sources.list
step 3. Press 'i' on your keyboard.
step 4. Add this line at the bottom:  deb http://deb.torproject.org/torproject.org lucid main



step 5. Press ESC, type a colon, type wq and hit enter.  
step 6. Run this command: gpg --keyserver keys.gnupg.net --recv 886DDD89
step 7. Run this command: gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | sudo apt-key add -
step 8. apt-get update
step 9. apt-get install tor tor-geoipdb
step 10. Download Tor Browser Bundle for Ubuntu (To your desktop). https://www.torproject.org/projects/torbrowser.html.en
step 11. cd Desktop
step 12. Download the architecture-appropriate file above, save it somewhere, then run one of the following two commands to extract the package archive:


tar -xvzf tor-browser-gnu-linux-i686-2.2.35-9-dev-LANG.tar.gz          
or
tor-browser-gnu-linux-x86_64-2.2.35-9-dev-LANG.tar.gz 

step 13. chown -R root:root ./tor-browser_en-US
step 14. Open the folder 'Tor-Browser_en-US"
step 15. Open the file 'start-tor-browser in gedit.
step 16. Find the line:
"if [ "`id -u`" -eq 0 ]; then
        complain "The Tor Browser Bundle should not be run as root.  Exiting."
        exit 1

17. Change to:

        if [ "`id -u`" -eq 1 ]; then
        complain "The Tor Browser Bundle should not be run as root.  Exiting."
        exit 1

18. apt-get install polipo
19. cd /etc/polipo
20. mv config conf-backup.txt
21. Now Go here, copy all text:  
22. vi config
23. Press 'i' on your keyboard.
24. Paste the text you just copied.
25. Press ESC, type a colon, type wq and hit enter.  
26. service polipo start
27. service tor start
28. Start tor browser bundle (From the file on your desktop). 
     To run the Tor Browser Bundle, execute the start-tor-browser script: 
       # ./start-tor-browser 


This will launch Vidalia and once that connects to Tor, it will launch Firefox. Do not unpack or run TBB as root
29. Done!




Wanna check it?

1. ps aux |grep polipo
2. netstat -ntl

Remember, polipo runs on port 8118, TOR runs on 9050. ;) 




Remember : Tor and polipo should automatically run when you start Backtrack:


So Dont Need To start tor Again and Again.

1. service tor start
2. service polipo start

Be sure to stop both when you need to update anything:


By giving Command Like

1. service tor stop
2. service polipo stop


@@@@@ Done @@@@@@@


Hope You Like It 
Dont Be Hesitate If  You are Unable to Take Advantage of this post . Put YOUR Question with Me I will quickly Reply .


Reference :WWW.GOOGLE.COM 

Tor Config file [Basic configuration]


+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

this is for tor configuration >> to install Tor on backtrack 5 r2
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++


### Basic configuration

### *******************


# Uncomment one of these if you want to allow remote clients to
# connect:

# proxyAddress = "::0"        # both IPv4 and IPv6
# proxyAddress = "0.0.0.0"    # IPv4 only

proxyAddress = "127.0.0.1"
proxyPort = 8118

# If you do that, you'll want to restrict the set of hosts allowed to
# connect:

# allowedClients = "127.0.0.1, 134.157.168.57"
# allowedClients = "127.0.0.1, 134.157.168.0/24"

allowedClients = 127.0.0.1
allowedPorts = 1-65535

# Uncomment this if you want your Polipo to identify itself by
# something else than the host name:

proxyName = "localhost"

# Uncomment this if there's only one user using this instance of Polipo:

cacheIsShared = false

# Uncomment this if you want to use a parent proxy:

# parentProxy = "squid.example.org:3128"

# Uncomment this if you want to use a parent SOCKS proxy:

socksParentProxy = "localhost:9050"
socksProxyType = socks5


### Memory
### ******

# Uncomment this if you want Polipo to use a ridiculously small amount
# of memory (a hundred C-64 worth or so):

# chunkHighMark = 819200
# objectHighMark = 128

# Uncomment this if you've got plenty of memory:

# chunkHighMark = 50331648
# objectHighMark = 16384

chunkHighMark = 67108864

### On-disk data
### ************

# Uncomment this if you want to disable the on-disk cache:

diskCacheRoot = ""

# Uncomment this if you want to put the on-disk cache in a
# non-standard location:

# diskCacheRoot = "~/.polipo-cache/"

# Uncomment this if you want to disable the local web server:

localDocumentRoot = ""

# Uncomment this if you want to enable the pages under /polipo/index?
# and /polipo/servers?.  This is a serious privacy leak if your proxy
# is shared.

