April 21, 2010

connected to technoratti


April 18, 2010

Advantages of the .NET Framework

Hello Friends today we are going to recall some of the great advantages of .Net Framework.
As we Know that .Net Framework acts as a base to all class libraries.
It is build specially to provide highly Integrated but still a very flexible platform so that developers can built business and enterprise solutions for available architecture and applications
By adopting the .NET Framework’s distributed and wide application model,
developers can have many advantages to build their solutions and applications.

The .NET Framework provides developers with:

◆ A rich programming framework for building Win32 client applications.
    (all the nice goodies of class libraries are included)

◆ A unified Web development platform that provides the services necessary
    for developers to build enterprise-class Web applications.

◆ A URL-addressable resource and solutions that programmatically(AsCoded) 
      returns information to clients who have requested it.

◆ The ability to build components that efficiently manage data from multiple 
     data sources  and that support disconnected scenarios.

◆ A standards-based support for processing XML

◆ The ability to interact with COM components,.NET Framework ser-

vices,external type libraries,and many operating system services

◆ The ability to control access to operations and resources based on policy

and a set of configurable rules to determine which permissions to grant

to code,based on the code’s domain,user,and assembly

◆ The ability to pass objects by value or by reference between distributed


◆ A programming interface to many of the protocols found on the net-

work,such as HTTP,DNS,TCP,and UDP

◆ The ability to use the COM+ Services including transactions,object

pooling,and queued components

◆ Access to the Active Directory from managed code

◆ Lower total cost of ownership by enabling powerful enterprise-class

management of systems,applications,and devices

◆ Support for globalization and localization of resources...

thats it

April 12, 2010

Understanding Basic Hacking techniques

Basic Methods of Hacking

1. Email or the user information
2. Web based hacking.

Email or user information:

These days the most commonly used and famous way of hacking user information like Emails, Passwords, Credit card details are as follow:

a. Phishing
b. Brute Forcing
c. Keylogging
d. Trojans


Phishing is basically a massive attack. What a hacker does is, they created an absolutely look alike page or we can call it Ditto copy  of some website like yahoo or gmail. They upload it to their own server. And give the link to any newbie user.

 When they open it, they think that they are on the yahoo or gmail page, they put in their username and password, click on submit and yes you might have guessed it right! your information has been submitted. This is widely used by new people trying to entering into hacking world.

Disadvantages: Still many people give it a try before going for phishing, because the only problem in phishing is, even if the victim knows a little about internet, he will read the URL and understand that it is not a genuine website and careful looking into really helps. You can avoid phishing by taking this precautions.

B.Brute Forcing

Brute forcer is basically a program which could be called as a "cracker". In brute focer you put the username you want to hack, and as a password you put a notepad file which has almost all of the existing english words in it. 
So what it does is, it will try each and every word from that file and see if anything matches. You might have noticed some topics like "huge pass list" on different forums, they are nothing but the password list to put into your bruteforcer.!

1. Sometimes brute forcing may just go for ages!
2. It isn't guaranteed
3. These days many people have alpha-numeric-symbol password which is real tough for brutefocer to detect
4. Most of the famous sites like yahoo, gmail are designed in such a way that it will put the "image captcha" after 3 incorrect login attempts, which stops the bruteforcer.


Keylogger helps you to create a little filed which is known as "server". You gotta send your server to the victim. he has to click on it and then YOUR DONE! this is what happens.
Best possible way to hack someone. Keyloggers are basically a program which will install themselves in your victim's computer and will keep on recording each and every keystroke pressed by the victim on his keyboard and it will send it to the hacker. There are many ways to receive the keystroke i.e. FTP, Email, Messengers. According to me this is the best way to trick your victim and get their information  

Disadvantages :
1. When victim receives the keylogger, in most of the cases, their anti virus would auto delete them. So you have to convince them to disable the anti virus by bluffing something.
2. Sometimes firewall blocks the keylogs from being sent.

Tips:1. There are some programs which are known as "crypters" which will help you to make your server's undetectable. So your victim's anti-virus would not be able to detect them.


Trojans are like father of keyloggers. Trojan sends you the keylogs just as keyloggers, on top of that, it lets you take the control of victim's computer. Edit / delete/ upload / download files
from or to their computer. Some more funny features like it will make their keyboard go mad, it may kep on ejecting and re-inserting the cd ROM. Much more..

