Thursday, 2 February 2012

How One Gmail account acts as millions of Gmail Accounts


How One Gmail account acts as millions of Gmail Accounts




Hello Guys,


I am not sure if a lot of you guys are already aware of this trick, but I felt to post it here as may be a lot of you are still not aware of it.


Here is the trick:
Lets say your gmail id is : YourGmailID@gmail.com
Now any mail sent to following will go in your inbox.


You.r.g.m.ailid@gmail.com (you can use as much DOTS as you wish to and at any location within this id before @ sign)
YourGmailID+321@gmail.com (any number can be used between + and @)


Means your one Gmail account acts as millions of gmail accounts.
People creating account on twitter, FB or any other forum can register using these ids and verification email will hit one gmail inbox.
by the way
you can also replace @gmail.com with @googlemail.com
and with this one the dots and the numbers will still work and all emails will hit to your real gmail account. 

Tuesday, 31 January 2012

Computer Examination Quiz[Simple Quiz For Practise]


PRACTICE QUESTIONS SET 1
1. One megabyte equals approximately
1) 1,000 bits
2) 1,000 bytes
3) 1 million bytes
4) 1 million bits
5) 2,000 bytes

2. Data going into the computer is called?
1) Output
2) Algorithm
3) Input
4) Calculations
5) Flowchart

3. Which of the following refers to the memory in your computer?
1) RAM
2) DSL
3) USB
4) LAN
5) CPU

4. When you are working on a document on PC, where is the
document temporarily stored?
1) RAM
2) ROM
3) The CPU
4) Flash memory
5) The CD-Rom

5. Information travels between components on the mother board
through-
1) Flash memory
2) CMOS
3)Bays
4) Buses
5) Peripherals

6. How are data organised in a spreadsheet?
1) Lines and spaces
2) Layers and planes
3) Height and width
4) Rows and columns
5) None of these

7. Which of the following is true?
1) Byte is a single digit in a binary number
2) Bit represents a grouping of digital numbers
3) Eight-digit binary number is called a byte
4) Eight-digit binary number is called a bit
5) None of these

8. Transformation of input into output is performed by?
1) Peripherals
2) Memory
3) Storage
4) The Input-Output unit
5) The CPU

9. How many options does a binary choice offer?
1) None
2) One
3) Two
4) It depends on the amount of memory in the computer
5) It depends on the speed of the computer's processor

10.   .....is collection of web pages and ......is the very first page that
we see on opening of a web-site

1) Home-page, Web-page
2) Web-site, Home-page
3) Web-page, Home-page
4) Web-page, Web-site
5) None of these

11. When the pointer is positioned on a _____ it is shaped like a
hand.
1) Grammar error
2) Hyperlink
3) Screen tip
4) Spelling error
5) Formatting error

12. The _____ of a system includes the programs or instructions.
1) Hardware
2) Icon
3) Information
4) Software
5) None of these

13. 'www' stands for _____
1) World Word Web
2) World Wide Web
3) World White Web
4) World Work Web
5) None of these

14. What menu is selected to cut, copy, and paste?
1) File
2) Tools
3) Special
4) Edit
5) None

15. You can use the tab key to
1) Move a cursor across the screen
2) Indent a paragraph
3) Move the cursor down the screen
4) Only (1) and (2)
5) None of these

16. The most important or powerful computer in a typical network is
_____
1) Desktop
2) Network client
3) Network server
4) Network station
5) None of these

17. Which of the following is an example of connectivity?
1) Internet
2) Floppy disk
3) Power cord
4) Data
5) None of these

18. The ability to find an individual item in a file immediately _____
is used.
1) File allocation table
2) Directory
3) Sequential access
4) Direct access
5) None of these

19. The primary purpose of software is to turn data into _____
1) Web sites
2) Information
3) Programs
4) Objects
5) None of these

20. To what temporary area can you store text and other data, and
later paste them to another location?
1) The clipboard
2) ROM
3) CD-ROM
4) The hard disk
5) None of these

21. Storage that retains its data after the power is tuned off is
referred to as
1) volatile storage
2) non-volatile storage
3) sequential storage
4) direct storage
5) None of these

22. _____is the science that attempts to produce machines that
display the same type of intelligence that humans do.
1) Nano science
2) Nanotechnology
3) Simulation
4) Artificial intelligence (AI)
5) None of these

23. Changing an existing document is called _____ the document.
5
1) Creating
2) Editing
3) Modifying
4) Adjusting
5) None of these

24. Computers use the _____ number system to store data and
perform calculations.
1) Decimal
2) Hexadecimal
3) Octal
4) Binary
5) None of these

