Showing posts with label technology. Show all posts
Showing posts with label technology. Show all posts

Monday, 13 January 2014

BMW and Samsung aggroup up with Galaxy Mechanism smartwatch that talks to your i3


Without a dubiousness, the most amazing thing that BMW showed at CES this period was a driverless M235i vagabond flawlessly around a wet extract at Las Vegas Speedway. Notwithstanding, that bit of robotic helmsmanship wasn't the exclusive twist the European associate had up its sleeve. Or, writer to the component, on its wrist.

Taking a author from competition Mercedes-Benz, BMW demonstrated how a "smartwatch," in this circumstance the Samsung Assemblage Adapt, could be made to answer usefully with a vehicle, in this slip the BMW i3. Business it a "explore programme," BMW showed off its BMW i Remote App on the Aggregation Appurtenances; the app gives information roughly land of battery intrust, gettable comprise and whether or not all the doors and windows are stoppered or open. Perhaps more expedient noneffervescent, the view can be utilized to channel a instruction to the i3's pilotage discern voice commands. Nifty personalty, if not world-shaking, that could provide tech-obsessed opulence buyers construe a merchandise countenance at the upcoming BMW EV.

Assert a reliever looking at the view in action beneath, or scan thru the BMW push exude.


Tuesday, 7 January 2014

College Students and Their Smartphones Relationship



College students are not only good grades concerned and find the best parties. More than ever, is used to navigate your life on campus.

On the bus, waiting in line, in bed, on tape, and even while driving, students do not seem to drop their phones. Fifty-two percent say they check their mobile phones before they get out of bed in the morning, according to a study. Nearly half do this at night in bed before going to bed.

Thirty-five percent say they sometimes stayed with his cell phone while driving, but at a red light, and nearly 20% say they sometimes use them, while the wheels are still moving. But all is not addictive and dangerous. Forty-five percent of college students say that smartphones often helps with homework, and 46% say they are often useful for work-related tasks.

Internet platform for education and drew from these data sources, including the Pew Internet & American Life Project, University of Colorado and Nielsen, to produce the next.

Other notable results: the students used more than any other device, it has almost taken as the most popular
application for mobile devices among students and nearly half of students use their phones for check the time.

Watch the full video below for more information and let us know in the comments – think smartphones to do more to distract or to help college students?

Friday, 3 January 2014

Download Facebook Messenger For Windows 8 A New Gift From Facebook




Good news for Facebook lovers who likes to chat with their facebook friends all the time. Facebook have introduced messenger for windows 8. So now you can install facebook messenger in your windows 8 operating system and chat with your friends without going to facebook.com.

To install Facebook messenger in your windows computer, visit http://www.facebook.com/about/messenger and click on Install Now button. It will download a 482 kb setup file. Click on that setup file once downloaded and it will start the installation process.


 
Within few minutes depending on your internet speed, the facebook messenger will be installed in your system, which upon installation will open the login window as shown below. Enter your facebook login credential and login to your facebook chat messenger.

Facebook messenger is having one beautiful feature i.e. docking the chat messenger to the right of the screen, see the button at right most bottom corner. Using Facebook messenger you can work and chat simultaneously. You can see the facebook ticker and “who is online” in this messenger. It’s same as facebook default right side bar.

You can also see the notifications, new message and new friend request alerts time to time on the top of the messenger and upon clicking it will open the web link in your default browser.
Facebook chat messenger is also similar to any other chat messenger but docking feature makes it on the top of all messengers. I am sure you will like this facebook messenger for windows.

Note: Facebook Chat Messenger only supports windows 8 users as they don’t support windows XP but they are working for windows vista and windows 7.

Monday, 7 January 2013

Samsung ATIV Tablet Reviews


  
We remembers writing Intel and telling them that, from a tablet perspective, the Windows 8 launch might as well have been a Windows RT launch. By the time October 23rd rolled around, the only Windows tablets we had in for review were ARM based and running Windows RT. I even resorted to borrowing an unfinished Clover Trail tablet just so we’d have something to put Surface RT’s performance in perspective at launch.

