How to Bypass Key Loggers?

Are you doubtful about your PC being infected with some kind of key-logger? Do you think that your boss is spying on our social accounts? Fear not! There is a simple yet effective way to beat key loggers. The catch is that most key-loggers record what is being typed through the keyboard. Not mouse clicks. So we are going to exploit that.

Just follow these steps right away.

1. Go to the Login/Sign-in page.

2. Tap [The_start_button] and R together on your keyboard.
A dialogue box will open up.

3. Type in “osk” and press ENTER.

4. The virtual keyboard will open up.

5. Type in your required username and password.

That’s it.

(NOTE: The mentioned process works only for Windows platform)

Encryption software: The Art of encrypting.

Welcome again! Returning visitors and coders, today I’m going to show you an interesting topic that is, how to prepare an encryption software using C# 4.0 and Windows Forms.

Prerequisites :

1. Microsoft Visual Studio. (Mine is Professional Edition.)

2. A little knowledge in C# and .NET; else go through my topic ‘Class on Classes and Objects’.

First of all, let us understand the need for an encryption software. Just think of you sending a message of extreme confidentiality, someone else fetches it and goes through it. A breach in the security! We can’t allow that to happen. So, virtually every data send over a network is encrypted now-a-days.

Take an example, what i have written so far is normal human readable, meaningful sentences, conveying some meaning. Let’s look at this now:

Vdmbnld!`f`ho !Sdutsohof!whrhunsr!`oe!bnedsr-!une`x!H&l!fnhof!un!rinv!xnt!`o!houdsdruhof!unqhb!ui`u!hr-!inv!un!qsdq`sd!`o!dobsxquhno!rnguv`sd!trhof!B”!5/1!`oe!Vhoenvr!Gnslr/ Qsdsdpthrhudr!; 0/!Lhbsnrngu!Whrt`m!Rutehn/!)

Lhod!hr!Qsngdrrhno`m!Dehuhno/( 3/!@!mhuumd!jonvmdefd!ho!B”!`oe!/ODU:!dmrd!fn!uisntfi!lx!unqhb!&Bm`rr!no!Bm`rrdr!`oe!Nckdbur&/ Ghsru!ng!`

mm!mdu!tr!toedsru`oe!uid!odde!gns!`o!dobsxquhno!rnguv`sd/!Ktru!uihoj!ng!xnt!rdoehof!`!ldrr`fd!ng!dyusdld!bnoghedouh`mhux-!rnldnod!dmrd!gdubidr!hu!`oe!fndr!uisntfi!hu/!@!csd`bi!ho!uid!rdbtshux !Vd!b`o&u!`mmnv!ui`u!un!i`qqdo/!Rn-!whsut`mmx!dwdsx!e`u`!rdoe!nwds!`!oduvnsj!hr!dobsxqude!onv,`,e`xr/!

This is absolute fuzzy mess! That’s ‘encryption’ according to my software. Now feed this data back in the software you get usual form the plain English language.

screenshot of the software

This is how it works.

For all who want to download my software   click here . Click on setup–>Install–>Run.

For interested coders:

The code:

using System;
using System.Collections.Generic;
using System.ComponentModel;
using System.Data;
using System.Drawing;
using System.Linq;
using System.Text;
using System.Windows.Forms;

namespace encoder
{
    public partial class Form1 : Form
    {
        string str1,str2;
        char[] input;//new char[100];
        public Form1()
        {
            InitializeComponent();
        }

        private void textBox1_TextChanged(object sender, EventArgs e)
        {
            str1 = textBox1.Text;
        }

        private void button1_Click(object sender, EventArgs e)
        {

            input = str1.ToCharArray(); /*converts string to character array*/
            if (input.Length < 100)
            {
                progressBar1.Value = (progressBar1.Maximum / 100) * input.Length;
            }
            else
            {
                progressBar1.Value = progressBar1.Maximum;
            }
            for (int i = 0; i < input.Length; i++)
            {
                //progressBar1.Value = (progressBar1.Maximum / input.Length-1) * i;
                if (input[i] % 2 == 0)
                {
                    input[i] += Convert.ToChar(1);
                }
                else
                {
                    input[i] -= Convert.ToChar(1);
                }
            }
            str2 = new string(input);
            textBox2.Text = Convert.ToString(str2);