25. Which of the following is the largest unit of storage?
1) GB
2) KB
3) MB
4) TB
5) None of these

26. The _____ key will launch the start buttons.
1) Esc
2) Shift
3) Windows
4) Shortcut
5) None of these

27. _____is the process of finding errors in software code.
1) Compiling
2) Testing
3) Running
4) Debugging
5) None of these

28. To move to the beginning of a line of text, press the _____ key.
1) Home
2) A
3) Page-up
4) Enter
5) None of these

29. Virtual memory is
1) Memory on the hard disk that the CPU uses as an extended RAM
2) RAM
3) Only necessary if you do not have any RAM in your computer
4) A back up device for floppy disks
5) None of these

30. A _____ contains specific rules and words that express the
logical steps of an algorithm.
1) Syntax
2) Programming structure
3) Programming language
4) Logic chart
5) None of these

31. When sending an e-mail, the _____ line describes the contents
of the message.
1) to
2) subject
3) contents
4) CC
5) None of these

32. The _____ tells the computer how to use its components.
1) Utility
2) Network
3) Operating system
4) Application program
5) None of these

33. Which grouping do you work with when formatting text in word?
1) Tables, paragraphs and indexes
2) Paragraphs, indexes and sections
3) Characters, sections and paragraphs
4) Indexes, characters and tables
5) None of these

34. What is backup?
1) Adding more components to your network
2) Protecting data by copying it from the original source to a
different destination
3) Filtering old data from the new data
4) Accessing data on tape
5) None of these

35. Network components are connected to the same cable in the
_____ topology.
1) Star
2) Ring
3) Bus
4) Mesh
5) Mixed

36. This component is required to process data into information and
consists of integrated circuits.
1) Hard disk
2) RAM
3) CPU
4) ROM
5) None of these

37. One advantage of dial-up-internet access is ___
1) It utilises broadband technology
2) It utilizes existing telephone service
3) It uses a router for security
4) Modem speeds are very fast
5) None of these

38. What is the term for unsolicited e-mail?
1) News group
2) Use net
3) Backbone
4) Flaming
5) Spam

39. Two or more computers connected to each other of sharing
information form a _____
1) Network
2) Router
3) Server
4) Tunnel
5) Pipeline

40. Computers that are portable and convenient for users who travel
are known as _____
1) Super computers
2) Lap tops
3) Mini computers
4) File servers
5) None of these

41. A computer checks the _____ of user names and passwords for
a match before granting access.
1) Website
2) Network
3) Backup file
4) Data base
5) None of these

42. Office LANs that are spread geographically apart on a large
scale can be connected using a corporate _____
1) CAN
2) LAN
3) DAN
4) WAN
5) TAN

43. The code for a Web page is written using _____
1) A fifth generation language
2) Win Zip
3) Peripherals
4) Hypertext Markup Language
5) URL

44. What is the process of copying software programs from
secondary storage media to the hard disk called?
1) Configuration
2) Download
3) Storage
4) Upload
5) Installation

45. Small application programs that run on a web page and may
ensure a form is completed properly or provide animation are known
as _____
1) Flash
2) Spiders
3) Cookies
4) Applets
5) Sparks

46. The first computers were programmed using _____
1) Assembly language
2) Machine language
3) Source code
4) Object code
5) Spaghetti code

47. Which process checks to ensure the components of the
computer and operating are connected properly?
1) Booting
2) Processing
3) Saving
4) Editing
5) None of these

48. In a relational database, this is a data structure that organizes
the information about a single topic into rows and columns.
1) Block
2) Record
3) Tuple
4) Table
5) Command line interface

49. How can the user determine what programs are available on a
computer?
1) Checking the hard disk properties
2) Viewing the installed programs during the booting process
3) Checking the operating system for a list of installed programs.
4) Checking the existing files saved on the disk
5) None of these

50. When we run a program in HTML coding _____ is used as
backend and ____ works as front-end.
1) Notepad - Internet-Explorer
2) Notepad - Msn-messenger
3) MS-Word - Internet Explorer
4) Both (1) and (2)
5) None of these

ANSWERS:
1)3  2)3  3)1  4)1  5)4  6)3  7)3  8)5  9)3  10)2  11)2  12)4  13)2  14)4  15)2
16)3  17)1  18)1  19)2  20)1  21)2  22)4  23)2  24)4  25)4  26)3  27)4  28)1
29)2  30)3  31)2  32)3  33)1  34)2  35)2  36)3  37)2  38)5  39)1  40)2  41)4
42)4  43)4  44)5  45)4  46)2  47)1  48)4  49)4  50)1

