Nuffnag ads

20.8.08

Virtual Network Computing - vnc-



in computing, Virtual Network Computing (VNC) is a graphical desktop sharing system which uses the RFB protocol to remotely control another computer. It transmits the keyboard and mouse events from one computer to another, relaying the graphical screen updates back in the other direction, over a network.

VNC is platform-independent — a VNC viewer on any operating system usually connects to a VNC server on any other operating system. There are clients and servers for almost all GUI operating systems and for Java. Multiple clients may connect to a VNC server at the same time. Popular uses for this technology include remote technical support and accessing files on one's work computer from one's home computer, or vice versa.

VNC was originally developed at the Olivetti Research Laboratory in Cambridge, United Kingdom. The original VNC source code and many modern derivatives are open source under the GNU General Public License.

VNC was created at the Olivetti & Oracle Research Lab (ORL), which was then owned by Olivetti and Oracle Corporation. In 1999 AT&T acquired the lab, and in 2002 closed down the lab's research efforts.

Developers who worked on VNC while still at the AT&T Research Lab are:

  • Tristan Richardson (inventor)
  • Andy Harter (project leader)
  • Quentin Stafford-Fraser
  • James Weatherall
  • Ken Wood
  • Andy Hopper
  • Charles McLachlan
  • Paul Webster
  • Hendrik Ekkelenkamp, Ekkelenkamp IT, advisor

Following the closure of ORL in 2002, several members of the development team (including Richardson, Harter, Weatherall and Hopper) formed RealVNC in order to continue working on open source and commercial VNC software under that name.

Several other versions of VNC have been developed from the original GPled source code. Such forking has not led to compatibility problems because the RFB protocol is designed to be extensible. VNC clients and servers negotiate their capabilities when handshaking in order to use the most appropriate options supported at both ends.

A VNC system consists of a client, a server, and a communication protocol.

  • The VNC server is the program on the machine that shares its screen.
  • The VNC client (or viewer) is the program that watches and interacts with the server.
  • The VNC protocol (RFB) is very simple, based on one graphic primitive from server to client ("Put a rectangle of pixel data at the specified X,Y position") and event messages from client to server.

The server sends small rectangles of the frame buffer to the client. In its simplest form, the VNC protocol can use a lot of bandwidth, so various methods have been devised to reduce the communication overhead. For example, there are various encodings (methods to determine the most efficient way to transfer these rectangles). The VNC protocol allows the client and server to negotiate which encoding will be used. The simplest encoding, which is supported by all clients and servers, is the raw encoding where pixel data is sent in left-to-right scan line order, and after the original full screen has been transmitted, only transfers rectangles that change. This encoding works very well if only a small portion of the screen changes from one frame to the next (like a mouse pointer moving across a desktop, or text being written at the cursor), but bandwidth demands get very high if a lot of pixels change at the same time, such as when scrolling a window or viewing full-screen video.

VNC by default uses TCP ports 5900 through 5906, each port corresponding to a separate screen (:0 to :6). A Java viewer is available in many implementations such as Real VNC on ports 5800 through 5806, allowing clients to interact through, among other things, a Java-enabled web browser. Other ports can be used as long as both client and server are configured accordingly.

Using VNC over the Internet works well if the user has a broadband connection at both ends. However, it may require advanced NAT, firewall and router configuration such as port forwarding in order for the connection to go through. Some users may choose to use instant private networking applications such as Remo Bo or VPN applications such as Hama chi to make usage over the Internet much easier.

Note that on some machines, the server does not necessarily have to have a physical display. Xvnc is the Unix VNC server, which is based on a standard X server. Xvnc can be considered to be two servers in one; to applications it is an X server, and to remote VNC users it is a VNC server. Applications can display themselves on Xvnc as if it were a normal X display, but they will appear on any connected VNC viewers rather than on a physical screen.

In addition, the display that is served by VNC is not necessarily the same display seen by a user on the server. On Unix/Linux computers that support multiple simultaneous X11 sessions, VNC may be set to serve a particular existing X11 session, or to start one of its own. It is also possible to run multiple VNC sessions from the same computer. On Microsoft Windows the VNC session served is always the current user session.

VNC is commonly used as a cross-platform remote desktop system. For example, Apple Remote Desktop for Mac OS X (and more recently, "Back to My Mac" in 'Leopard' - Mac OS X 10.5) interoperates with VNC and will connect to a Linux user's current desktop if it is served with x11vnc, or to a separate X11 session if one is served with Tight VNC. From Linux, TightVNC will connect to an OS X session served by Apple Remote Desktop if the VNC option is enabled, or to a VNC server running on Microsoft Windows.