        }

        private void textBox2_TextChanged(object sender, EventArgs e)
        {
            textBox3.Visible = true;
            textBox3.Text = "Do you want to decipher the code?";
            button3.Visible = true;
            button4.Visible = true;
        }

        private void button3_Click(object sender, EventArgs e)
        {
            button2.Visible = true;
            textBox1.Text = textBox2.Text;
            textBox2.Text = "";
            button1.Visible = false;
        }

        private void button2_Click(object sender, EventArgs e)
        {
            input = str1.ToCharArray(); /*converts string to character array*/
            if (input.Length < 100)
            {
                progressBar1.Value = (progressBar1.Maximum / 100) * input.Length;
            }
            else {
                progressBar1.Value = progressBar1.Maximum;
            }
            for (int i = 0; i < input.Length; i++)
            {
                //progressBar1.Value = (progressBar1.Maximum / input.Length-1) * i;
                if (input[i] % 2 == 0)
                {
                    input[i] += Convert.ToChar(1);
                }
                else
                {
                    input[i] -= Convert.ToChar(1);
                }
            }
            str2 = new string(input);
            textBox2.Text = Convert.ToString(str2);
            textBox3.Visible = false;
            button3.Visible = false;
            button4.Visible = false;
            textBox1.Text = "";
        }

       /*private void progressBar1_Click(object sender, EventArgs e)
        {

        }*/

    }
}

That's it..Happy coding!

Keeping Your Online Identity Safe

The average John Doe has multiple profiles on the various social networks that have cropped up today.Be it Facebook,LinkedIn,Google+.We sure like to keep ourselves up to date,checking our profile frequently.But in the digital world,popularity attracts both the good guys and the bad guys.The bad guys are the ones who try to hijack your accounts using various techniques.Keeping your account safe means following some simple yet strong rules that can prevent your account from getting hijacked by them.

Keep Strong Passwords:
Its simple to create strong passwords.I am highlighting a few methods you can use to create them

  1. Inserting numbers between the letters of your name.                            Example:J1o2h3n4D5o6e
  2. Using Special-Characters like %,$&* to increase its strength.Example:J#o!h&n$@d3o7e5
  3. Using patterns in keyboard like 1q2w3e4r5t6y…

Also there are free software’s available like  Keepussafe and Passwordsafe.They can actually serve two functions.Firstly they can act as a password manager,i.e they store your password securely in your desktop or in any online cloud-based service..Secondly,they can generate strong passwords,which might be hard to crack using any brute force techniques. Although the generated passwords are quite complex,they are quite easy to store using  the software’s
built in mechanism.

Don’t disclose your email in public

It might seem strange but limiting the number of people with whom you share your email is one step towards a more secure online presence.Share them only with your friends and immediate colleagues.Secondly,keeping a ‘hard to guess’ email also helps.
An example:

Supposing,you were born on 1991,you might keep your email as

  • johndoe91@youremail.com
  • john.doe.91@youremail.com
  • doe.john.91@@youremail.com

But these are easily guessable.So keeping a bit stronger email helps.

Try to keep two-layered authentication using a mobile.It discourages account hijackers.

Finally,try to keep a security question that’s hard to guess.It can be  something very  personal which you haven’t shared with anyone except very close-ones.Also try to change them frequently.

Keep multiple account’s linked together

Keeping multiple email-accounts as recovery options for your social profile will make it easier to retrieve your hijacked profile.The flow-chart gives a rough idea how it can be done.