Monday, 30 January 2012

Basic Computer Hardware and Networking Course



Basic Computer Hardware and Networking Course


COURSE CONTENT


Day 1,2 

 1 .Computer Fundamentals
 2. Introduction to Computers
 3. Types of Computers
 4. Introduction to Input Output Devices
 5. Introduction to Storage Devices
 6. Principals of Data Communication


Day 3,4,5

 7. Hardware Configuration
 8. Introduction to basic components of a typical PC
 9. Assembling a PC
10.Installing Operating System
11.Basic Trouble shooting during the assembling
12.Basic troubleshooting of PC


Day 6,7,8,9,10,11,12,13

13. Networking Fundamentals & Network Configuration
14. Introduction to various types of cables and connectors used in networking
 15. Introduction to networking and networking concepts
16. The 7 Layer architecture
17. 7 Layer components
18. Repeaters, Hubs, Switches, Bridges, Routers
19. Hubs vs Switches
20. Installing the NIC Card, MAC Address
21. LAN Standards – Ethernet, Token Ring
22. Structured Cabling
23. LAN Practicals
24. IP Addressing and IP Classes
25. TCP/IP Concepts and configuration of IP Address
26. Joining computer to a AD Domain
27. Basic network troubleshooting


Day 14,15

28. Basics of network security



Sunday, 29 January 2012

WEBSITE STRUCTURE[What type of things we Need to Consider Before Making Website]


WEBSITE STRUCTURE

       Homepage


  • First page that you show to a visitor; it’s like a face of a person
  • Make sure it looks good, attractive and descriptive because it’s the first impression to the visitors
  • It’s like an introduction of your page (it should have introduction to every links in the website)
  • Includes graphic & animation (flash)
  • Has name, logo, description (about 1-2 paragraphs) , contact info., etc.
  • Search engine looks at text only (not graphic and animation) 
  • So try to put your information in text as much as possible
  • Try to make your page the top ten website in search engine

- Contact Information

“Contact Us”

  • Includes company owner’s contact information or map to the company
  • Very important since it helps visitors to get in touch with the company
  • It is a place for the clients to send their own information

- Privacy Policy 

  • It’s the term of agreement about the purpose of the visitors’ collected data
  • Make the visitors feel secure and sincere
  • Ensures the visitors that their data will not be misused
  • Cookies are collected when visitors launch the website
  • When visitors log in to the website, the information of their computers will be collected and save in cookies file
  • Visitors information can be sold to the spammer
  • Product Service and Information
  • Produces are needed to be categorized 
  • Each category includes descriptions and information that attract visitors
  • Includes types of product and every information that is important (or interesting)
  • Must have permission to use any work with license 
  • Copy right content – ask the permission from the owner of company first
  • In your website, photo/image should be taken by yourself
  • If you take it from somewhere else, you need to get proper permission from the owner of those photos 
  • When you sell products, some people might now know how to operate them
  • You should provide after-sell service like putting the “How to” operate the product in your website
  • Services are important to the customers 

- Biography 

  • Tells personal information or history of the company
  • Helps people to understand how long the company is in the business
  • Longer time means higher experiences so the company provides better quality service/product
  • Not all type of website needs biography 
  • Video Broadcasts 
  • Helps use to tell information/advertisement/tutorial/produce service (How-to)
  • Makes visitors interest in your products
  • Provides technical support 

- Site maps 

  • Contains all links to every pages 
  • It’s like a navigator; it shows a structure of your website
  • Makes it friendly to search engine 
  • Gives visual structure of website

    -Footer
  • It’s at the bottom of the page
          Company name/copyright info./navigation link/contact info./privacy policy
     Company information (about us)

  • Describes company details/mission statement/philosophy/ biography/member of team/what can others benefit from you
  • Tells what you are doing and what will the visitors get in your website
  • Customer Service 
  • Visitors get more information about a service
  • Way to serve customers better
  • It provides delivery, return products, problems solution, etc. 
  • You can include a conversation box
  • The easier to use, the more customers you have (the more service is given to customers, the more the customers get more interest in you)
  • It’s a quick interaction between customers and company 
  • Provides fast service but there must be privacy policy (make sure the customers’ information will not be shared to everyone)

- HTML 

  • Follows website standard so that it’ll look organized
  • If you don’t follow the standard, you will ruin the design & content will be lost 
  • WP3  (Web standard) 
  • Make sure you follow the structure correctly or else your browser cannot display your website
  • Also make sure that every browser shows up your information correctly

- Site Credit

  • Advertises the name of the person who create the website (or who make the template)
  • Gives users/visitors more benefit
  • Attracts people to come to your site

- Portfolio

  • Media files/videos/MP3
  • It is the best way to market service 
  • Shares news/industrial information
  • Tells what your company is doing

- FAQ (Frequency Asked Questions)

  • Helps visitors for easier way to get information
  • Shows contact information and provides customer service
  • Questions & answers 
  • Helps customers solve problem about the products 

- Site search

  • Eg. www.google.com
  • Not require but can make visitors stay in your site longer
  • Visitors can search for your entire website (using key words that they type)
-   Terms of Service 

  • States how site provides service
  • Includes concept/rights/usage registration/security/etc. 
  • Tells conditions under which service is giving. 



