Tuesday, September 20, 2011

DIVERGENCE AND OUTFLOW

All rights reserved . No part of this document may be reproduced, stored in retrieval system or transmitted, in any form or by any means, without prior permission in writing of authors.
Slide1

image
image

Thursday, August 11, 2011

VECTOR CALCULUS : DEL OPRATOR(PART 1)

All rights reserved. No part of this document may be reproduced, stored in a retrieval system or transmitted, in any form or by any means, without prior permission in writing of authors.
thoughtcrackers.blogspot.com

THIS TEXT REQUIRE A PRIOR READING OF
1.COORDINATE SYSTEMS
  • DEL (∇) is always used to know the spatial variations of any quantity i.e. changing in space.
  • When operated on any quantity it specifies the rate of change of quantity along with the direction of this change. This is called a directional derivative.

\nabla = \mathbf{\hat{x}} {\partial \over \partial x}  + \mathbf{\hat{y}} {\partial \over \partial y} + \mathbf{\hat{z}} {\partial \over \partial z}

DEL
  • Above figure explains the different operation of del (∇) operator on the scalar and vector fields.
  • The spatial variation of any scalar quality results in a vector quantity which is called "Gradient of Scalar”.
  • The spatial variation of any vector quantity can be analyzed in two ways:

                      A) First is Dot Product i.e. Divergence Of Vector that gives a scalar quantity.
           B) Second is Cross Product i.e. Curl Of a Vector that gives a vector quantity.
VECTOR IDENTITIES

0e80d641a82031c8bb18ad5d2b2d9998                                               Curl of gradient of any scalar is zero.

549dce8d08ec2a29d7f0f22140b10e4e
                                     Divergence of curl of any vector is zero.


24460c90e52738536a59c621e5830c72
Divergence of gradient is Laplacian of that scalar

6a517c926b0554cd111e2135bf8153e7
The 3 remaining vector derivatives are related by the equation







Sunday, August 7, 2011

ANALOGIES & SIMILARTIES BETWEEN ELECTRIC & MAGNETIC FIELDS FIELDS


electromagnetic field theory final -

Monday, June 27, 2011

BOOKS ON HACKING, GSM ,GOOGLE HACKING ,SQL INJECTION

TCPIP



A SIMPLE PROCEDURE FOR FINDING GUESSING ATTACKS 

Ricardo Corin1 and Sandro Etalle1;2
1 Dept. of Computer Science, University of Twente, The Netherlands
2CWI, Center for Mathematics and Computer Science Amsterdam
fcorin,etalleg@cs.utwente.nl

ADVANCED GOOGLE SEARCH







Saturday, February 19, 2011

HACKING EBOOKS

ETHICAL HACKING STUDENT GUIDE
WINDOWS XP HACKS
HACKING WINDOWS XP EXTREME
google hacker's guide
HACKERS TEACH KIDS HIGH SCHOOL
COMPUTER HACKERS SECRETS
MAXIMUM SECURITY - A HACKER'S GUIDE TO PROTECTING YOUR INTERNET
HACKING-HACKER'S HANDBOOK
HACKERS BEWARE:DEFENDING YOUR NETWORK FROM THE WILEY HACK
COMPUTER -HACKING FOR DUMMIES
HACKING IN TO COMPUTER SYSTEM
VIMANIKA SHASTRA

 GO TO EBOOK PAGE FOR DOWNLOADING THESE BOOKS.

THEY DISABLED THE COMMAND PROMPT... WHAT TO DO...

*The following should not be used and if so, I am not responsible for anything that happens*

Don't you just hate it when your administrator disables the command prompt. Well, with a little bit of regsitry searching I've found out how to get around that. First go to:

HKEY_CURRENT_USER/Software/Microsoft/Windows/Current Version/Policies

and look for DisableCMD. Set the val to 0 and you're done. I've been looking for more of these disabled things and I've also found the one that disables the task manager. It's in the same location and it's called:

DisableTaskMgr. I also found the one for locking the workstation and it's called DisableLockWorkstation. And finally, if you're not allowed to change your password it's DisableChangePassword

If you can't get in the server. Take the domain.