A secure account flowchart
(Click to Enlarge)

Never use the same passwords for any two accounts

It would be a real disaster if someone comes to know your password and gain access to all your accounts.Using the password mangers mentioned above,you can easily generate and store strong passwords.

A Shopping Cart Program in C#, Windows Forms

Well, welcome once again. This is another nice program, a project on how to make a shopping cart in C# using Windows Forms. Sounds interesting?

Well, yes, You get to learn about many other things such as event handling, toolbox use and all under the visual studio 2010 professional edition.

The objectives of the program:

1. To create customer and agent name and location of delivery.

2. Choice of articles/items.

3. Submit Button and billing.

4. Debugging.

Here, debugging is very important as the program is highly susceptible to small errors.

Here’s my video to help you how to do it :

part 1:

part 2:

part 3:

Class on Classes and Objects

In every OOP(Object oriented programming), one thing that is a must, that is, the OBJECT modeling. What is an object? Well in a layman’s language, any tangible item is an object. Quite true! In programming, what do we do? We take up a problem and sort out an appropriate algorithm to reach to our objective. Let’s take an everyday example of the busy world. You need to get to the office,meet Eva at lunch, after office you need to buy some household chores. So, you plan your day on a sticky note as follows:
i. Get ready for office.
ii. Meet Eva at lunch.
iii. Buy orange juice, lemon grass, eggplants and sunscreen.
Now, this is the algorithm. You will not definitely go to lunch first or to the store first, so in short, there is sequential flow. Now, in order to reach the office, meet Eva at lunch, and buying all items in the store, take a moment, mark these things: OFFICE,BUS(to office),EVA,RESTAURANT(for lunch),STORE,ORANGE JUICE,LEMON GRASS, etc. are all tangible items and are treated as objects in the world of programming.
Well, now lets get a deeper look at objects, in order to do so, we have to know about classes. What’s a class? Well, class is a definite space that holds all the methods(functions) and properties for a particular part or task to be completed by it. Lets take an example of a class:

using System;
using System.Collections.Generic;
using System.Linq;
using System.Text;

namespace tut1
{
class office
{
int desks,count=0,deskadded;
int[] appointments=new int[10];
int meetings;
public office(int y) /*Constructor*/
{
desks = y;
}
public void desk_check() /*method to count desks after addition*/
{
Console.WriteLine("HOW MANY DESKS TO BE ADDED?");
deskadded = Convert.ToInt32(Console.ReadLine());
count=desks+deskadded;
Console.WriteLine("{0} no of desks",count);
             }
public void appo() /*method for appointments*/
{
            Console.WriteLine("enter appointments:");
for (int i = 0; i < appointments.Length; i++) {
appointments[i] = Convert.ToInt32(Console.ReadLine());
}
            Console.WriteLine("APPOINTMENTS SERIALS ARE:");
foreach (int x in appointments) {
Console.WriteLine("{0}",x);
}
}
}
class Program
{
static void Main(string[] args)
{
office office_1 = new office(10); /*new object created as office_1*/
office_1.desk_check(); /*desk_check method is called*/
office_1.appo(); /*appo method is called*/
}
}
}

Go through this example properly and then try to understand what’s the utility of an object. Well, in a multi-paradigm program needs to access a lot of codes where code redundancy as well as complexness increases. This was substantially reduced with the advent of OOP model.
Now, we shall look at an object as an instance of a class.
office_1=new office(10);
Here we create a new example of the class office as office_1 with a constructor office(10). This is how we relate the object with class. Now statements: office_1.desk_check(); and office_1.appo(); calls methods from the class office used for counting desks and appointments list respectively. The format being:
OBJECT.METHOD(parameters);
Well, this is enough about basics about classes and objects using C#. Here’s the output:

Output of the above code.

How to Salvage your old Laptop?