Clover Trail was late by about a month to the Windows 8 launch. Most of the traditional PC partners were delayed either by Intel or by burdens of their own. As much as we wished Surface RT would’ve launched with a different SoC, truth be told I don’t know that anyone else outside of NVIDIA could’ve met the aggressive schedule that Microsoft set. Qualcomm and TI were both design partners working on Windows RT devices, but neither of them had solutions available at launch.

The ATIV Tab weighs in at 572g compared to 688g for Surface RT, it’s around the same weight as the Acer W510 we reviewed a couple of weeks ago. The light weight means carrying it around is quite pleasant. And despite the plastic construction, build quality is solid


On the storage side there's either a 32GB or 64GB eMMC solution soldered down on the board. Remember that Windows RT comes preinstalled with a full version of Office 2013 Home & Student Edition. After Samsung's preinstalled apps a 32GB ATIV Tab shows up with around 14.1GB of free space.

Like the Clover Trail version, the ATIV Tab is littered with plastic doors over nearly every port around the perimeter of the device. Along the top the micro HDMI and full USB 2.0 port are behind a door, as is the microSD card slot.

There are a pair of reasonably loud (for a tablet) stereo speakers that border the display, while front (1.9MP) and rear (5MP) cameras complete the package for Samsung.


Thursday, 4 October 2012

Google Launches Google Tag Manager

If you’ve ever worked on a client site and had to add conversion code from Adwords into a template but only when that template was displayed with certain criteria, you know the headaches of tagging pages!
Tags are tiny bits of website code that can help provide useful insights, but they can also cause challenges. Too many tags can make sites slow and clunky; incorrectly applied tags can distort your measurement; and it can be time-consuming for the IT department or webmaster team to add new tags—leading to lost time, lost data, and lost conversions.
Today, Google announced Google Tag Manager. This is a tool that’s going to make tagging pages so much easier for everyone!







Google Tag Manager features as listed on their site:
  • Marketing agility – You can launch new tags with just a few clicks. This means remarketing and other data-driven programs are finally in your hands; no more waiting weeks (or months) for website code updates—and missing valuable marketing and sales opportunities in the process.
  • Dependable data – Google Tag Manager’s easy-to-use error checking and speedy tag loading mean you’ll always know that every tag works. Being able to collect reliable data from your entire website and all your domains means more knowledgeable decisions and better campaign execution.
  • Quick and easy – Google Tag Manager is quick, intuitive, and designed to let marketers add or change tags whenever they want, while also giving their IT and webmaster colleagues confidence that the site is running smoothly—and loading quickly—so that your users are never left hanging.

Friday, 20 July 2012

Microsoft appears on track for autumn Windows 8




Microsoft Corp. is to start on the path of its new operating system Windows 8 in time for shopping in the U.S. major holiday after I leave a “project” of the new code available for download on Thursday.
Windows 8 is the latest flagship product, which is still almost half of the benefits of increased global software company. This is the first version that will run on tablet PCs, and deploying Microsoft challenge for the iPad.
“Think Progress, Microsoft gives me that Windows 8 will be available in time for Christmas this year,” said David Johnson, an analyst at Forrester technology research firm. “I use the preview of the consumer for several weeks, and even s it is obvious that a finished work is necessary, is stable and reliable. “
Microsoft’s latest design is similar to what uses the software vendor to complete a “release candidate”, ie the product name is almost. The next step is the “release to manufacturing” (RTM), when Microsoft provides the code to PC makers like HP, Dell and Lenovo to install on new PCs, laptops and tablets.
Based on the timing of Windows 7 three years ago, Microsoft is on track to complete the release in October or November, when the machines are running, will be available in stores. The company has never been a fixed date in the release of Windows 8, but says he will have a new system every three years. Windows 7 was released in October 2009.
“Ultimately our partners will determine if their computers are available on the market,” said Steven Sinofsky, the unit responsible for Microsoft Windows, in a blog on the website of the company.
“If the feedback and telemetry on Windows 8 and Windows RT (the version with tablet) to our expectations, then we will enter the final phases of the RTM process in about two months. If we succeed, then we follow our common goal that PCs with Windows 8 and Windows is available RT for the holidays. “
To avoid, in the meantime, a decline in PC sales, Microsoft said Thursday that customers buying PCs with Windows 7 by January 31 can get an upgrade to Windows 8 Pro for $ 14.99

