Red Dragons

...

Wednesday 27 August 2014

Simple Cool Tricks With Chrome Developer Tool

 Chrome Developer Tool
As you probably know, there is a button on the right-click menu of Google Chrome and IE 10+ called ''Inspect element''. This the developer tool. And you can have a lot of fun with it. I'll give you two examples on how to use it in this tutorial.

1. Change the text of a webpage:

You can have fun on webpages just by changing the value of a <span> (a text label). For example, go on the 4shared.com site (a free file sharing site). Then create an account if you don't have one (or just connect with Google, Facebook or Twitter). When you are done, upload something that is heavy (more than 100 MB) by dragging and dropping it on the home page of 4shared. Then you can see an uploading status window on the screen. So right-click on the percentage and click on ''Inspect element''. Now you can see a little window that appears on the bottom of the web browser. There are to ways : either you got the number or you got the % symbol. If you got the number, try to find the symbol below. Then double-click on it and type what you want (Eg: '',000,000 dollars in my bank account'')

google chrome tricks

2. Get a Non-Crypted password in JS/PhP code:

Some sites are not very safe and just verify the password directly in the PhP/JS code. Then, even if it become rare, you can get the password. Just follow these steps :

  1. Find the login form on the website you want to hack
  2. Right-click on it and then click on ''Inspect element''
  3. Search on the window that appeared ''<form'' and then ''action=''
  4. After it, there is a URL, If it ends by ''.js'', just copy it and paste it in the URL bar of your browser
  5. If it ends by ''.php'', type ''view-source:'' before pasting the URL
  6. Then search something like ''password'' in the code.
WARNING: This method works better with JS than with PHP. Sometimes, there is no URL after ''action='' but just a JS function. Then you have to press Ctrl+U to see the source and search for ''password'' in the whole code.

More Tricks


Read More

Sunday 23 March 2014

3 Basic Tips to Prevent A DDoS Attack

 DDoS Attack

Distributed denial-of-service (DDoS) attacks are always in top headlines worldwide, as they are plaguing websites in banks, and virtually of almost every organization having a prominent online presence. The main cause behind the proliferation of DDoS attacks is that there is a very low-cost that the attacker has to incur to put such attack in motion. Fortunately, today various prevention methods have been developed to tackle such attacks. Before delving further into understanding about the ways to prevent DDoS attack, let’s first understand what exactly a DDoS attack is!

Understanding DDOS Attack

 DDoS Attack bot
A DDoS (distributed denial-of-service) attack is an attempt made by attackers to make computers’ resources inaccessible to its anticipated user. In order to carry out a DDOS attack the attackers never uses their own system; rather they create a network of zombie computers often called as a “Botnet” – that is a hive of computers, to incapacitate a website or a web server.

Let’s understand the basic idea! Now, the attacker notifies all the computers present on the botnet to keep in touch with a particular site or a web server, time and again. This increases traffic on the network that causes in slowing down the speed of a site for the intended users. Unfortunately, at times the traffic can be really high that could even lead to shutting a site completely.

3 Basic Tips to Prevent a DDoS Attack

There are several ways to prevent the DDOS attack; however, here in this guest post I’ll be covering three basic tips that will help you to protect your website from the DDoS attack.

1. Buy More Bandwidth.

 DDoS Attack bandwidth
One of the easiest methods is to ensure that you have sufficient bandwidth on your web. You’ll be able to tackle lots of low-scale DDOS attacks simply by buying more bandwidth so as to service the requests. How does it help? Well, distributed denial of service is a nothing more than a game of capacity. Let’s suppose you have 10,000 computer systems each distributing 1 Mbps directed towards your way. This means you’re getting 10 GB of data that is hitting your web server every second. Now, that’s causes a lot of traffic!

So to avoid such issue, you need to apply the same rule intended for normal redundancy. According to this technique, if you wish to have more web servers just multiply around diverse datacenters and next make use of load balancing. By spreading your traffic to various servers will help you balance the load and will most likely create large space adequate to handle the incessant increase in traffic.
However, there’s a problem with this method that is buying more bandwidth can be a costly affair. And as you’ll know that the current DDoS attacks are getting large, and can be a lot bigger exceeding your budget limit.

2. Opt for DDoS Mitigation Services.

A lot of network or Internet-service providers render DDoS mitigation capabilities. Look for an internet service provider having the largest DDoS protection and mitigation network, automated tools, and a pool of talented anti-DDoS technicians with the wherewithal to take action in real-time as per the varying DDoS attack characteristics. A viable alternative is to utilize a DDoS prevention appliance, which is specifically intended to discover and prevent distributed denial-of-service attacks.