Disadvantages :
Same as keyloggers.

Tips :
Same as keylogger.
Web Hacking:

Now we are going to discuss some Commonly used web Hacking techniques which hackers basically use to hack websites.
This U can use to SAVE YOUR WEBSITE

1.SQL Injection

Most of the websites these days are connected to an SQL Database. Which helps them to store usernames and passwords [encrypted] when a guest registers to their website. SQL database processes a querie everytime a user logs in. It goes to the database, validates the password, if its correct then it logs in the user and if its not then it gives an error.
So the basic funda is executing a command to parase a query in the database to try to exploit the internet information of the database. I cant really put the entire tutorial about because this is the most complicated way to hack the website! 


XSS is another nice way to ahck some website. Suppose if some website/ forum is allowing HTML in the psot or articles, then a hacker can post a malicious script into the content. So whenever a user opens up the page, the cookies would be sent to the hacker. So he can login as that user and take over the website up. 


Shell is a malicious .php script. What you have to do is, find a palce in any website where you can upload any file like avatars, recepie, your tricks, your feedbacks. And you try to upload your shell files from there. And if its uploaded then WHOA!you open it from the URL bar and u can see the entire "FTP" account of that webhosting. You can rename/edit / upload/download anything u want including the index page.
This is also known as deface.

4. RFI:
RFI is a good way to deface a website. It is used with shell. Suppose you have uploaded your shell on:

Play safe and try to avoid this things.
Have a safe surfing and web digging........

April 11, 2010

How to add CheckBox in DataGrid in Win Application

Create the Data Grid at runtime

it will ease ur problems

First add a datagridview control 2 ur form


Code 4 implement columns

public void creategrid() //call it on on load even of form or button click(or any event)


DataGridViewTextBoxColumn tbc0=new DataGridViewTextBoxColumn ;

tbc0.name="EmpName" ;

tbc0.HeaderText="Emp Name" ;

tbc0.width=150 ;


DataGridViewCheckBoxColumn tbc1=new DataGridViewCheckBoxColumn ;

tbc1.name="EmpStatus" ;

tbc1.HeaderText="Emp Status" ;

tbc1.width=50 ;


DataGridViewComboBoxColumn tbc2=new DataGridViewComboBoxColumn ;

tbc2.name="EmpDesignat" ;

tbc2.HeaderText="Emp Designation ;

tbc2.width=50 ;


This is just one way of doing it at runtime.
Happy coding....

April 8, 2010

Ethical Hacking

Nows lets see what is hacking about??

Lets see some basic concepts.

  1. Hacker : any programming specialist who has expertise to enter computer network unauthorized or in case of ethical Hacker he can be an authorized person (yes of-course he'll not tell you).
  2. Cracker:is someone who breaks computer security without authorization in simple words some one who destructs things.
  3. Hacking :act of illegally entering a computer system, and making unauthorized changes to the files and data contain within and using Data for illegal use(Bad thing).
What is Ethical Hacking?

  • Ethical hacking – defined “methodology adopted by ethical hackers to discover the vulnerabilities existing in information systems’ operating environments.”

  • With the growth of the Internet, computer security has become a major concern for businesses and governments. 

  • In their search for a way to approach the problem, organizations came to realize that one of the best ways to evaluate the intruder threat to their interests would be to have independent computer security professionals attempt to break into their computer systems. 
Ethical Hackers

  • Independent computer security Professionals breaking into the computer systems. 
  • Neither damage the target systems nor steal information.  
  • Evaluate target systems security and report back to owners about the vulnerabilities found. 
  • Strong programming and computer networking skills.
  • They learn about the system and try to find its weaknesses which are exploited by criminals(Hackers).
  • They also learn about techniques of Criminal hackers- So that they can figure out how Bad guys work and think.
  • some of them publish research papers.

April 1, 2010

Sankets TECH space: 2009 Annual Developer Quiz

2009 Annual Developer Quiz

2009 Annual JAVA Developer Quiz.

If you think that you have got what it takes to be a Java Developer.
Then this Quiz is a must Take for you.
Try your hand and Brains now.

Click here.

Test your knowledge of Java developments in 2009.