Monday, 16 July 2012

Lamborghini Aventador

The technology package for the Lamborghini LP700-4 Aventador is absolutely remarkable. It is based on an innovative monocoque made from carbon fiber that combines lightweight performance with maximum rigidity and safety based.


The new twelve-cylinder 0.5-liter six and 515 kW / 700 hp meet the ultimate pleasure with amazing high-rpm torque at low revs. With a dry weight of just 1575 kg (3472 pounds), which is extremely low for this class of vehicle, the power to weight only 2.25 kg per hp (4.96 pounds / hp).


It is extreme in the design and execution, uncompromising in its standards and technology, and certainly in the Italian style and sophistication. technical excellence and dynamic Usually Aventador LP700-4 Lamborghini also in the super sports car racing worldwide. “


Gmail Account Security Tips-Sign Out From Other Computer Delete All Session

Gmail Account Security Tips-Sign Out From Other Computer Delete All Session

Suppose there is a case when you forgot to sign out your gmail account from public computer and came back to your home. If that public place is Cyber cafe then any one can access your account. There may be different cases for which this tutorial will help you a lot.
Case 1: Suppose you want to see who all are currently logged into your gmail account.
Case 2: Or, If you want to see your last few login or session details with IP Address and location.
So, If you have internet connection at your home or nearest friend’s room then you can sign out your gmail account from all other locations, like public computer as told in the starting.
Just login to your gmail account and scroll down to the bottom of the page. You will find this message. In first image, it is shown that the last activity on this account was 8 min ago and also it is not opened on any other place. If this is the case then you dont have to worry because your session on that computer is automatically deleted.

But if you are getting a message like the following screenshot where it is mentioned that the current account is opened at 1 different location then this is the real problem for you. So you need to log out your gmail account as soon as possible because no body knows who is using your email account.


So, If you have got an internet connection then to sign out remotely login to your gmail and go to the button of the page and click on details link as shown in above screenshot. Once you have clicked on details link then it will open a popup and will show you the recently login history with location and their IP address.

Just click on sign out all other sessions button and it will delete all your sessions from all other computers. By this way, you can save your account from other users. If you have faced this situation then don’t forget to change your gmail password after doing this step.

