Showing posts with label Backtrack5 R3. Show all posts
Showing posts with label Backtrack5 R3. Show all posts

Top 11 Free Online Video Converters

Top 10 Best Free Online Video Converters – Have a look at this ultimate list of the best free online video conversion tools to convert your videos from one format to another online for free: We often need to convert a video file for the sake of compatibility on various platforms / devices. Online video conversion offers significant advantages over any desktop app. As a cloud based service, it could be used anywhere and on many different platforms without the need to download or install anything. If you’re on the move, an online video converter serves your  needs perfectly.
I compiled a list of the best free online video converters on the web. These consist of both PC and Mobile oriented sites. Ease-of-use, learning curve and portability were taken into consideration.
This is the start of a series of web tools I will be doing in the coming days. I love web tools as they offer the utility of desktop apps with the reliability of the cloud and flexibility of platforms combined with the advantage of portability. You know something’s awesome when it has so many associated nouns that end in ‘-ity‘. Let’s roll

Best Free Online Video Converters


Cloud Convert :

Cloud convert, as the name suggests, brings the power of the cloud to your video conversion process. It offers options to upload files from Dropbox and Google Drive and the ability to send your converted files to the same upon completion. You can also opt to receive an email notification once your conversion is done. It’s list of services is quite extensive with support for Video, Audio, Cad files, Spreadsheets, Presentations, E-books and Documents.
Cloud Convert


Online Convert :

Online-Convert.com is one of the most comprehensive online media converter on the web. The site hosts not just video converters but also audio,document,image,archive and e-book converters. It also has a hash generator. Upload a file from your desktop or any site (direct link), select output format and quality and convert it with ease. It gives you a download link in mere seconds after upload. Highly Recommended.
Online-Convert


Media Converter :

Media Converter is a simple online video converter where you’re presented with a window to upload your file and convert it into desired format. However, you only get 5 free conversions per day. Output formats include WMV, AVI, MP4, OGG etc.

N°1 Free online Video Converter :

N1 Online video converter greets you with a homepage that asks you to select your region so as to provide a server closer to your location. You can convert videos from Youtube or upload files from your own PC (Video & Audio) to be converted. Click ‘Save as’ once finished. It is simple and free and the whole process takes just a few minutes.

Wap 4 :

Wap4 is an open-source online video converter site that specializes in mobile video formats. Max upload files size is 100MB. Upload. Convert. Save to PC instantly. Simple.

Files Conversion :

Files-conversion.com maybe the simplest online video converter yet. It offers options to set quality from low to very high and the ability to change video size. Converted files can be instantly saved to PC.

File Wiggler :

File Wiggler is another free online media converter that supports a large variety of formats. You can upload videos upto 200MB in size. If you refer 5 people you can upload upto 400MB of videos. The only gripe here is the conversion is not instant and links will be E-mailed to you in about 3 days after upload.
File Wiggler


You Convert It :

You Convert it offers free online video conversion in a simple one page setup. Just upload files from your computer and the converted files will be E-mailed to you upon completion. Supports 3GP, MOV, AVI, WMV, SWF etc.
Also check this out: Best 3GP & MP4 Video Converters for Free Download

Convert Videos Online :

Convert-video-online.com offers a clean, simple interface where you uplaod a file from your PC and convert it instantly with zero hassles. It offers HD formats to convert your files to and the conversion process itself is blazing fast and the download link is presented immediately.
Online Video Converter


MakeJar :

MakeJar is another site that specializes in mobile phone video formats. The output formats are given in the form of profiles i.e a list of phones is available from which you can select your phone to start converting your video. You can save the file to PC post conversion. HTC, Nokia and some Samsung models are presently listed on the site.
MakeJar

Convert Files :

It’s a free  online converter capable of processing files up to 250 MB in size. You can upload from your PC or a URL (direct link). You can also upload videos from popular video sharing sites like Youtube, Metacafe etc. The conversion support is extensive ranging from Videos to Archives and even Drawings.

Conclusion : To wrap things up, Online video conversion simply rocks and you should definitely give it a spin if you haven’t  used it yet. Choose a site from above that best suits your conversion needs. After all, why bother downloading an app and straining your PC when you can leave all the heavy-lifting to a cloud based service. The server does the grunt work while you get to download & enjoy your converted files in the desired format for free.
You might also love to check out this list of the: Best Video Converters for Windows & Mac OS X

Download for PC

How to Upload animated GIF image to blogger

 In fact many bloggers uses third party websites to upload animated (Gif format ) images to add in blog post. Blogger Image uploads are powered by picasa and it hasn't longer accepted animated images . 

Picasa says animated images are some PSD files are exception .
But today i have uploaded an animated image on picasa via blogger (Like , usual upload static images to blog post)  and works fine. 

Just check out Here. This is True !!!!!!





- Picasa web Album supports major image file formats.Click here to know  supported image formats .


Troubleshoot :
  • How To Upload Animated Image in Blogger ? 

                Just Like you upload Static Images to blog Post.

  • My Images aren't animating in Blog post.
               Ensure your image is in GIF format ( extension .gif) and animated before uploading to blog.