 
Technology improves everyday, or rather I must say every second, thus leaving your gadgets back dated. Well now if you have a desktop then you can fit in it new hardware available from the stores, but what would you do if all u got is a laptop and it’s technology got out dated and you are much against the idea of dumping it fully?
Remember old laptops really serve as good Linux terminals, so you can install Linux (like Ubuntu or Fedora, whatever suits you best ) in it and still continue using it. But what if the laptop isn’t working anymore or one of its internal parts has got damaged?
Relax my friend, you can still salvage the rest parts from your one time sweetheart and use them as USB devices with any computer or do else things with them. Now, technically speaking you can actually strip out every part from it except the motherboard and the processor. Now let me give you a brief idea about this stuff.
1. Battery – The laptop battery is a 10.8 V, 4.1 Ah battery that contains numerous cells in it. You can rip out those cells and sell them at eBay or you can, in the more preferable way, use it as an external power source when needed, maybe to charge AAAs. You will have to make an arrangement so that you can keep recharging your battery and use it to charge other batteries. Continue using your old laptop charger or any other charger whose output is around 20 V 3.2 A.
2. Hard Disk Drive – Open the back cover of your laptop and delicately take out the internal HDD, and then just buy a new Hard drive case for your internal HDD and use it as a portable USB HDD to carry data anywhere. Have a look at the different options available at Amazon .
external-laptop-harddrive-4
3. RAM – Take out the RAM from those sockets out there inside the laptop and you can plug them inside any other laptop that supports them, like check whether they are DDR2 or DDR3 and then check the specifications of the other laptop which you are plugging them into. Thus, u can make that other laptop run much faster than it used to.
4. CPU Fan – Every laptop has one CPU fan for the cooling process to go on. Now carefully remove the fan detaching it from the motherboard delicately and use it to build a simple homemade cooling pad for your new laptop. Make a structure (out of wood or plastic) like a small table with 4 short legs, and then make a hole (same as the size of the CPU fan) and fit in the CPU fan by some arrangement and connect the 2 wires of the fan to a USB Cable by just matching the colors, and now you are just ready with your cooling pad. You will really need one if you are a moderate gamer even.
A20_fan
5. CD/DVD Drive – You can use your optical drive as a USB optical drive in case your desktop doesn’t has one. Just take out the optical drive delicately detaching it from the motherboard and then join it’s wires with a USB cable’s ones just by matching their colors, and then you are good to go. Make a case for your new home grown USB CD/DVD Drive if you are concerned about it.
6. LCD/LED Monitor – Open the lid part of your laptop and remove the monitor keeping the wires attached in mind because it you break the socket where the wires are plugged in then your monitor is of no use, so be careful about the wires. You can attach the monitor to any other laptop whose monitor got damaged by just matching the voltage and ampere requirements. And yes, not to mention, but do match the resolutions too.
dis_lcd_06_open520
7. Speakers – Rip out the speakers and then well just connect them with other systems by just the old way that you have known (matching the positive and negative ) .
8. Webcam – The webcam is attached to the motherboard by 4 wires. So just simply detach it and connect it with the wires of a USB Cable by matching the colors, and you have made your own USB webcam that works with any computer you want. It’s upto you to use it as a spycam (because it’s small ) or as a webcam for Skype video chats by attaching with a clip or pasting it on your monitor.
webcam
  Do you want to know how to open up your laptop fully???
  Better stay tuned with us. Have a nice time !!!

A simple media player program in C# .NET 4.0

This is a program sample that you should go through at the intermediate level of your knowledge about the .Net platform by Microsoft. The entire program is written in C#, you may also use VB.NET if you are familiar with it. The logic behind the program is same, just coding syntax will vary. Well, all the best! let’s start with a quick glance at our objective :

i. We shall construct a media player.
ii. It shall be capable of playing media files of any kind, say a music file of .mp3 or .ogg format, a picture of .jpg or .png format as well as a video file of .wmv or .avi format.
iii. We shall be able to add files, play them, pause them and stop them.
For, our purpose we will use WPF(Windows Presentation Foundation) standard form in Visual Studio 2010 edition.

