Mail PassView is a small password-recovery tool that reveals the passwords
and other account details for the following email clients:
> Outlook Express
> Microsoft Outlook 2000 (POP3 and SMTP Accounts only)
> Microsoft Outlook 2002/2003/2007/2010/2013 (POP3, IMAP, HTTP and SMTP Accounts)
> Windows Mail
> Windows Live Mail
> IncrediMail
> Eudora
> Netscape 6.x/7.x (If the password is not encrypted with master password)
> Mozilla Thunderbird (If the password is not encrypted with master password)
> Group Mail Free
> Yahoo! Mail - If the password is saved in Yahoo! Messenger application.
> Hotmail/MSN mail - If the password is saved in MSN/Windows/Live Messenger application.
> Gmail - If the password is saved by Gmail Notifier application, Google Desktop, or by Google Talk.
For each email account, the following fields are displayed:
Account Name, Application, Email, Server, Server Type (POP3/IMAP/SMTP),
User Name, and the Password.
Known Problems - False virus alert
Some Antivirus programs detect Mail PassView utility as infected with Trojan/Virus.
In this post we will know about network protocols organized by OSI model. This is list of network protocols, classified by Open Systems Interconnection (OSI) model layers.
OSI model
Layer 1 (Physical Layer) >> Telephone network modems- V.92 >> IRDA physical layer >> USB physical layer >> EIA RS-232, EIA-422, EIA-423, RS-449, RS-485 >> Ethernet physical layer Including 10BASE-T, 10BASE2, 10BASE5, 100BASE-TX, 100BASE-FX, 100BASE-T, 1000BASE-T, 1000BASE-SX and other varieties >> Varieties of 802.11 Wi-Fi physical layers >> DSL >> ISDN >> T1 and other T-carrier links, and E1 and other E-carrier links >> SONET/SDH >> Optical Transport Network (OTN) >> GSM Um air interface physical layer >> Bluetooth physical layer >> ITU Recommendations: see ITU-T >> IEEE 1394 interface >> TransferJet physical layer >> Etherloop >> ARINC 818 Avionics Digital Video Bus >> G.hn/G.9960 physical layer >> CAN bus (controller area network) physical layer >> Mobile Industry Processor Interface physical layer
Layer 2 (Data Link Layer) >> ARCnet Attached Resource Computer NETwork >> CDP Cisco Discovery Protocol >> DCAP Data Link Switching Client Access Protocol >> Distributed Multi-Link Trunking >> Distributed Split Multi-Link Trunking >> Dynamic Trunking Protocol >> Econet >> Ethernet >> FDDI Fiber Distributed Data Interface >> Frame Relay >> ITU-T G.hn Data Link Layer >> HDLC High-Level Data Link Control >> IEEE 802.11 WiFi >> IEEE 802.16 WiMAX >> LACP Link Aggregation Control Protocol >> LattisNet >> LocalTalk >> L2F Layer 2 Forwarding Protocol >> L2TP Layer 2 Tunneling Protocol >> LAPD Link Access Procedures on the D channel >> LLDP Link Layer Discovery Protocol >> LLDP-MED Link Layer Discovery Protocol - Media Endpoint Discovery >> PAgP - Cisco Systems proprietary link aggregation protocol >> PPP Point-to-Point Protocol >> PPTP Point-to-Point Tunneling Protocol >> Q.710 Simplified Message Transfer Part >> Multi-link trunking Protocol >> RPR IEEE 802.17 Resilient Packet Ring >> SLIP Serial Line Internet Protocol (obsolete) >> StarLAN >> STP Spanning Tree Protocol >> Split multi-link trunking Protocol >> Token ring a protocol developed by IBM; the name can also be used to describe the token passing ring logical topology that it popularized. >> VTP VLAN Trunking Protocol >> VLAN Virtual Local Area Network
Layer 3 (Network Layer) >> CLNP Connectionless Networking Protocol >> EGP Exterior Gateway Protocol >> EIGRP Enhanced Interior Gateway Routing Protocol >> IGMP Internet Group Management Protocol >> IGRP Interior Gateway Routing Protocol >> IPv4 Internet Protocol version 4 >> IPv6 Internet Protocol version 6 >> IPSec Internet Protocol Security >> IPX Internetwork Packet Exchange >> Routed-SMLT >> SCCP Signalling Connection Control Part >> AppleTalk DbP >> ESP Encapsulating Security Payload over IP or IPSec >> GRE Generic Routing Encapsulation for tunneling >> BGP Border Gateway Protocol >> OSPF Open Shortest Path First
Layer 4 (Transport Layer) >> AH Authentication Header over IP or IPSec >> IL Originally developed as transport layer for 9P >> SCTP Stream Control Transmission Protocol >> Sinec H1 for telecontrol >> SPX Sequenced Packet Exchange >> TCP Transmission Control Protocol >> UDP User Datagram Protocol >> DCCP Datagram Congestion Control Protocol >> RTP