  • White Background for animated Images,which aren't before uploading to blog post.
               Make Transparent Image Show Up As Transparent In Blogger

  • Still doesn't animated, feel free to ask in Picasa Web forum.
  • Still, then sorry .Your animated file aren't supported by Picasa.Tryt Third party websites ( Like Photobucket,imgur ) to upload animated images and Get html code and paste in blog post (HTML mode) .

I successfully Uploaded animated GIF image in this post (created in Adobe Photoshop cs5 Extended ) .
What about You ? Comment on it.

Has your website or WordPress blog been hacked?

Is your site displaying the “This site may be hacked ” warning at Google.com or Bing.com?
Web site hacked or web site blocked by Google?
With over 15 years experience, and a long list of “verifiable” satisfied customer service testimonials, The Hack Repair Guy™ will remove malware, work to fix website security issues, recommend free techniques to monitor and prevent future attacks, install WordPress security plugins, and even repair basic WordPress errors; all for a reasonable flat rate, no matter how long it takes to resolve. Heroic Customer Service— it’s what we do! 

We clean most infected sites of malware within two hours and unblacklist websites within 24 hours. Why choose HackRepair.com?

  • Service
    We’ll discuss your situation by phone to determine how quickly we can repair your website.
  • Expedience
    We’ll clear your website of malicious scripts and malware then get your web site back up and running quickly. We are WordPress CMS experts as well.
  • Comprehensive
    We’ll help recover and unblock your site within Google and help you in clearing any Google.com or Bing.com website listing issues.
  • Education
    Our goal is to help prevent your website from being hacked again. We install security and security monitoring plugins, and will train you on how to use them free of charge as well.
  • And don’t forget our money back guarantee!


How can we guarantee we will clear & recover your hacked website?

video testimonial for hackrepair.com
  • We’ve been securing websites since 1997.
  • We have developed a range of tools to help quickly identify and clear malicious scripts or hacker code from your website pages.
  • Our friendly, knowledgeable staff is ready and available to assist you on your schedule.
  • We do not outsource our work; everything is done in-house here, in the USA.
  • We will work directly with Google on your behalf to ensure your website is unblocked within Google.com or Bing.com as quickly as possible.

Don’t let your reputation be ruined as a reported attack page. Call
(619) 479-6637 or toll-free (800) 639-6442, and let us help to repair your reputation immediately!



Other Common hack related terms and information relating to how to clear hacked websites:
  • iframe hack – sometimes called an iframe injection is often used by hackers to redirect visitors to other websites or force a software download upon visiting the hacked website.
  • Base64 code – is a common means hackers code their web page hacks. This obfuscated code makes it harder to find hacker code on a web page. A server admin searching a server for hack related text may often miss files injected with obfuscated base64 PHP code because the obfuscated code conceals the usual suspect phrases. The “pharma hack” often uses base64 or obfuscated coding.
  • Botnet – is a large collection of hacked PCs, sometimes called zombie computers. These PCs once controlled may be used to send junk e-mail or bring down web services. Botnet’s are often the means by which denial of service attacks are initiated.
  • ‘hacked by hacker’ – was a well known server wide compromise which took advantage of a vulnerability relating to the symbolic links setting within cPanel configured web servers. A number of web hosts fell prey to this cPanel related exploit, which allowed hackers to replace most of the “index” type pages of accounts configured on server with a text file containing the words, ‘hacked by hacker’.
  • Zero-Day exploit – Affecting both websites and computers, the zero-Day exploit is a term describing not yet documented security threats or vulnerabilities.
  • Denial of service attack – or distributed denial of service attack (DDoS), is a distributed attack on a network or service. Because these types of attacks originate from so many locations simultaneously they often result in hours of downtime until mitigated.
  •  
  • Common search engine and web browser alert messages include:
    Google – ‘This site may be hacked.’
    Google – ‘This site may harm your computer.’
    Google – ‘This site may harm your device’
    Google – ‘This site may be compromised’
    Bing and Twitter – ‘unsafe link’
    Chrome – ‘Warning: Something’s Not Right Here!’
    Chrome – ‘Danger: Malware Ahead!’
    Firefox – ‘Reported Attack Site!’
    Internet Explorer – ‘This website has been reported as unsafe’
    Opera – ‘Fraud Warning’
    Safari – ‘Warning: Visiting this site may harm your computer’
    Yahoo – ‘Warning: Hacking Risks’

How To Deface A Website With Basic HTML Coding In Just 5 Minute

I was browsing the net when i saw this tutorial:

Source: http://naijadudes.com


Steps:

Open the site you want to hack. Provide wrong username/password combination in its log in form. (e.g. : Username : me and Password: ' or 1=1 --)An error will occur saying wrong username-password. Now be prepared your experiment starts from here.


Right click anywhere on that error page =>> go to view source.

