Tuesday, July 14, 2015

How to Delete OR Format files unrecoverable way

Today probably every computer user know and used to get use of a recovery software to recover deleted files and folders. Those softwares are very useful when we delete some important files let's say you have a photograph that only in your PC and you've mistakenly deleted it. So then recovery software is like came from heaven. But on the other hand think you formatted your hard disk and you sold it out. And the photograph that you're bothered should be a very private one. And the guy who got your PC recover your hard disk from the same manner that you recovered your photograph. So he got your photographs and what do you think he will gonna do with it.

The most important thing with data is private and confidential which are deserved. So when we come to the point of data confidential, data recovery becomes very critical. So let's look how to remove a file forever and ever.

First we will look how files can be recovered. Actually any data on a disk / flash drive cannot be erase like you erase pencil marks on a book. When the data have written on the disk they last forever. Then you may ask "If files cannot be deleted what are we do by deleting files?". You may know File Allocation Table (FAT). (If you want to get some idea of file allocation table and what is file system means look What are File Systems). File Allocation Table has links to data on the disk with files names , attribs ,... So when we have deleted a file , actually its deleted from this FAT table. It's remove the link to the data on the disk from the label of the file. But on the disk the real data (ones and zeros) are exist and they will remain until we over write some data on top of it. The data recovery software is doing , scan for those data on the hard disk. Some times you may have seen when we scan hard / flash drive from a recovery software some file indicate as unrecoverable. Those are files which are over written by other data. When data is over written they cannot be recoverable. There is a phrase "Data cannot be deleted but can be over written".

Monday, July 6, 2015

Windows Hacking Tool INTERCEPTER


There are several windows based hacking tools very useful for day to day hackings. Intercepter is also one of that. There is a linux version also. Any way let's take look at this handy tool.

Below picture is the over look of the Intercepter.


Saturday, July 4, 2015

What are File Systems and How to Open Linux Partitions in Windows


What are file systems?

As simply it is the system of Writing or Retrieving our data on/from a disk or flash drive or any other storage media in systematic way. If there is no file system, a hard drive will be only a disk with ones and zeros that can not be read by a computer because there is no way to find the data position.

Let's assume a Library with thousands of books. Normally in a library it has sections. like Science, History, Fictions, Novels etc. And in a particular section also there may be categorized sub section like Bio science, Electronic Science, Computer Science in Science section. In a particular sub section there may have a Rack or Racks with Rows and columns numbered which a particular cell get a unique combination. In a particular cell there may have 5 books. The librarian has a table of every book of the library describes in which section's in which sub section's in which rack's and in which cell is the book placed.

So if we go to this library and ask from the librarian about a book of "Beginning for Electronic circuits" she/he may look at the table and go through Science section and in Electronic sub section and find the book and locating where is the cell. So librarian will say to you "son, go to science section and then in electronic sub section.Then go to 3rd rack's AZ cell. The book you are finding is there.". So you can find the cell and get the book easily.

Thursday, July 2, 2015

IP and Packet Spoofing tools


IP Spoofing Attack Tool List

If you want to see full detail of IP Spoofing, please go to the Source.
Services vulnerable to IP spoofing
Configurations and services that are vulnerable to IP spoofing:

  •     RPC (Remote Procedure Call services)
  •     Any service that uses IP address authentication
  •     The X Window System
  •     The R services suite

Most popular tools used to modify packet headers:
Tools – For Windows