# disableIndexing = false
# disableServersList = false

disableLocalInterface = true
disableConfiguration = true

### Domain Name System
### ******************

# Uncomment this if you want to contact IPv4 hosts only (and make DNS
# queries somewhat faster):
#
# dnsQueryIPv6 = no

# Uncomment this if you want Polipo to prefer IPv4 to IPv6 for
# double-stack hosts:
#
# dnsQueryIPv6 = reluctantly

# Uncomment this to disable Polipo's DNS resolver and use the system's
# default resolver instead.  If you do that, Polipo will freeze during
# every DNS query:

dnsUseGethostbyname = yes


### HTTP
### ****

# Uncomment this if you want to enable detection of proxy loops.
# This will cause your hostname (or whatever you put into proxyName
# above) to be included in every request:

disableVia = true

# Uncomment this if you want to slightly reduce the amount of
# information that you leak about yourself:

# censoredHeaders = from, accept-language
# censorReferer = maybe

censoredHeaders = from,accept-language,x-pad,link
censorReferer = maybe

# Uncomment this if you're paranoid.  This will break a lot of sites,
# though:

# censoredHeaders = set-cookie, cookie, cookie2, from, accept-language
# censorReferer = true

# Uncomment this if you want to use Poor Man's Multiplexing; increase
# the sizes if you're on a fast line.  They should each amount to a few
# seconds' worth of transfer; if pmmSize is small, you'll want
# pmmFirstSize to be larger.

# Note that PMM is somewhat unreliable.

# pmmFirstSize = 16384
# pmmSize = 8192

# Uncomment this if your user-agent does something reasonable with
# Warning headers (most don't):

# relaxTransparency = maybe

# Uncomment this if you never want to revalidate instances for which
# data is available (this is not a good idea):

# relaxTransparency = yes

# Uncomment this if you have no network:

# proxyOffline = yes

# Uncomment this if you want to avoid revalidating instances with a
# Vary header (this is not a good idea):

# mindlesslyCacheVary = true

# Suggestions from Incognito configuration
maxConnectionAge = 5m
maxConnectionRequests = 120
serverMaxSlots = 8
serverSlots = 2
tunnelAllowedPorts = 1-65535

Saturday 14 April 2012

Ubuntu 11.10 – Understanding sudo apt-get install


Ubuntu 11.10 – Understanding sudo apt-get install

This tutorial is for Ubuntu 11.10, however, it should be the same for  other versions of Ubuntu (and derivatives, like edubuntu, kubuntu,  lubuntu, and xubuntu) and other Linux distributions based on Debian.


However, no guarantee is made.
What makes Ubuntu very easy to use is the Ubuntu Software Center  which allows users an easy way to select and install or remove packages  (usually programs).
However, when you search the web looking for help with Ubuntu, often times you see something to the effect of:



Enter the following command:
sudo apt-get install lubuntu-desktop
While this is clear for those who know what it means, I believe the  majority of Ubuntu users are those who want a simple to install and use  Linux OS – they are not interested in lower level details of managing  their system.

In most cases, you can enter the package name into the Ubuntu  Software Center and install it that way. For example, if you found the  instructions: sudo apt-get install lubuntu-core and didn’t want to use apt-get you could enter lubuntu-core into the search field of Ubuntu Software Center and select the appropriate package from there.


Advantages of using apt-get
When you use the Ubuntu Software Manager, all the details of the  installation are hidden from you – you don’t know if you are installing  just one package or twelve.
Using apt-get, you can see which packages are going to  be installed. This also makes it easier to know which packages to  uninstall if you uninstall later.

A common complaint about Microsoft Windows is that applications often  install a lot of junk that is not removed when the application is  uninstalled. Ubuntu isn’t any better in this regard. This is because  installers and uninstallers are hard to write – when you uninstall you  don’t want to accidentally remove packages or files that some other  application is using, so uninstallers tend to be conservative and leave  stuff behind.


Another advantage of using apt-get instead of the Ubuntu Software Center is that apt-get  allows you to install multiple packages with a single command. With the  Ubuntu Software Center you need to install each package separately.


For example, if I want to install the astronomy packages Stellarium and Celestia GNOME using the Ubuntu Software Center, I need to install each separately. Using apt-get, I can install both from the same command by separating them with a space:
sudo apt-get install stellarium celestia-gnome


What it is
The command is really two commands:
sudo – a command to grant super user  access to the system. Ubuntu is configured to prevent administrative  (or system level) changes to the operating system. This is a security  measure. sudo allows a user to temporarily override this behaviour.
apt-get – the Advanced Packaging Tool which allows users to install, remove, and update packages on their system.
Using apt-get

Instructions on how to open a terminal can be found here.
1) Type the command and press Enter (in this case, I am installing the package stellarium):

2) Type your password and press Enter. Note:  as a security measure, your keystrokes are not echoed back to you. You  will be typing, but see no feedback on the screen. While weird, this is  normal.