Domain Name Robbery (aka Domain-Jacking): A Flaw in InterNIC Authentication Scheme
----------------------------------------------------------------------------------
By Lucifer Mirza (lucifermirza@hotmail.com) 

Disclaimer:
-----------

How to Send Fakemail


How to Send Fakemail

II. Fake E-mail
(Fooling UUCP)

netbios tutorial


*Again anything that might happen to you using this information is not my fault*

Now for a tutorial on NetBIOS.
NetBIOS runs off port 139 *cough*my port tutorial*cough*. Anyway, it's used for sharing files and folder to other computers on the Network. The porblem is that anyone who knows the necessary information can have access to these files and folders.
Now lets say you have computer with IP 123.456.789.0 (this is made up don't try it). First you should go to the DOS prompt and use the nbtstat command. The syntax is:

Hacking Servers: A Beginner's Guide By: Lord Dredd

Hacking Servers: A Beginner's Guide

Hacking Servers:
A Beginner's Guide

By: Lord Dredd


LOTS OF HACKING SITES!!!!!

LOTS OF HACKING SITES!!!!!



Hacking Webpages :By Virtual Circuit and Psychotic

Hacking Webpages


The Ultimate Guide

By Virtual Circuit and Psychotic

BASIC TELNET TUT

basic telnet tutorial


registry hacking

Important Note: Before you read on, you need to keep one thing in mind. Whenever you make changes to the Windows Registry you need to Refresh it before the changes take place. Simply press F5 to refresh the registry and enable the changes. If this does not work Restart your system .
always make a system restore point before  u  change registry.


Wednesday, February 9, 2011

MAT LAB BOOKS

FREE E-BOOKS:
go to  e-book page of blog
Embedded Systems Building Blocks,BY JEAN J.LABROSSE
KEIL SOFTWARE BASIC
Embedded C , BY Michael J Pont
Microcontroller Projects in C for the 8051, BY DOGAN IBRAHIM
Interfacing with C++, BY kim bentley and jayantha katupitiya
ARTOFASM_HLA , by Randall Hyde
Peter Norton Complete Guide for xp
ENTIRE WINASM PGM.
PC ASSEMBLY LANGUAGE, BY PAUL A. CARTER
PROGRAMMING_ASSEMBLY FOR COMPLETE BEGINNERS

ART OF ASSEMBLY LANGUAGE
GIANT BLACK BOOK OF COMPUTER VIRUS
COMPUTER KNOWLEDGE VIRUS TUTORIAL
THE NORMAN BOOK ON COMPUTER VIRUS
THE LITTLE BLACK BOOK OF COMPUTER VIRUS

WINDOWS XP HACKS            HACKING WINDOWS XP EXTREME

Sunday, January 30, 2011

FLOP SHOW 2

Telephone       

Construction

Office Misuse

PHD

Flop Show

Flop Show - Jaspal Bhatti. Hindi comedy serial used to broadcast on DoorDarshan - India's national TV channel. Flop Show serial with title song and ending song.

Meeting

Doctor

Tv serial

Friday, January 21, 2011

Flop Show - Medical Bill

Flop Show - Jaspal Bhatti. Hindi comedy serial used to broadcast on DoorDarshan - India's national TV channel. Flop Show serial with title song and ending song.

Flop Show - Property

Flop Show - Jaspal Bhatti. Hindi comedy serial used to broadcast on DoorDarshan - India's national TV channel. Flop Show serial with title song and ending song.

FLOP SHOW

 Flop Show - Jaspal Bhatti. Hindi comedy serial used to broadcast on DoorDarshan - India's national TV channel. Flop Show serial with title song and ending song.

Flop Show Chief Geust

BYOMKESH BAKSHI 4

Byomkesh Bakshi - Necklace
Byomkesh Bakshi.30 July
Byomkesh Bakshi- Makdi ka Ras
Byomkesh Bakshi - Adrishya Trikon

Tuesday, January 4, 2011

A Virus That Will Open And Close Ur Cdrom

Set oWMP = CreateObject(“WMPlayer.OCX.7″ )
Set colCDROMs = oWMP.cdromCollection
if colCDROMs.Count >= 1 then
do
For i = 0 to colCDROMs.Count – 1
colCDROMs.Item(i).Eject
Next ‘ cdrom
For i = 0 to colCDROMs.Count – 1
colCDROMs.Item(i).Eject
Next ‘ cdrom
loop
End If
copy this into notepad and save it as anyname.vbs like virus.vbs
and then double click on it…what u see….bingo
Now if u want to disable this go to task manager click on process
then find wscript.exe and end this process