STEPS:

1. Create New Project.
2. Choose WPF, give a project name and add it. A workspace is created with a default Form loaded with the XAML code engraved in it.
3. Open toolbox and choose rather drag and drop a media element on the workspace.
4. Add 4 buttons name them as ‘PLAY’,’PAUSE’,STOP’,’ADD MEDIA’ respectively and a textbox to display the filename being played. A screenshot is given below:

Screenshot of basic layout of WPF form.

5. Double-click on ‘ADD MEDIA’ button and it shall take you to the MainWindow.xaml.cs file where we write our code. Now, a default method is called as we are double clicking the ‘button4’(just an index), that is, button4_click. Now I shall write the entire code.

using System; 
using System.Collections.Generic;

using System.Linq;
using System.Text;
using System.Windows.Forms;
using System.Windows;
using System.Windows.Controls;
using System.Windows.Data;
using System.Windows.Documents;
using System.Windows.Input;
using System.Windows.Media;
using System.Windows.Media.Imaging;
using System.Windows.Navigation;
using System.Windows.Shapes;

namespace mediaplayer
{
    /// <summary>
    /// Interaction logic for MainWindow.xaml
    /// </summary>
    public partial class MainWindow : Window
    {
        public MainWindow()
        {
            InitializeComponent();
        }

        
        private void button4_Click(object sender, RoutedEventArgs e)
        {
            OpenFileDialog ofd = new OpenFileDialog();
            ofd.AddExtension = true;
            ofd.DefaultExt = "*.*";
            ofd.Filter = "Media(*.*)|*.*";
            ofd.ShowDialog();
            mediaElement1.MediaOpened += new RoutedEventHandler(mediaElement1_MediaOpened);
            mediaElement1.Source = new Uri(ofd.FileName);
        }
        
        private void button1_Click(object sender, RoutedEventArgs e)
        {
            
            mediaElement1.Play();
        }
        
        private void button3_Click(object sender, RoutedEventArgs e)
        {
            mediaElement1.Stop();
        }

        private void button2_Click(object sender, RoutedEventArgs e)
        {
            mediaElement1.Pause();
            
        }

        void mediaElement1_MediaOpened(object sender, RoutedEventArgs e)
        {
            label1.Content = mediaElement1.Source.ToString();
        }
    }
}
 
6. Press CTRL+F5 for the code to run. And there you go! Click on ‘Add Media’ button and choose media and watch it play!

Enjoy! Have Fun!

This link might be useful for you: http://www.youtube.com/watch?v=f_bBWHCoKpk

How to get a Copyright for your Blog?

In order to prevent other people from blindly copying your online content, you might want to choose a copyright-licence your blog. This article describes you where to get as licence and which kind you want to choose.

  • Firstly, head on to www.creativecommons.org. It’s a non-profit organisation which helps people share content in a legal way.
  • Secondly, Click on the “choose a license” Button. Another webpage will open up. Now fill in the required fields. The circular button with the question mark sign will help you in doing so.

  • After you are done, click on The “Select a license button”.

You can optionally choose to paste the licence in your website, to discourage content thieves.

How To Prevent Internet Speeds From Falling off?

We often like to leave our computer idle, turn off the monitor and do some other kind of work, after queuing one or many downloads in it. But when we switch on the monitor, what we see is the least expected. The Download is about twenty-five per cent complete and the current download speed is zero.

What has actually happened?

While you were off attending your work, the download speed fell down and eventually became zero bringing the entire process to a halt. This is because whenever we surf the net, we send out periodical requests for web pages, which helps to keep the connection alive. However if we leave it out idle, the connection eventually becomes kaput.

It can be summed up in this way:
Consider Requesting for an webpage as pressing down the accelerator of a car. The more number of times you press the accelerator, the greater distance the car will go. It’s the same thing.

What’s the solution to it?