Key logger..!! is back again..!!

A lot of u didn't know what is key logger... this software is a real security threat to it security guys as u knows.. i did gave this software to my friend before as from what he say, he wish to use this software to monitor his gal Internet activity and bla..bla..bla.. as a guud will basis i gave this software to him and next thing i found out after 5 month he already been suspended from work due to security threats that he poses during that time... dig it a little bit more he did hack to some of the company pnc stuff and some of the hi level personal stuff and make a hell out of it main intention is due to grudge... what is key logger read this...

Key logger (often called key logging) is a method of capturing and recording user keystrokes. Key logging can be useful to determine sources of errors in computer system, to study how users interact and access with systems, and is sometimes used to measure employee productivity on certain clerical tasks. Such systems are also highly useful for law enforcement and spying—for instance, providing a means to obtain passwords or encryption keys and thus bypassing other security measures. Key loggers are widely available on the Internet.

There are currently two types of key logging methods, hardware and software based.

Keystroke logging can be achieved by both hardware and software means. Hardware key loggers are commercially available devices which come in three types: inline devices that are attached to the keyboard cable, devices which can be installed inside standard keyboards, and actual replacement keyboards that contain the key logger already built-in. The inline devices have the advantage of being able to be installed instantly. However, while they may go unnoticed for quite some time, they are easily detected visually upon closer inspection. Of the three devices available, the most difficult to install is also the most difficult to detect. The device that installs inside a keyboard (presumably the keyboard the target has been using all along) required soldering skill and extended access to the keyboard to be modified. However, once in place, this type of device is virtually undetectable unless specifically looked for.

types of keystroke loggers

1) Local Machine software Keyloggers are software programs that are designed to work on the target computer’s operating system. From a technical perspective there are three categories:

  • Kernel based: This method is most difficult both to write, and combat. Such keyloggers reside at the kernel level and are thus practically invisible. They almost always subvert the OS kernel and gain unauthorized access to the hardware which makes them very powerful. A keylogger using this method can act as a keyboard driver for example, and thus gain access to any information typed on the keyboard as it goes to the Operating System.
  • Hook based: Such keyloggers hook the keyboard with functions provided by the OS. The OS warns them any time a key is pressed and it records it.
  • Creative Methods: Here the coder uses functions like GetAsyncKeyState, GetForegroundWindow, etc. These are the easiest to write, but as they require polling the state of each key several times per second, they can cause a noticeable increase in CPU usage and can miss the occasional key. However, skilled coders can overcome both these limitations by polling all key states several hundred times per second, while still not using more than 1% CPU usage to do so.

2) Remote Access software Keyloggers are local software keyloggers programmed with an added feature to transmit recorded data out of the target computer and make the data available to the monitor at a remote location. Remote communication is facilitated by one of four methods:

  • Data is uploaded to a website or an ftp account.
  • Data is periodically emailed to a pre-defined email address.
  • Data is wirelessly transmitted by means of an attached hardware system.
  • It allows the monitor to log into the local machine via the internet or ethernet and view the logs stored on the target machine itself.

3) Hardware Keyloggers are used for keystroke logging by means of a hardware circuit that is attached somewhere in between the computer keyboard and the computer. It logs all keyboard activity to its internal memory which can be accessed by typing in a series of pre-defined characters. A hardware keylogger has an advantage over a software solution; because it is not dependent on the computers operating system it will not interfere with any program running on the target machine and hence cannot be detected by any software.

4) Remote Access Hardware Keyloggers, otherwise known as Wireless Hardware Keyloggers, work in much the same way as regular hardware keyloggers. Except they have the ability to be controlled and monitored remotely by means of a wireless communication standard.

5) Wireless Keylogger sniffers collect packets of data being transferred from a wireless keyboard and its receiver and then attempts to crack the encryption key being used to secure wireless communications between the two devices.

6) Acoustic Keylogger work by analysing a recording of the sound created by someone typing on a computer. Each character on the keyboard makes a subtely different acoustic signature when stroked. Using statistical methods, it is then possible to identify which keystroke signature relates to which keyboard character. This is done by analysing the repetition frequency of similar acoustic keystroke signatures, the timings between different keyboard strokes and other context information such as the probable language in which the user is writing. A fairly long recording (1000 or more keystrokes) is required so that the statistics are meaningful.