Thursday, 12 July 2012

60+ Events in Business, Advertising and Social Media

Do you want to optimize their network and knowledge in your industry? Next, check the collection of more than 60 events in the new board of Mashable events. Our list represents the best business conferences and exhibitions targeted digitally in the coming months, these major events held in the world and the agenda, even online, dynamic and entertaining inspires you.
[More on Mashable: Digital Power Can peer pressure of his training]
We regularly publish new offers, and every week we bring five new events that are worth the ticket price. Remember, our board of events for networking opportunities freshest, conferences and exhibitions to broaden your mind and you go to great ideas for your business.
Company
FailCon
[More on Mashable: Get the most out of New Bitly]
Date: 22/10/2012 Location: San Francisco
FailCon the fourth year has to do with bankrupt companies and commissioning. The conference, a day with the consequences (and benefits) of failure in all areas of business, from idea to commercialization. Speakers explain their professional failures and how the public the best way to learn from them. Advance tickets are available now, and meetings will be held this year in France, Brazil and Sydney, Australia.
GROW 2012
Date: 22/08/2012 to 23/08/2012 Location: Vancouver, Canada
The founder of Modcloth, 99designs Zendesk and speak at the annual meeting of Dealmaker Media business, e GROW 2012 The three-day event is divided into three segments: the event on Wednesday talks growth is a training ground for entrepreneurs, while the formal sector focuses GROW conference on Thursday to focus on established businesses and trends, and Friday from GROW outdoor adventure is full of activities including hiking, biking and kayaking.
IStrategy Melbourne
Date: 13/11/2012 to 14/11/2012 Location: Melbourne, Australia
The final conference of the World Conference Visit massive IStrategy and the fourth session of the series of world conferences in Australia, Melbourne will IStrategy experts in social media, display advertising, SEO and e-commerce, among other topics. Conference titles multiple strategy sessions, master classes and interactive workshops and numerous networking sessions included. Buy your tickets now and get 40% discount on your fare.
Dev & Design
Is DESIGN and ESC Boston 2012
Date: 17/09/2012 to 20/09/2012 Location: Boston
Design This is an educational event for engineering, five summits factory specialized exhibition and theater sessions. Organized by UBM Electronics, the biggest event of the Summit of ESC Boston is broad and covers the tasks of design and development in the field of electrical engineering. Enter the code “MASH30″ for a 30% discount on the entrance between June 24 and July 12.
Social Media
Social Media Optimization Summit
Date: 09/08/2012 to 09/09/2012 Location: Las Vegas
Social Media Optimization Summit is a two-day event that focuses on the implementation of education and streamline the operations of media companies. Participants can provide their workshop on “curriculum” for all day-workshops, half day or two hours in social media to fit. This series includes an intensive optimization of Facebook and other digital distribution strategies. The complete schedule and ticket sales open shortly.

Scientology

Scientology is a body of beliefs and related practices created by L. Hubbard Ronald (1911-1986), from 1952, as successor to his earlier self-help system, Dianetics. Hubbard characterized Scientology as a religion, and in 1953 joined the Church of Scientology in Camden, New Jersey.


Scientology teaches that man, immortal beings who have forgotten their true nature. His method of spiritual healing is a form of advice audit, where doctors want me to traumatic events or conscious experience of your painful past to get rid of limiting effects are known. study materials and courses audit are available to members in exchange for donations. Scientology is legally tax-exempt religion in the United States and other countries recognized and the Church of Scientology says this as evidence that the true religion. In other countries, including Canada, France, Germany and Great Britain has no comparable Scientology religious status.

Many organizations monitor the implementation of Scientology was established, the most notable of them the Church of Scientology. Scientology sponsors a variety of social service programs. These include the fight against drug program Narconon, Criminon prison rehabilitation, study methodology, technical training, a voluntary organization, a method of business management, and a set of ethical guidelines in the book The Way expressed to be happy.

The Church of Scientology is one of the most controversial new religious movements in the 20th Century were created. Often described as a cult, that of financial fraud and abuse by their members, exorbitant fees for their spiritual services. The Church of Scientology has used again and again complaints against these criticisms, and his aggressive pursuit of his enemies was convicted of harassment. the most controversy on the beliefs of Scientology-centered, that souls (“thetan”) and be reborn on another planet, before having lived life on Earth, and some of the teachings in the context not the doctors did, until they have paid thousands of dollars to the Church of Scientology. Another controversial belief held by Scientologists that the practice of psychiatry destructive and violent and should be abolished.

Monday, 9 July 2012

What are Web services are worth the money?