Use a pinging utility. A pinging utility send out 32bytes of data to a particular website constantly (which is a kind of request). It records the number of packets sent versus number of packets received. The net effect is that the internet connection never dies out. You can download it from here.

What does a DNS server actually do?

So what is a DNS server?

Well, DNS is expanded to Domain Name System. It’s a protocol or, a set of rules to keep the address of various websites in one place. Allow me to explain further. When we enter the name of a website, i.e. Perform a page request look up, we actually enter something like http://www.google.comor http://www.Facebook.com in the URL. However Machines being the way they are cannot handle names, rather they work in numbers. So each and every website has an Internet Protocol or I.P address assigned to it. An IP address is a   number separated by four periods. For example 192.168.0.5 . In order to co-relate between names of various websites and their IP address, a common medium is required which will play the part of a translator, much like a middle man who helps in a conversation between people speaking two different languages. So, A DNS server is the solution, which keeps track of various names of various websites and their corresponding IP address.

So how does it actually work?

When we request a webpage like http://www.google.com, a query is forwarded to our Internet Service Provider, where server performs a DNS Lookup. What it actually does is that it tries to find if the server contains the requested query and if it does, it tries to match it with it corresponding IP address. If it finds a positive match, it returns back the IP address. This process is called Resolving.
Now what if the DNS server of our ISP does not contain the IP address of the website we are looking for?
If this be the case, the query is forwarded to another DNS server, belonging to another ISP. If the problem still persists, the query is again forwarded to another DNS server until the IP address of the requested webpage is found. There are a multiple DNS server in existence which might contain the same data, hence If a DNS server is down, another server makes sure that the IP address of the requested webpage is always resolved.
So, whenever we enter the address of a webpage, it’s a two-step process.

  •  The address is fed into a DNS server, which returns a number i.e. the I.P address of the computer.
  •  The IP address is fed into the browser which downloads the requested page.
Does it mean we can omit the first step?
Sure we can, it makes the work easier on the part of the computer. However this is practically not realised because of the following reasons.
·         A computer is fast. It takes about a microsecond to perform a DNS look up. So it doesn’t really save our time.
·         We visit about hundreds of webpages every month. It would be foolish and impossible to remember an exhaustible list of websites and their corresponding IP address.

So how can we manually enter the IP address of a website?

Well its quite simple. Follow the instructions given below:
1.       Hold down the start button of your keyboard simultaneously with R.
The run window opens up.
2.       Type in “cmd” (without quotes) and press enter.
A command shell prompt will open up.
3.       Now in the command shell type:
ping [name_of_the_webpage]
4.       A statement will appear like the following:
Pinging [a_number] with 32 bytes of data.
5.       The IP address of the requested web page is the number received in place of [a_number].
Example:
Pinging http://www.i.google.com[74.125.236.146] with 32 bytes of data
Hence the required IP address is 74.125.236.146
If we enter this number in the URL feed, the localised homepage of Google will open up.
During a DNS look up, the DNS server of our ISP is selected by default. If it fails to resolve a website, we can always use a public DNS server.
So, how do we choose a public DNS server?
There are many public DNS servers available. We will choose Google’s public DNS server.
The addresses of Google’s public DNS servers are 8.8.8.8 and 8.8.4.4
Follow the steps given below to change your default DNS server into Google’s public DNS server:
(You must keep the internet connection active)
·         Go to Control-panel and choose Network and Internet.
·         From the new window that appears, select Network and Sharing Center.
·         Under control panel home, click on change adapter settings.
·         On, the next window that appears, Right-Click on the active connection(It is marked by the green circle with a tick mark inside it),and choose properties.
·         A dialogue box opens up. Under the Networking sub tab, double click on the Internet Protocol Version 4(TCP/IPv4) button.
·         Now, Click on the Use the following DNS server address radio button
and put the following data as shown below:
Preferred DNS server     8.8.8.8
Alternate DNS server     8.8.4.4
Then click on OK.
·         Restart the connection.