Content pages (in folder)

  • Must have ‘footnote’ which includes… 
  • Title of the page (that will appear on the title bar)
  • Keyword (to help in search engine)
  • Description




Different Types oF Web Server Error Message[staus code]


Status Codes

Each HTTP response message must contain a status code in its first line, indicating the result of the request. The status codes fall into five groups, according to the code’s first digit:

  •  1xx — Informational.
  • 2xx — The request was successful.
  • 3xx — The client is redirected to a different resource.
  • 4xx — The request contains an error of some kind.
  • 5xx — The server encountered an error fulfilling the request.

There are numerous specific status codes, many of which are used only in
specialized circumstances. Here are the status codes you are most likely to
encounter during in some cases.


 100 Continue is sent in some circumstances when a client submits a
request containing a body. The response indicates that the request headers
were received and that the client should continue sending the body. The
server returns a second response when the request has been completed.

200  OK indicates that the request was successful and that the response
body contains the result of the request.

201 Created is returned in response to a PUT request to indicate that the
request was successful.

301 Moved Permanently redirects the browser permanently to a different
URL, which is specifi ed in the Location header. The client should use the
new URL in the future rather than the original.

302 Found redirects the browser temporarily to a different URL, which is
specified in the Location header. The client should revert to the original
URL in subsequent requests.

304 Not Modified instructs the browser to use its cached copy of the
requested resource. The server uses the If-Modified-Since and If-None-
Match request headers to determine whether the client has the latest version
of the resource.

400 Bad Request indicates that the client submitted an invalid HTTP request.
You will probably encounter this when you have modifi ed a request in
certain invalid ways, such as by placing a space character into the URL.


401 Unauthorized indicates that the server requires HTTP authentication
before the request will be granted. The WWW-Authenticate header contains
details on the type(s) of authentication supported.

403 Forbidden indicates that no one is allowed to access the requested
resource, regardless of authentication.
n 404 Not Found indicates that the requested resource does not exist.

405 Method Not Allowed indicates that the method used in the request is

not supported for the specifi ed URL. For example, you may receive this
status code if you attempt to use the PUT method where it is not supported.

413 Request Entity Too Large — If you are probing for buffer overfl ow

vulnerabilities in native code, and therefore are submitting long strings
of data, this indicates that the body of your request is too large for the
server to handle.

414 Request URI Too Long is similar to the 413 response. It indicates that

the URL used in the request is too large for the server to handle.

500 Internal Server Error indicates that the server encountered an

error fulfi lling the request. This normally occurs when you have submitted
unexpected input that caused an unhandled error somewhere within
the application’s processing. You should closely review the full contents
of the server’s response for any details indicating the nature of the error.

503 Service Unavailable normally indicates that, although the web

server itself is functioning and can respond to requests, the application
accessed via the server is not responding. You should verify whether this
is the result of any action you have performed.

Hope you like this post 

Certified Ethical Hacker Quiz 22


Question: 22

Which of the following Nmap commands would be used to perform a UDP scan of the lower 1024
ports?
A. Nmap -h -U
B. Nmap -hU <host(s.>
C. Nmap -sU -p 1-1024 <host(s.>
D. Nmap -u -v -w2 <host> 1-1024
E. Nmap -sS -O target/1024

Answer: C
Explanation:
Nmap -sU -p 1-1024 <host(s.> is the proper syntax. Learning Nmap and its switches are critical
for successful completion of the CEH exam.

Certified Ethical Hacker Quiz 21.


Question: 21

What is the tool Firewalk used for?
A. To exam the IDS for proper operation
B. To exam a firewall for proper operation
C. To determine what rules are in place for a firewall
D. To exam the webserver configuration
E. Firewalk is a firewall auto configuration tool

Answer: C

Explanation:
Firewalk is an active reconnaissance network security tool that attempts to determine what layer
4 protocols a given IP forwarding device "firewall" will pass. Firewalk works by sending out TCP
or UDP packets with a TTL one greater than the targeted gateway. If the gateway allows the
traffic, it will forward the packets to the next hop where they will expire and elicit an
ICMP_TIME_EXCEEDED message. If the gateway host does not allow the traffic, it will likely
drop the packets and no response will be returned.