3. Restricted Connectivity.

 DDoS Attack
In case you have computer systems that are connected to the web directly, a better idea is to properly install/configure your routers and firewall so as to limit the connectivity. For an instance, while receiving some data from a client machine you can only allow traffic to pass from the machine only on a few chosen ports (like HTTP, POP, SMTP etc.) via the firewall.

Wrapping Up!


Websites are largely getting attacked by hackers every second. Denial-of-service attack is insanely getting huge and is creating a lot of problems for business organizations having strong online vicinity. In this guest post you’ll not only understand what a DDoS attack actually means, but will also come to know about a few type of methods to prevent DDoS attacks. Aforementioned are three tips that I’ll recommend you to run through to at least understand where to get started towards building a resilient web network with chances of surviving a DDoS attack.

About Guest Blogger
Lucie Kruger is a tech savvy writer who works for a leading Android Applications Development Agency. You can also contact her, if you are looking forward to Hire Android App Developers
Read More

Wednesday 12 March 2014

8 Awesome Tips For Freelance Programmers

A freelance programmer can enjoy a nice career. Not only that, he or she can avoid working at a large corporation where they will have to deal with company politics and an eventual ceiling. Of course, it is not all fun and games as a well-trained and hardworking programmer should follow some basic tips if he or she wants to enjoy success in this arena. With that in mind, here are eight tips for freelance programmers.

1. Constant communication:

When taking on a project, one should communicate with the business as often as possible. This means, when speaking to the client, one should mention any road blocks or any accomplishments. With an open door policy, the programmer will have an easier time keeping clients happy and informed.

2. Educating:

While most software developers possess a lot of skills and brains, it is wise to attend more computer classes. By continuing the education, a hardworking programmer can learn more and avoid getting left behind by the competition. In fact, this is extremely important as this field is ever-evolving and new coding ideas and techniques come up all the time.

3. Do not sell yourself short:

All-too-often, an independent contractor or business owner will ask for a low wage. When doing this, one will hurt their long-term chances for success. While it is not wise to ask for top dollar, it is beneficial to demand a livable wage. Believe it or not, when dealing with a confident programmer, a company is likely to give in to the financial demands.

4. Home office:

Whether a person works from home or at the office all the time, they should still have a home office. With this, a programmer can complete tasks without interruption from spouses, children or animals. Without a doubt, this is extremely important as a serious programmer will need to concentrate on the task at hand.

5. Have website and online presence: 

Now, more than ever, a company owner or contractor should have a website and online presence. With this, a reliable software developer can reach millions of potential clients. At the same time, while making a website, one should keep it simple, straightforward and easy to understand. With this, a programmer can showcase his or her talent for the world to see.

6. Outsource quality assurance: 

It is not easy for a programmer to check out his or her programs and code. To avoid turning in a bad product, a smart developer should hire a contractor who can check out the code. By taking a few hours to go over everything, a quality assurance analyst can find any issues and report back to the programmer. This is a great idea as one mistake can result in serious problems in the short and long run.

7. Speak up:

Often, a foolish client will want an unrealistic or impractical solution. While the customer is always right, it is still beneficial if a programmer voices his or her concerns. This should not cause a lot of problems as most business owners will willingly give in as they will, usually, trust the programmer. Either way, it is wise to remain assertive when talking about the product.

8. Set schedule:

It is often tempting for a business owner to set a weird schedule or work nights and weekends. While this is okay at first, a serious programmer who wants to succeed should opt to work a typical 9-5 schedule. This allows other business owners to stay in contact and communicate with the programmer. Since most other entrepreneurs love to work 9 to 5, this is a great way to go above and beyond and offer solid customer support.

It is not easy to work as an independent software programmer. With that in mind, with a few basic tips, a developer can take his or her ideas to the next level. Remember, when focused and ready, a programmer will please his or her clients and make a nice living in the process.

About Guest Blogger
Robert Cordray is a freelance writer and expert in business and technology. He has received many accolades for his work in teaching solid entrepreneur advice.
Read More

Friday 7 March 2014

Redirect To Any Website Using Google Url

Redirect Any Website Using Google Url
Today i will show you to make google link that redirects you to any webpage you wish. This url will start with www.google.com and followed with some characters and symbols. You can trick users to visit your site by changing your webpage url that look like google. As no one will doubt google. So lets get in to.