Keylogger prevention

Currently there is no easy way to prevent keylogging. In the future it is believed that software with secure I/O will be protected from keyloggers Until then, however, the best strategy is to use common sense and a combination of several methods. It is possible to use software to monitor the connectivity of the keyboard and log the absence as a countermeasure against physical keyloggers. For a PS/2 keyboard the timeout bit (BIT6 at port 100) has to be monitored

simple way to say that this thing works like charmed even have screenshot what are u doing during it al have means that once it been install u cant hide wat are u doing.....

below is the link available to download key logger software...

-Touch me-


Net Gong - Network monitoring ...!!

NetGong is a sophisticated network monitoring solution that allows network administrators, webmasters, and Internet service providers to monitor any networked device on the Internet, corporate intranet, or TCP/IP LAN and receive alerts immediately via audible alarm, message, e-mail, or third-party software when a connection fails. It is a powerful personal monitoring product delivering low cost, simplicity of operation, and round-the-clock coverage. An essential addition to any network administrator’s personal toolkit, NetGong allows users to tailor it to their particular area of responsibility, from a single server to a small-office LAN to hundreds of devices within a large corporate network. Corporate network managers can use NetGong to distribute responsibility among IS staffers and complement existing network management systems. Small businesses can afford to employ NetGong for monitoring critical e-mail and Web servers.

Main features:
  • Agentless architecture - Allows you to monitor network devices or services without installing an agent on each machine.
  • Comprehensive monitoring - Monitors up to 500 network resources simultaneously.
  • Global settings - Allows quick network resource configuration.
  • Independent parameters - Allows all parameters to be set independently for each network resource.
  • Maintenance mode - Permits you to temporarily disable monitoring of certain resources.
  • Robust alerting - alerts you to failures using a variety of techniques ranging from audible alarms to third-party software.
  • alert schedule - Allows you "fine tune" the alerting functions to avoid unnecessary alerting during an extended failure.
  • Failure and recovery alerts - alerts can be enabled for any combination of failure and recovery notices.
  • Custom alerts - Allows custom alerts to be created for each monitored resource.
  • Test alert configuration - Each alert type can be tested in order to verify that the alert is configured correctly prior to going live.
  • E-mail notification - Allows e-mail notification via SMTP with the server of your choice.
  • Custom messages - Supports keyword values and customized message information.
  • Integrated reporting - Offers real-time and historical reporting capabilities to assist you in tracking network resources availability.
  • HTML report output - Provides reports in HTML format to help keep track of network resources availability in an easy to view list.
  • Remote access - Provides remote access to the monitoring results using a Web browser.

What's new:
  • Ability to copy existing configurations - You can set several different configurations up for different needs and then easily duplicate it for the next network devices.
  • Windows Vista 64-bit compatibility
  • Improved startup performance

Link to download...

-click me..!!-

-netgong home-

Microsoft hints at “private browsing” feature in IE

One of the most interesting feature that didn’t quite make it into the final release of Firefox 3 is “Private Browsing”, a.k.a. porn mode. The only other browser with this feature built-in today is Safari (another reason to try it in case you haven’t), however, Microsoft may also be building a similar feature into Internet Explorer 8 if two trademark filings are any indications.

On July 30th, Microsoft filed two trademarks for:

CLEARTRACKS
IC 009. US 021 023 026 036 038. G & S: computer programs for accessing and using the Internet and the world wide web; and computer programs for deleting search history after accessing websites

INPRIVATE
IC 009. US 021 023 026 036 038. G & S: computer programs for accessing and using the Internet and the world wide web; computer programs for disabling the history and file caching features of a web browser; and computer software for notifying a user of a web browser when others are tracking web use and for controlling the information others can access about such use

Although “private browsing” can be easily associated with viewing particular genres of media content, the Mozilla foundation argues “while viewing pornography may be a popular use case due to the nature of content on the Web, assuming that this is the only reason that users need private browsing trivializes the overall feature. For instance, users may wish to begin a private browsing session to research a medical condition, or plan a surprise vacation or birthday party for a loved one.”

If indeed Microsoft is rolling out such a feature in Internet Explorer 8, I can imagine it becoming very popular with surprise birthday planners across the world. Oh those birthday people are in for a treat.

email things...!!