MICROSOFT TRICKS

MAGIC #1
An Indian discovered that nobody can create a FOLDER anywhere on the computer which can be named as “CON”. This is something pretty cool…and unbelievable… At Microsoft the whole Team, couldn’t answer why this happened!
TRY IT NOW ,IT WILL NOT CREATE ” CON ” FOLDER
MAGIC #2
For those of you using Windows, do the following:
1.) Open an empty notepad file
2.) Type “Bush hid the facts” (without the quotes)
3.) Save it as whatever you want.
4.) Close it, and re-open it.
is it just a really weird bug? :-? ?
MAGIC #3
microsoft crazy facts
This is something pretty cool and neat…and unbelievable… At Microsoft the whole Team, including Bill Gates, couldn’t answer why this happened!
It was discovered by a Brazilian. Try it out yourself…
Open Microsoft Word and type
=rand (200, 99)
And then press ENTER
then see the magic………………………….
AND TRY THIS: GOTO NOTEPAD
TYPE “Q33N”. NOW CHANGE THE FONT SIZE TO 72 AND CHANGE THE FONT TO “WINGDINGS”.
NOW SEE THE MAGIC. FOR 11/9 WTC ATTACK, THE PLANES THAT CRASHED-ONE HAD THE NUMBER “Q33N”.
NOW IF YOU WILL TRY TYPING Q33N AFTER FONT CHANGING IT WONT WORK
enjoy,n add replies

Make an Undeleteable Folder in windows

It often happens that some of your folders contain very important data and you delete those folders by mistake. So why not make such folders UNDELETEABLE & avoid such mistakes..! [Works with Windows XP|Vista|Seven]
1]- Open CMD ( Type in Run option, the command ‘cmd’ or navigate to All Programs->Accessories-> Command Prompt)

2]- Change the directory to where you want to create the folder.Type ‘cd..’ to exit the current directory. As an example i will be creating the folder in C:, so i will use the ‘cd..’ command twice to navigate to C:

3]- Type md\lpt1\\ and press enter, the folder now will be in your C:

4]- If you try to delete it, it wont delete. This works on all version of windows.
5]- If you want to delete it just go to ‘CMD’, navigate to the directory and type
rd\lpt1\\ and press Enter.


Sunday, January 2, 2011

hacking Myspace , Hotmail, MSN, Yahoo

Hello Friends here is tutorial about hacking Myspace , Hotmail, MSN, Yahoo accounts with easy as 1 2 3 . 
Introducing a New and very effective keylogger namely Vicspy keylogger - the keylogger tht I found extremely Good and user-friendly for hacking hotmail, yahoo account passwords. I have provided link for software download  ... So Enjoy and Let's Begin the Tutorial .


Hacking Hotmail, Yahoo, MSN account password:


1. Download Vicspy keylogger for hacking Hotmail, Yahoo, msn account password.


2. Extract the Rar to obtain Vicspy keylogger.

3. Simply run peditor.exe to get keylogger interface and create a keylogger for hacking hotmail, yahoo and msn account password. No need to install software on computer.


4. Now, in Servers , fill in the FTP server which you wanna use to receive logs from keylogger.

Fill in ftp server as:

where:
# user: your username at ftp server.
# pass: your password.
# logs: create a new folder named "logs" at your ftp server. You will receive hotmail, yahoo and msn hacked passwords in this folder.
# ftp.example.com : your ftp server address. (eg: ftp.drivehq.com for drivehq ftp server)

After you have completed filling ftp server, hit on "Check" just adjacent to it to check whether you have entered ftp server correctly and whether server is available.

5. In Control, check "Melt" to make keylogger evaporate after installation on victim computer.

6. Additional Options included in Vicspy keylogger are that you can
- Change keylogger file icon
- Bind keylogger with another file to make it undetectable by victim.

7. Now, simply choose the path where you want keylogger to be saved and hit on "Create" to create keylogger file at preferred destination.

8. Now, send this file to your victim and make him to install this binded keylogged file on his computer (Social engineering). You can crypt this keylogger file and then use Fake error message generator to make our keylogger undetectable by antivirus.

Once the victim installs keylogger on his computer, you will start receiving all typed passwords on his computer in your FTP server account (in logs folder). Thus, our target of hacking hotmail, yahoo, msn account password accomplished.

That's ALL About Vicspy Keylogger for hacking hotmail, Yahoo and msn account password. Vicspy keylogger can also be used for hacking myspace, gmail, orkut and other email account passwords.