Layer 5 (Session Layer) >> 9P Distributed file system protocol developed originally as part of Plan 9 >> NetBIOS, File Sharing and Name Resolution protocol - the basis of file sharing with Windows. >> NetBEUI, NetBIOS Enhanced User Interface >> NCP NetWare Core Protocol >> NFS Network File System >> SMB Server Message Block >> SOCKS "SOCKetS"
Layer 7 (Application Layer) >> ADC, A peer-to-peer file sharing protocol >> AFP, Apple Filing Protocol >> BACnet, Building Automation and Control Network protocol >> BitTorrent, A peer-to-peer file sharing protocol >> BGP Border Gateway Protocol >> BOOTP, Bootstrap Protoc; >> CAMEL, an SS7 protocol tool for the home operator >> Diameter, an authentication, authorization and accounting protocol >> DICOM includes a network protocol definition >> DICT, Dictionary protocol >> DNS, Domain Name System >> DSM-CC Digital Storage Media Command and Control >> DSNP, Distributed Social Networking Protocol >> DHCP, Dynamic Host Configuration Protocol >> ED2K, A peer-to-peer file sharing protocol >> Finger, which gives user profile information >> Gnutella, a peer-to-peer file-swapping protocol >> Gopher, a hierarchical hyperlinkable protocol >> HTTP, Hypertext Transfer Protocol >> HTTPS, Hypertext Transfer Protocol Secure >> IMAP, Internet Message Access Protocol >> IRC, Internet Relay Chat >> ISUP, ISDN User Part >> LDAP Lightweight Directory Access Protocol >> MIME, Multipurpose Internet Mail Extensions >> MSNP, Microsoft Notification Protocol (used by Windows Live Messenger) >> MAP, Mobile Application Part >> Mosh, Mobile Shell >> NNTP, Network News Transfer Protocol >> NTP, Network Time Protocol >> NTCIP, National Transportation Communications for Intelligent >> Transportation System Protocol >> POP3 Post Office Protocol Version 3 >> RADIUS, an authentication, authorization and accounting protocol >> RDP, Remote Desktop Protocol >> Rlogin, a UNIX remote login protocol >> rsync, a file transfer protocol for backups, copying and mirroring >> RTP, Real-time Transport Protocol >> RTSP, Real-time Transport Streaming Protocol >> SSH, Secure Shell >> SISNAPI, Siebel Internet Session Network API >> SIP, Session Initiation Protocol, a signaling protocol >> SMTP, Simple Mail Transfer Protocol >> SNMP, Simple Network Management Protocol >> SOAP, Simple Object Access Protocol >> SMB, Microsoft Server Message Block Protocol >> STUN, Session Traversal Utilities for NAT >> TUP, Telephone User Part >> Telnet, a remote terminal access protocol >> TCAP, Transaction Capabilities Application Part >> TFTP, Trivial File Transfer Protocol, a simple file transfer protocol >> WebDAV, Web Distributed Authoring and Versioning >> Extensible Messaging and Presence Protocol (XMPP)
Hello friends generally in many of the offices, schools and even in few countries, it’s very common that to social media and many other sites like Facebook, Twitter, YouTube, Gaming sites etc... are blocked. Most of the times, it is done to increase productivity and protect users interact with unofficial content while work. We’re are having many different ways by which we can bypass school or office Firewall/Proxy.
In this post, We’ll see how to bypass school or office firewall/Proxy using Tor Browser (It's safe and secure as compared to any other).
What Is Tor? The name "Tor" refer to several different components. The Tor browser is a freeware program which we can run on your computer. It helps us to be hidden and use safe Internet. The most interesting and good thing about Tor browser is that it doesn't require any kind of installation. Due to which auditor will not find any trace in register, add remove programs etc..., everything is kept in the location where Tor browser is extracted. Tor protects us by bouncing our communications around a distributed network of relays run by volunteers all around the world. It prevents somebody watching our Internet connection from learning what sites we visit, and it prevents the sites we visit from learning our physical location. This set of volunteer relays is called the Tor network. We can read more about, How Tor works from below Link.