Let’s say I have a really cool and hard to get email address username such as hydrocloric@hotmail.com or hydrocloric@gmail.com. I would be so proud but then I dare not simply use it to sign up on any forms or let everyone know to prevent spam or even someone hacking it. When a Hotmail or Gmail email account is hacked, it is nearly impossible to get it back after the hacker changed the secret question and answer or the alternative email address. If you send an email to Hotmail support, they will only reply you with a ready written email template that ask you to try recovering your account through the secret question and answer or just sign up a new email account.
To solve this problem, a lot of people including me have more than 1 email account. I have a Hotmail which only my close friends and family knows about it, a Gmail for everyone else to contact me and finally, my domain email address for my customers.

akapost is a simple and easy way to protect your email identity from being exposed on the Internet. With akapost, you can send and receive emails from any of your existing email accounts but still keep your actual email addresses private. akapost works with any email client or device such as computer, cell phone, or handheld, etc. No software download or installation is required. Simply sign up and register your email address, it’s ready to go. Protecting email identity has never been so easy - and yet it’s FREE!

The below example scenario would help you understand akapost’s concept better:
• 1. Brian would like to send an e-mail from his company e-mail account to Lisa. But he doesn’t want Lisa to know his actual e-mail address.
• 2. Brian signs up with akapost, creates an akapost e-mail address “JediMaster@akapost.com”, and associates it with his actual e-mail address “Brian.Jones@company.com”.
• 3. Next Brian appends the extension “.akapost.com” to Lisa’s e-mail address and sends a message to this customized e-mail address “LisaW82@yahoo.com.akapost.com“. The message is then redirected to akapost.
• 4. akapost substitutes Brian’s e-mail address with Brian’s akapost e-mail address, strips all personal information in message headers ties to Brian’s actual e-mail account, and delivers the message to Lisa.
• 5. When Lisa receives Brian’s message, she doesn’t know Brian’s actual e-mail address because the original sender address has been replaced with Brian’s akapost e-mail address. To Lisa the message seems to be sent directly from Brian’s akapost e-mail address. When Lisa replies this message, the replied message is sent to Brian’s akapost e-mail address “JediMaster@akapost.com”.
• 6. akapost receives Lisa’s replied message and forwards it to Brian’s actual e-mail address “Brian.Jones@companycom”.
akapost currently offers three types of services: akapost Basic, akapost Plus and akapost Premium. akapost Basic is completely free, which allows you to create one akapost email address and protect one your actual email adddress. akapost Plus cost $22.95 per year and you can create up to 5 akapost email addresses and protect up to 10 registered email addresses. As for akapost Premium, it cost $9.95/month. You can create up to 25 akapost email addresses and protect up to 50 registered email addresses. You can also create customized email addresses (for example, sales@yourcompany.com) with an additional fee.

10.8.08

arts....

Pada aku lah manga is an art... a beautiful piece art... walau pun hitam puteh ia tetap cantek dimana porpotion dia seimbang tone utk setiap watak is balance out nice lah.. below is a few sample
ini di ambil dari diablo 3 ... hehehe....

Jay...!!Nice kan please admire more.. tq

yang nie totally remind aku kat kak chom ngan fendi hehehehehehehehehehehe
i luv this one remind me of hadija heheheheheh jgn marah eja weh...!!


This remind me of suraya hehehehehehehehe kalu dia dress macam nie lahso to end it thank u for wasting ur time in here tq... hehehe sebenar nyer aku suke gambar2 macam nie nice to print dan tepek kat cubicle kite hehehehehehe

6.8.08

Anime [アニメ] & Manga [まんが]


Talk about those thing that i mention on the above all the boys in the world sure will love it and for those who not love it there should be somethin wrong there..!! u guess..

Anime (アニメ) it is an abbreviation of the English word "animation" originating in japan through the roots of manga. Although the term is used in Japan to refer to animation in general.
Anime is traditionally hand drawn, but dengan teknik bantuan computer [enhance gambar bagi cantek..]. It is used in tv series, films, games, and internet-based releases, and represents all genres of fiction

-naruto


Manga ( まんが) It is the Japanese word for comic or print cartoons.In their modern form, manga date from shortly after WW2 but have a long, complex history in earlier Japanese art.In japan, manga are widely read by people of all ages, so that a broad range of subjects and topics occur in manga, including action-adventure, romance, sports and games, historical drama, comedy, science fiction and fantasy, mystery, horror, sexuality, and business and commerce, among others, e.g manga...

-The Law Of Ueki Plus



see the different ekk hehehehehe..... so know u know [for those who not know it lah]

日本製アニメおよびmangaのiaは既にマレーシアの phenomenon なる