Working Demo

Visiting the below link you will be redirected to www.coolhackingtrick.com
https://google.com/url?q=%68%74%74%70%3a%2f%2f%63%6f%6f%6c%68%
61%63%6b%69%6e%67%74%72%69%63%6b%2e%63%6f
%6d&ei=AyQZU6rUAYLChAfagIHgCQ&sa=X&oi=
unauthorizedredirect&ct=targetlink&ust=1394158347029455&
usg=AFQjCNF6M9TeMcIyrfeoCrYSHXyGWuO85w

How To Redirect Any Site From Google ?

1. Go to Google Redirect Exploit
2. Enter Your Url in the input box as shown below
Redirect Any Website Using Google Url
3. After entering the url click on submit and Google's url will be generated in the textarea as show below.
Redirect Any Website Using Google Url

4. Now you can use that url and upon visiting that url you will be redirected to your site.

More Cool Google Tricks

Read More

Sunday 2 March 2014

Computer Hacking in the New Age, All you Need to Know about Hacking Today

Every human discovery has pros and cons, so is the computer which has pervaded all our lives. The modern humanity is increasingly dependent on computer for various day-to-day activities. Computers do us a whole lot of good things, but it is not without some pitfalls. With the extensive use of internet for hundreds of our needs, computer opens a vicious cycle of hackers. Computer hacking is a term which refers to an individual’s illegal and unauthorized access to the data which are stored in a user’s system. This is done to disturb the confidentiality and security of the user’s computer.


The hackers focus on individuals’ computer system when they are online. As long as you are not connected to internet you are less prone to hacking. The access to internet has actually made computer hacking easy. You must protect your computer with strong antivirus and firewall programs to keep hackers away. Hackers are known for creating problems which are difficult to solve. This gives a good business to computer investigators and technicians. Hacking can be done in lots of ways. Few of them are given below:
  • Worms: These are the programs which propagate through networks.
  • Trojans: These are hidden in websites, attached files and emails.
  • Viruses: These attach themselves to various kinds of files. They can damage certain functions of your computer.
Hackers also crash on wireless networks which do not have firewall installed and enabled. They can also send email attachments with malicious software which get embedded on the victim’s computer. Hackers attack accounts which have weak passwords. All these are done to get access to confidential and sensitive information of the users. Whatever is the method of hacking, the effect is harmful for the user. Your system will be flooded with viruses, malwares which steal your information. In order to avoid hacking one has to make sure that the systems at home or office have the latest anti-virus program and firewall installed and enabled. These programs need to be regularly updated. Use the latest browser and scan your computer on a regular basis.

New Age...

The New Age of internet has brought with it many risk factors along with umpteen advantages. The New Age is the time where our personal lives are no longer very personal, but people are able to access personal information of internet users from various sources in the virtual world. We need to be careful about usernames and passwords, else it will lead to dangerous consequences. Universities, large companies and government agencies are mostly targeted by hackers simply because of the bulk of information they handle. The great newspapers like The Wall Street Journal and The New York Times were also targeted by hackers.

Computer hackers are people who gain remote access to information stored in a system elsewhere. During the 1950s and 60s hackers were more drawn towards learning the operations of a computer rather than stealing confidential information of a remote user. Unlike the olden days, now computer hacking has become more sophisticated and organized. In the late 1990s hackers tried to get access to files in the network of Pentagon. Some more expert hackers gained access to the patent files at the Indiana University School of Medicine in February 2003. Many hackers were sentenced in the history since hacking represents a potential national security threat.

Viruses

One major tool hackers use to steal information from computer systems is the use of viruses. Over the years the number of viruses has increased drastically. The virtual world now has above 100000 viruses and the number grows virtually every day. Apart from the threat the computer hackers pose, they also can be beneficial in one way. They can bring to light the flaws in a computer network. Hackers can help in redesigning the system and in making information inaccessible to illegal users and to unauthorized access.

Getting Administrative Access

Getting a log in password is one of the predominant ways to get access to a computer which is by the side of the hacker. Getting remote access to a computer is another way to hack a system. Managing to crack a Wi-Fi password is the third method of sneaking into someone else’s system. Hacking if done on a public or school computer will have serious consequences. The hacker will be put behind the bars for illegally accessing the computer which does not belong to him or her.