How to use Tor Browser to bypass firewall/proxy to access block sites? 1 - Download Tor Browser from HERE. (DOWNLOAD) 2 - Execute the Downloaded .exe file. It will extract the content on your desktop, in a folder named 'Tor Browser' (by default). 3 - Open the 'Tor Browser' folder and execute 'Start Tor Browser' shortcut present there.
If not having any proxy settings. 4 - Click on Next > Next > Connect. 5 - Tor browser will be started and you may now access all blocked sites.
If using proxy settings. 4 - Click on 'Configure' button. 5 - Select 'Yes' under 'Does this computer need to use a proxy to access the internet?' and click on 'Next'. 6 - Click on 'Connect'. 5 - Tor browser will be started and you may now access all blocked sites.
To use Tor browser on other Operating system Linux, Mac, Android etc... visit below link.
VirusTotal Uploader is a simple Microsoft Windows Desktop application that makes the interaction with VirusTotal as easy as a right-click.
To upload a file to VirusTotal, we can visit the www.virustotal.com site and uplaoad a file to check.
We can also make this process more simple with the free VirusTotal Uploader utility. Install the utility, simply right-click on any file and choose VirusTotal from the Send To option. It will uploads the file and, scan results will be displayed in your browser as usual.
Note: Utility only support files having maximum size 32Mb.
We can Display or modify Access Control Lists (ACLs) or permission
for files and folders using windows command prompt too.Access Control
Lists can be only applied to files stored on an NTFS formatted drive.
Each ACL specify which users (or groups of users) can read or edit the file. When a new file is created it normally inherits ACL's from the folder where it was created. For Vista and above use icacls. NOTE: Cacls is now deprecated, please use Icacls. SYNTAX :- CACLS filename [/T] [/M] [/L] [/S[:SDDL]] [/E] [/C] [/G user:perm] [/R user [...]] [/P user:perm [...]] [/D user [...]]
filename : Displays ACLs. /T : Changes ACLs of specified files in the current directory and all subdirectories. /L : Work on the Symbolic Link itself versus the target /M : Changes ACLs of volumes mounted to a directory /S : Displays the SDDL string for the DACL. /S : SDDL Replaces the ACLs with those specified in the SDDL string (not valid with /E, /G, /R, /P, or /D). /E : Edit ACL instead of replacing it. /C : Continue on access denied errors. /G : user:perm Grant specified user access rights.
Perm can be : R Read
W : Write
C : Change (write)
F : Full control
/R : user Revoke specified user's access rights (only valid with /E). /P : user:perm Replace specified user's access rights.
Perm can be: N None
R Read
W Write
C Change (write)
F Full control
/D : user Deny specified user access.
Wildcards can be used to specify more than one file in a command. You can specify more than one user in a command.
Abbreviations :- CI - Container Inherit : The ACE will be inherited by directories. OI - Object Inherit : The ACE will be inherited by files. IO - Inherit Only : The ACE does not apply to the current file/directory. ID - Inherited : The ACE was inherited from the parent directory's ACL.
EXAMPLE :- Give everyone read-only permission to a folder C:\Users\lmntechnohub\Desktop>cacls Music /e /g Everyone:R processed dir: C:\Users\lmntechnohub\Desktop\Music
Remove everyone read-only permission to a folder C:\Users\lmntechnohub\Desktop>cacls Music /e /R Everyone processed dir: C:\Users\lmntechnohub\Desktop\Music
Display and modify the IP-to-Physical address translation tables used by address resolution protocol.
Syntax
View the current ARP table on the system. arp -a arp -g
Add a static ARP entry manually. arp -s ip_addr eth_addr(MAC_addr)
Delete ARP table entry, arp -d (To delete complete ARP table) arp -d ip_addr (To delete entry for a specific IP address)
ARP Help arp /?
If two hosts on the same sub-net cannot ping each other successfully, try running ARP -a to list the addresses on each computer to see if they have the correct MAC addresses.
A host's MAC address can be checked using IPCONFIG. If another host with a duplicate IP address exists on the network, the ARP cache may have had the MAC address for the other computer placed in it. ARP -d is used to delete an entry that may be incorrect.
1. Right-Click on Computer > Properties > Advanced system settings. 2. Select the "Advanced" tab. 3. Click on "Environment Variables" below. 4. Under "System Variables" locate Path and choose 'EDIT'. 5. Paste ";%SystemRoot%\system32;%SystemRoot%" at the end (Without quotes ".)