3) Examine the install information (if you like):

The install information shows you the following:
Any extra packages that will be installed along with the selected package (yellow)
The list of packages to be installed this includes the package you are installing along with any extra packages needed (green)
A summary of (1) number of packages being upgraded, (2) number of  new packages being installed, (3) number of packages being removed, (4)  number of packages that are unaffected (red)
How large the download will be (blue)
How much disk space will be used by the installation (grey)

apt-get may display additional information, but, for this tutorial, it is not relevant.
4) If you want to go ahead with the installation, press Enter. If you changed your mind, type n (upper or lower case – it doesn’t matter) and press Enter,
5) Wait for the installation to finish. During installation, you will see downloading information and installation information:

Thanks Hope you Like it 

Check Your All Browser History From One Location

Browsers, which is our gateway to internet to connect , all  information in form of cookies and browser history that they can be both boon and bane depending on the situation.
If you use multiple browsers for different browsing purpose then checking history of each of them can be boring and time consuming. Hence we share this wonderful tool called Browser History Spy that can help you here. This Windows-only tool provides a single interface to look into the histories of Internet Explorer, Google Chrome and Mozilla Firefox (hope that list will
expand quickly). Let us see how it works.



After having downloaded the application there are two things you may do. One, install the application for regular use. Two, use the portable version to give it a try. By portable you must have already guessed that you can run the exe from external drives as well.

Tuesday 10 April 2012

Top 10 Things To Remember Before Hacking

I`m tired of the ISP storing all my data and I`m tired of all the unsafe ways of being a hacker. So this Article will show you  [Top 10 Things To Remember Before Hacking ]
There aren`t any  antiviruses that protect you, you have to protect yourself.
Nr. 1 
Backup all your Manuals, scripts and personal data like pics and vids and passwords on an encrypted drive (at least more than 124 bit encryption to get anything out of it)

Nr. 2 
Always (if you have windows) have your firewall off. Get yourselves some private firewall on the internet, there are literally tons of them out there on the interwebs.
Nr. 3 
Always communicate with servers on the interweb with an encrypted proxy address, never use your local. (cause your ISP is monitoring and storing every bit you are uploading and downloading on the net).
Nr. 4 
Never tell or use your real name or give your address to anyone on the internet (hackers live to catch these informations)
Nr. 5
Never download or visit a link you get from a stranger (even on your hotmail, gmail or facebook)
Nr. 6 
When you use any program to download or doing P2P communication "torrent". Always use different ports then what the program is set for. Cause there are always reverse engineers doing the opposite of what its ment for. for example firesheep is to capture passwords on your network, but blacksheep is to find people using firesheep.. get me? run in stealth mode
Nr. 7
Always have a USB pen next to you. If you need another OS running or an offline antivirus scan.
Nr. 8
Never feel sorry for anyone on the internet. The text can be tempting but never give yourself in. Stay sharp and strong, hacking isn`t funny business, it is serious and peoples "private" lives are at stake.
Nr. 9 
Don`t tell your friends what you do, it can be tempting. But if you do they will be scared of you and they will try to avoid you.
Nr. 10
Don`t trust your government, they rule you, but don`t let them. Stay firm and protect yourselves. Stand up for what you believe in.
Took me lie 8 mins to make this, so cmon give me 2 secs of your day and post what you think.
If you have any question, just ask and I will be back to you.

Saturday 7 April 2012

Backing up a linux machine remotely (another Linux Machine/Server)





If you need to backup your Linux Machine/Server to some remote place (another Linux Machine/Server), you may use the the following tools.

rsync (recommented) To find out more about rsync follow these links:

http://library.linode.com/linux-tools/utilities/rsync
http://blogs.warwick.ac.uk/chrismay/entry/idiots_guide_to/
And if you need an easy to be used GUI for rsync:

http://www.makeuseof.com/tag/grsync-simple-gui-rsync-easily-linux/
bacula - "Bacula is a set of Open Source, computer programs that permit you (or the system      administrator) to manage backup, recovery, and verification      of computer data across a network of computers of different kinds.  Bacula is relatively easy to use and efficient, while offering many advanced storage management features that make  it easy to find and recover lost or damaged files."
http://www.bacula.org/en/
http://www.bacula .org/en/rel-manual/Brief_Tutorial.html
http://www.linuxquestions.org/questions/linux-server-73/backup-using-bacula-662727/
http://www.linuxplanet.com/linuxplanet/tutorials/6585/1
scp -
http://en.wikipedia.org/wiki/Secure_copy

Friday 6 April 2012

Ebook Ritchie Kernighan.pdf for c


The C Programming Language by Ritchie Kernighan.pdf
---------------------------------------------------------------------------
Free download from this link:
http://www.filesin.com/C14B5189424/download.html
------------------------------------------------------------------