3. There you can see the HTML coding with JavaScript.• There you find somewhat like this....<_form action="...Login....">• Before this login information copy the URL of the site in which you are. (e.g. :"< _form..........action=http://www.targetwebsite.com/login.......>")

4. Then delete the JavaScript from the above that validates your information in the server.(Do this very carefully, your success to hack the site depends upon this i.e. how efficiently you delete the java scripts that validate your account information)

5.Then take a close look for "<_input name="password" type="password">"[without quotes] -> replace "<_type=text> “there instead of "<_type=password>". See there if maximum length of password is less than 11 then increase it to 11 (e.g. : if then write )

6. Just go to file => save as and save it anywhere in your hard disk with ext.html(e.g.: c:\chan.html)

7. Reopen your target web page by double clicking 'chan.html' file that you saved in your hard disk earlier.• You see that some changes in current page as compared to original One. Don't worry.

8. Provide any username [e.g.: hacker] and password [e.g.:' or 1=1 --] You have successfully cracked the above website and entered into the account of List user saved in the server's database.

Warnings

Do the coding and changes very carefully, your success to hack the site depends upon this i.e. how efficiently you delete the java scripts that validate your account information.

Please like this post if it worked for you

How to Spoof your MAC address

Do you know that each and every computer/laptop having Network Interface Card (NIC) also known as Ethernet card has a Unique MAC Address?

What is the need and Significance of Unique MAC address?

MAC address also known as Media Access Control is a 48 bit hexadecimal key which identifies a machine of Network when connected to LAN/WAN. 



The Unique MAC address is burnt in the ROM of the Ethernet card. Whenever any request is sent on Network, The ARP packets contain IP address of the Machine along with the MAC address which uniquely identifies a Machine on Network. 
 
Let’s take up a scenario to explain the significance of the MAC address

In today’s world of digitalization, whatever electronic devices you have, it has connectivity features like Bluetooth or Wi-Fi. Whether it may be Mobile Phone, IP cameras, Printer/Scanners, PDAs, Laptops, Network HDDs, etc…

So each and every above such devices should have a unique MAC address.


Consider the above Image scenarios wherein many devices are connected to a Wi-Fi router. Whenever you try to connect the Device with router an ARP (Address resolution Protocol) packets is sent from the device to the router.

The ARP packet which is sent from the device contains the MAC address of its Network Interface controller. As soon as the ARP packets are received by the router, the router checks for Authentication of the device and if the device is Authentic then it sends RARP Packet (Reverse ARP).

RARP Packet contains the MAC address and the IP which has to be assigned to the device. Since there can be many devices simultaneously trying to connect the router, the RARP packet will be broadcasted to all the devices.

But only those devices which match with the MAC address of the RARP packet will be able to accept it and get the Assigned IP address to the device. Since the packets are broadcasted, if the devices doesn’t have a unique MAC address it won’t be able to interact with the Layer 3 devices on Network and Hence will be unreachable from the network.

 How MAC address spoofing can result in Hacking and IS breach

Nowadays everywhere Wi-Fi routers are used to connect to devices like Laptops, PDA, Mobile Phones, etc… replacing the old CAT5 cable.

In case of Wi-Fi, since it is an air interface the signals are reachable to surrounding areas also and thus can be used by any intruder who has the Wi-Fi signal reachability to enter in to the secured network and gain access to the important/crucial information thus resulting in Information security breach.

So as to avoid this, almost all the Wi-Fi router comes with MAC filtering. Which means that the network admin of the Router can already specify that only the listed MAC address are authentic and should be allow to be connected and rest other devices should be blocked.

See below the Screenshot of my Home Router in which I have specified only two MAC address. So whenever anyone else with other than this mentioned MAC address is in the range on the network and tries to connect to the device it will be blocked because the MAC address filtering is enabled.

So in this case we can spoof the MAC address with the one which is allowed and can enter in to the network and use the network resources.

Procedure to Spoof the MAC address

 There are many third party applications available, some free and some paid with which you can easily spoof your MAC address. But I will let you know how we can use Windows predefined functionality to Spoof the MAC address.
     1) First click on start, then click on run And type “control netconnections” and click ok

    2) The above command will open network connections, in network connections find your  Network Adapter of which you have to change the MAC address.

    3)  Right click on the Network adapter and click on Properties and you will see a window similar to below
     
     
      4) Click on Configure button








                                            


      5)      Click on Advanced Tab as highlighted in the above image.





   


    6)  After click on Advanced tab, choose Network Address as in above image and then on right hand screen enter a Hexadecimal MAC address with which you want to spoof your present MAC address

      7)   Once you have entered the MAC address, click on OK and you are done. Yes! Indeed you are done.
You have successfully spoofed your MAC address.

Check the below screenshot which shows the router settings page on which MAC filtering is Enabled.
Only PC or devices with the below mentioned MAC address will be allowed or denied as per the option chooses in the Admin settings of the router. In case your MAC address is blocked by network Admin, then you can spoof up and change your MAC address to connect and gain access to the Network resources.



Even Most of the ISP bind your Login ID and Password to your PC and in any case you want to access internet on any other PC, other than in which the MAC Address is binded by ISP, you can use this method to use internet on other devices as well. 

Many software applications which are licensed to single user single PC, is binded using MAC address and that can be reused in many PC using MAC spoofing.