You can use Google Search to search through specific websites. Example, if you don’t like the search for a news on news site, you can just open Google and type site:news.com followed by whatever you want to search for.
2. Search using a image :-
You all know that you can search Google using Images, no not the Image search, you can actually insert an image on the Google Search bar. What many miss is the amount of information that you can find using this. Instead of checking the Google image results, check the normal search results that come. You can find the source of a picture through this. It can also be used for finding things like recipes of certain preparations etc.
3. Autocomplete wildcards :- Autocomplete is a very handy feature on Google Search. Like other advanced search engines, you can put blank in the middle of your search terms, which signifies ‘anything’. Google will show wildcard suggestions for the term that can be put there. So, if you’re searching for ‘how to learn English’, you can remove the word ‘learn’ from the string and Google will give you suggestions about what all can be put there.
4. Search with Extension :-
Remember these search tools: inurl, intitle and filetype. If you need to search for a PPT about "What is Google" then search as what is Google filetype:ppt. This will show you all search result with PPT extention.
5. Find alternatives for websites, products etc. :- To search for a alternative to the iPhone 5S, just write ‘iPhone 5S vs’, and Google will show you suggestions for popularly searched competitors.
6. Google cache :-
The cached link to different websites on Google is highly useful. It can be used to access a website when it is down or getting around a SOPA ( Stop Online Piracy Act) blackout. But, you don’t always have to click on the cached link, you can simply write cache: along with the URL for the site and you will have what you need. Example :- "cache:lmnhub.blogspot.in"
7. Google proxy :- You can use Google search to bypass security features, paywalls and downloading files by funnelling through websites using Google Translate or Mobilizer. Just like the cached option, you can also access this directly, as long as you have the URL available.
All you have to do is add the URL to the end of the Google URL. Method 1 (For Desktop view) - http://translate.google.com/translate?sl=ja&tl=en&u=http://"Webpage url" Method 2 (For Mobile view) - http://www.google.ie/gwt/x?u=http://"Webpage url"
8. Google Images to look for people :- When a person’s name is the same as that of an object, it often returns conflicting results. To get around this, you can just add the &imgtype=facethe to the end of the search URL. The search will be redone and only those with faces will be returned.
9. Time-based search results :- Google Search already provides a filter for getting time-based results, but if you want to be more specific, there is a way to do that too. All you have to do is add &tbs=qdr: to the end of your URL. You have to specify the time too. Here, h5 signifies five hours, while n5 signifies five minutes. For five seconds, write s5. So, if you want to search in the last ten minutes, you will write add&tbs=qdr:n10 to the URL.
For more Google search tips and tricks visit HERE.
Game and application requests are very annoying. They consume a lot of our time. For example, When ever you login to your Facebook and see there are many notification and all of them are only of games and application such as Candy Crush Saga, Candy Crush Soda Saga, Bubble Shooter, etc.... Due to this many of times we ignore the notification which might have an important message.
In this post we will see how to block such annoying Facebook game and application request.
Lets see :-
1 - Login to your Facebook account. And go to Settings.
2 - Click on "Blocking" option present in the left slide bar.
3 - Scroll down to find a section as "Block apps". Now just enter the game or application name you want to block.
Its done.
If in future you feel to get the notification of the blocked application just click Unblock option present at the end of the application.
As similar to to many other sites Facebook also stores our activity. For example if we have ever looked up someone, or a page on Facebook, our searches will be saved in our Activity Log. Others will not have access to what we had searched, but Facebook, and who ever is having access to our account, can know.
Lets see how To Delete our Facebook activity.
1 - To delete your Facebook activity history click on down arrow at the Right top corner, and click on “Activity Log”.
2 - Click on “More” option present at the left side of the page.
3 - Click on “Search” Option to display your search history. After that click on “Clear Searches”. It will prompt a message for confirmation. There again click on “Clear Searches” to delete your history, as given in the image below.
We are searching for a lot of our online time. Many of the time we that is too private, like personal medical advice, financial enquirers etc. Many of us may not know the fact that their search history is saved online in the hands of Google.
What makes things worse is when some anyone using your machine get to know about your search result. In this post, we get to know how to delete your search history from the many of our commonly used sites on the Internet, so that we can safeguard our privacy.
If we are logged into our Google account while searching query or clicking a link on the results page, our choices will be logged in, Google saves our activity history to give us better results in future searches. If you want to get rid of this, you can remove your searches from your profile.
Lets see how To Delete Your past Google activity History :-