Tuesday 3 April 2012

Advanced Shell Script . [Back up]


#!/bin/bash
# Shell script (BASH) to backup the selected directory on server and upload
to
# another ftp server securely. This script uses the gpg command to
# encrypt the .tar.gz file before upload take place.
#
# In order to run this script you must have following tools installed:
# - /usr/bin/ncftpput
# - /bin/tar
# - /usr/bin/mail
# - /usr/bin/gpg
#

# Script also mails back the ftp operation failed or not
#
# Installation:
# Customize the script according to your need. You need to setup ftp
# server, password etc. Next, you need to setup gpg user name and
# import public key so that you can encrypt the files. Usually following two
# commands needed for gpg:
# gpg --import userkey
# gpg --edit-key KEY_ID|USER_ID
# Command>trust
#
# --------------------------------------------------------------------
# This is a free shell script under GNU GPL version 2.0 or above
# Copyright (C) 2005 nixCraft project.
# Feedback/comment/suggestions : http://cyberciti.biz/fb/
# -------------------------------------------------------------------------
# This script is part of nixCraft shell script collection (NSSC)
# Visit http://bash.cyberciti.biz/ for more information.
# -------------------------------------------------------------------------
# Dirs to backup, Separate multiple directories using space
# for example /home /www /data2
BACKUP="/home"
# Remote ftp server
FTPH="ftp.backup.com"
# Remote ftp user name
FTPU="ftpusername"
# Remote ftp user password
FTPP="secret"
# Local gpg user_id
GPGU="nixcraft"
# Remote directory, blank for default remote dir
# If dir does not exist it will be created automatically by ncftpput :)
FTPD="backup/"
# Temporary directory to store tar.gz file and process it
TMPD="/tmp"
# Mail message
# Admin email me@mycorp.com or pager@yourmobile.com
MTO="support@mycorp.com"
# Mail subject
MSUB="Backup $(hostname) report"
# Admin info, URL email id; change it according to your need :)
ADMIN_INFO="For support visit http://cyberciti.biz/fb/ or write an email to
nobody@cyberciti.biz"
# Only change if your UNIX stores bin in diffrent location
NCFTP="/usr/bin/ncftpput"
TAR="/bin/tar" # must be gnu tar
MAILC="/usr/bin/mail"
GPG="/usr/bin/gpg"
#######################################################################
# Do not change anything below
#######################################################################
FILE="$(hostname).$(date +"%d-%m-%Y").tar.gz"
OUT="$TMPD/$FILE"
FOUT="$OUT.gpg"
MFILE="/tmp/ftpout.$$.txt"
MESS=""
if [ ! -x $TAR ]; then
echo "$TAR command not found, contact $ADMIN_INFO"
exit 1
fi
if [ ! -x $NCFTP ]; then
echo "$NCFTP command not found, contact $ADMIN_INFO"
exit 1
fi
if [ ! -x $GPG ] ; then
echo "$GPG command not found, contact $ADMIN_INFO"
exit 1
fi
$TAR -zcf $OUT $BACKUP
if [ $? -ne 0 ];
then
MESS="$TAR failed to create backup. Nothing uploaded to remote FTP $FTPH
server"
else
# Encrypt the .tar.gz file before upload
$GPG -e -r $GPGU -o $FOUT $OUT
$NCFTP -m -u "$FTPU" -p "$FTPP" "$FTPH" "$FTPD" "$FOUT"
OSTAT="$?"
case $OSTAT in
0) MESS="Success.";;
1) MESS="Could not connect to remote host $FTPH.";;
2) MESS="Could not connect to remote host $FTPH - timed out.";;
3) MESS="Transfer failed.";;
4) MESS="Transfer failed - timed out.";;
5) MESS="Directory change failed.";;
6) MESS="Directory change failed - timed out.";;
7) MESS="Malformed URL.";;
8) MESS="Usage error. May be your version of ncftpput ($NCFTP) is
old";;
9) MESS="Error in login configuration file.";;
10)MESS="Library initialization failed.";;
11) MESS="Session initialization failed.";;
*) MESS="Unknown error, contact admin $ADMIN_INFO";;
esac
fi
>$MFILE
echo "Backup status for $(hostname) as on $(date):" >>$MFILE
echo "" >>$MFILE
echo "Backup File : $FOUT" >>$MFILE
echo "Backup ftp server : $FTPH" >>$MFILE
echo "Backup status message : $MESS" >>$MFILE
echo "" >>$MFILE
echo "-- Automatically generated by $(basename $0)" >>$MFILE
# send an email to admin
$MAILC -s "$MSUB" $MTO <$MFILE
# remove the files
[ -f $MFILE ] && rm -f $MFILE || :
[ -f $FOUT ] && rm -f $FOUT || :
[ -f $OUT ] && rm -f $OUT || :