11 Jun 2011

BLUEJACKING?

Bluejacking is not mobile hacking or
hijacking its totaly different.
Bluejacking is a harmless prank
played on people who have
switched Bluetooth on their phones.
blue is taken from Bluetooth, the
technology bluejacking uses.
jacking is derived from both
"ajack" and "hijacking"
Even thought bluejacking does not
resemble hijacking There is no
accessing or taking private data
from your victim's device.
Bluejacking is totally limited to
Bluetooth enabled devices.Bluetooth
has a very limited range, usually
around 10 metres on mobile
phones, but laptops and other
instrument with high power
transmitters can reach up to 100
meters.
Bluejacking Explained
“Bluejacking” is define as sending of
unsolicited messages over Bluetooth
to Bluetooth-enabled devices such
as mobile phones, PDAs, Laptops,
sending a contact which typically
contains a message in the name
field to another bluetooth enabled
device via the OBEX protocol.
Few prople say the term
“Bluejacking” originated with a user
named ajack on esato.com. Some
people say that the term bluejacking
comes from Bluetooth and
hijacking. While that certainly
sounds logical, a bluejacker doesn't
hijack anything, he just send a
contact to the recipient's device.
Both parties have absolute control
over their devices, and a bluejacker
will not be able to take control of
your phone or steal your personal
information.
You can create a phonebook contact
and write a message, eg. 'Hello,
you've been bluejacked', in the
'Name' field. Then you can search
for other phones with Bluetooth and
send that phonebook contact to
them. On their phone, a message
will popup saying "'Hello, you've
been bluejacked' has just been
received by Bluetooth" or
something along those lines. For
most 'victims' they will have no idea
as to how the message appeared on
their phone. So, personalised
messages like 'I like your pink top'
and the startled expressions that
result is where the fun really starts.
Bluejacking is quite harmless, but
because bluejacked people don't
know what is happening, they think
their phone is malfunctioning.
Usually, a bluejacker will only send a
text message, but with modern
phones it's possible to send images
or sounds as well.
But with the increase in the
availability of bluetooth enabled
devices, these devices have become
vulnarable to virus attacks and even
complete take over of devices
through a trojan horse program.
Bluejacking Process
Go to Contacts.
Create a new contact.
Write the short message you want
to send on the line next to 'Last
name'
Save this contact.
Select this contact and send via
Bluetooth.
Your phone will search for devices
All the Bluetooth devices near you
will be displayed.
Select any one you like and send.
You have bluejacked someone.
You can also send pictures to your
victim by adding them to your
bluejack contact. The best thing
about this is even if the victim
rejects the contact that you sent
him/her, the picture gets
automatically saved in the victim's
My Pictures section.
Note:
It is not that interesting after 2 or 3
trials. Its just a prank. Do NOT
harass anyone with this. Be careful
at some places and with some
peoples, especially in airports where
the tolerance level is very low. Also
don't send threatening messages.
Technically you cannot be traced,
but if the victim notices you
behaving in a suspicious way with
your mobile phone in your hand,
you better run for your life.

ChangingStartup and Log-off screens

Startup Screen
1. Create a 320x400 bitmap in the root
directory and name it LOGO.SYS
2. You can use LOGOW.SYS file in the
Windows directory as a starter
Logoff Screens
1. There are many system file that
constitutes Lofoff screen.
2. They are actually bitmaps 320x400
that just have a different extension
3. The hidden file in the root directory
LOGO.SYS is the startup logo.
4. There are two files in the Windows
directory.
5. LOGOW.SYS is the Wait while
Shutting down ... screen.
6. LOGOS.SYS is the You may now
shut-off or Reboot screen.
7. Make two new image files of your
chice in Paint and name it as
LOGOW.SYS and LOGOS.SYS and
replce the actual windows file by
this two.
8. But make sure they should be of the
same size

increase p.c ram

To boost performance of your
PC or to increase RAM virtually,
Right click on My Computer Icon on
Desktop
>> Go to Properties
>> Go to Advanced
>> Go to Performance - Settings
>> Go to Advanced
>> Go to Virtual Memory - Change
Keep the initial size same as
recommended and maximum size
double of it then restart your
system.
It will improve speed of windows
and you can play some games
which require higher RAM.

LOCK A FOLDER IN WINDOWS

To Lock a folder in windows XP
without any software. Follow the
steps Below.
1. Make a Folder in C drive rename it as
"abc" without quotes.
2. Now open Command Prompt from
Start Menu.
3. Type "attrib +s +h C:\abc" without
quotes and press enter.
4. This command will Make your
folder invisble and it can not be seen
even in hidden files and folders
5. To make it visible again type "attrib -
s -h C:\abc"
6. You can lock any other folder also
by changing the location C:\abc to
address of your folder.
#2

LOCK A FOLDER IN WINDOWS

To Lock a folder in windows XP
without any software. Follow the
steps Below.
1. Make a Folder in C drive rename it as
"abc" without quotes.
2. Now open Command Prompt from
Start Menu.
3. Type "attrib +s +h C:\abc" without
quotes and press enter.
4. This command will Make your
folder invisble and it can not be seen
even in hidden files and folders
5. To make it visible again type "attrib -
s -h C:\abc"
6. You can lock any other folder also
by changing the location C:\abc to
address of your folder.
#2