I am Ronnie Custer and I am intended on writing academic cases for the past several years that are assisted me to gain knowledge in writing grading assignments for all sorts of students. I have worked in different service based essay writing company in various writing industry.
Read More

Tuesday 25 February 2014

Build Your Own Games, Become A Programmer

game programming

Video games are a blast to play!  Wouldn’t it be great to have a part in creating them?  But where do you start?  For a gamer, being able to take part in creating games would be like a dream come true. Let’s look at a few facts about the gaming industry.  In 2012, the gaming industry accounted for $20.77 billion in revenue including hardware, software and accessories.  Most of these companies were based in the United States.  More detailed information can be found here.

So, we have an enormously large industry and most of it is located right here in the United States.  There is no reason why a person with the desire and discipline cannot make their dream job a reality!

The following are some steps to help get you out on the path to your future in gaming.  The best part is that most of these options are free.  But do require some discipline and effort... and practice, practice, practice!

Be informed, educate yourself

educate yourself
There are some major sources of information online regarding the gaming industry.  Become involved with these websites. join in on discussions in the forums and even try to contact individuals from the forums that seem willing to be helpful to newcomers.  These sources can be invaluable in learning what trainings and skills are a must for someone to become a professional.  A few industry online publications are Gameslice and Gamasutra.

Determine what skills and knowledge you now possess

GATHER INFORMATION
Begin gathering information about the types of games you wish to program.  Having a firm grasp on the games you like to play and programming languages that were used to make those games will begin to steer you in the direction you need to go.  Programming, also known as coding, can be difficult in the beginning.  Luckily there are many web sites on the internet that offer free learning tutorials for beginners in any language you can imagine.  It is recommended to start with some of these free tutorials just to get your feet wet and get you used to the vocabulary of the industry. Check out below article to learn programming.

Get to know commercially available game engines

game engines
Most games have a game engine.  The game engine is kind of like the foundation that the code works with to create the desired effect within the game.  Most of these are available freely either with a game or can be downloaded.  You may have heard of some of them:  Unreal, Crysis, Source, FrostBite and Creation are just a few of the larger ones.  Discover which game engine your favorite games run on and play with the engine yourself.

Take a Coding Class

This is where it all begins to get real.  You need some official coding classes.  As a starter, consider a course in DarkBasic.  DarkBasic is one of the most recommended beginner languages.  At this point you should also consider taking a course in Microsoft Visual Basic.  A good knowledge of Visual Basic will provide you with the understanding of how code works with Windows operating systems.  There are numerous schools whose sole focus is coding.  Research the ones who are interested in and to go back to the forums, or individuals you met there and ask their opinions.  Then make your decision and register for the classes.

Develop a problem-solving attitude

problem solving
It cannot be stated more strongly how important a problem-solving attitude can be in game development.  You really have to love solving problems.  The larger part of coding is developing the code itself.  The second largest part of coding is solving all of the problems with the initial code that you developed.  You will be spending a large portion of your time resolving problems in your code...  So having a problem-solving attitude is crucial to your future career.

About Guest Blogger
Robert Cordray is a freelance writer and expert in business and technology. He has received many accolades for his work in teaching solid entrepreneur advice.
Read More

Wednesday 19 February 2014

Downloading Torrent Using Internet Download Manager

Downloading Torrent Using Internet Download Manager
Hello friends, today i will show you the way to download torrents with Internet Download Manager. Torrent is tiny file with .torrent extension which allows you to download huge amount of data. We use torrents to download various stuffs like movies, games, software package and plenty of different things. you'll transfer torrents from several website.  The transfer speed for torrents depends on seeds it has. It will make difficult for you to download files with very low or no seed counts. However with the assistance of this trick you'll be able to download torrent file with IDM. This tool can be really helpfull when you want to download file that has very low seeds. IDM is the quickest file transfer manager on the internet market. So lets begin!

How To Transfer Torrent With IDM

1. First download the torrent file with .torrent extension which you wish to download from the internet directly without any torrent client like utorrent.
Downloading Torrent Using Internet Download Manager

2. Now open zbigz.com and you will land on its homepage.
3. Then Click on upload Torrent and browse your torrent to transfer and click on Go.
4. Then it will ask you for Free or Premium service, choose Free to proceed further.
5. It will take some time to cache your file. Once the caching is done, click on transfer button to download your file as shown below.
Downloading Torrent Using Internet Download Manager
6. You should have internet download manager installed on your computer so that download start inside IDM. If you don't have IDM don't worry it will download directly.

Note: If you decide on to use Free transfer then you wont be able to transfer file of more then 1 GB 

More Awesome Tutorial

About Guest Blogger
Vikrant Thakur is a computer science student from Himachal Pradesh in India. He loves to share his knowledge of computer and web technology with other. Connect with him on Facebook
Read More