Most online services are working on a freemium model – offering free accounts for basic users, but some of the functions of the quality of services are for people who are willing to pay for one year (or monthly) subscription fee. Some examples come to mind. MailChimp, newsletter service email, you can send up to 12,000 emails per month for free, but the emails to a large list, you must subscribe to a monthly plan. LastPass, the manager password online is totally free, but you can get rid of ads and also get to use LastPass on your phone for a small fee monthly fixed. Evernote is free, but the paid version does not display, view, and you can download a cell phone for offline access. Storage services online such as Google Docs, Dropbox and SkyDrive are free, but if you lack storage space, you can get more gigabytes for a monthly fee added. The more to web hosting and domain registration and pay for renovations. Some other popular applications and online services on the freemium model include Skype, Flickr, Remember the Milk, CrashPlan, Xbox Live, Vimeo, Hulu, Amazon Prime, Soundcloud, LinkedIn, safe, Slideshare, Google apps, Instapaper, Microsoft Office 365 Adobe Creative Cloud, Github, Amazon S3, internet faxing, and although you pay for premium services Web mehr.Was I have a question for you – what are your five favorite web applications upscale now or subscribe, I would not mind paying the Zukunft.Legen your answers in the form of Google and I wanted a gift card which Evernote Evernote account, please update your victory on the basis of the paid version (valued at $ 45). Evernote contest – RegelnEs are no rules or regulations, you should not send tweets or Facebook page to participate and can go anywhere in the world, you basieren.Schauen but only a list of services they offer payment options – for example, Twitter and helpful this site are not eligible because they are completely free. Good luck! Pranav Shah thank you to the idea and Troy Malone offers gift cards to Evernote.

UNIX Overview

Introduction
————
One of the most common operating systems in existance is Unix. Unix
exists in many different flavors, from Berkeley BSD to AT&T System V
to SunOs. Basic working knowledge of Unix is almost essential to a
hacker, as it is the system a hacker is most likely to come across.
If you intend to use the internet at all, or to do any serious
exploration of Telenet, the ability to navigate through Unix is a
necessity. (Unix is also the single most interesting system in
existance: it’s just fun to work with).

Unix Logins
———–
Most Unix logins look essentially the same. A general Unix login
prompt looks something like this:
connected to five.finger.com
login:

That first line is the system identifier. Although it’s not at all
essential to what you are doing, it’s good to know what system you are
attempting to log on to.
The second line is what typically identifies the system you are on as
Unix. Almost all Unix systems greet a user with the same prompt:
login:.
Well, there’s not much to do in Unix from the outside, and Unix
systems are typically fairly secure at this point. You may be able to
obtain a list of users, or current users, by logging in as ‘who’, but
other than that there are few functions available here.
Unless you are on the internet, or have accounts specifically for the
specific machine you are on, the only way on to the system is to try
the default passwords. What are the default passwords?
Unix systems come installed with certain passwords automatically. In
addition, some accounts must exist on a system. One such account is
‘root’. This user is the divine Kami of the Unix system… in short,
an all access pass. Unfortunately, few systems allow root logins
remotely, and even fewer leave ‘root’ unpassworded. Nevertheless, it’s
always worth a shot… try this:

connected to ren.stimpy.net
login: root
password: root
invalid login
login:

well, nice try anyways… other possible passwords for root include
‘sysadmin’, ‘sys’, ‘admin’… you get the idea. You may also want to
try these passwords with a single digit appended (added, idiot) to
them… meaning the password ‘root’ could be ‘root1′ or ‘root2′.
An interesting tip about passwords in general… many people that use
passwords under 8 characters tend to add a digit or a non-alphanumeric
character to the password. This is done in order to hinder guessing,
and to stop password breakers (more on this later). In this case, you
may want to try adding a space before root… or even an ascii 255 to
the end.
Fortunately, there is more than one default password in a unix
system… a quick list:

sys sys
bin bin
daemon daemon
rje rje
setup setup
uucp uucp/nuucp/anonymous
nuucp uucp/nuucp/anonymous
mountfsys mountfsys

In the System
————-

Ok, at this point, I’m going to assume you’ve gotten past the login…
as painful as that may sound. Although Unix may be secure from the
outside, without effort from the system administrators, the inside of
the system is not.
First off, you’ll likely by asked for a terminal. vt100 serves your
purposes sufficently, and it’s typically the default, so hit enter.
Now, hopefully, you have a prompt. There are many different types of
unix prompts, some of which contain current directory information,
some of which are just a single character. Just don’t panic when my
examples don’t look exactly like what you’ve got on your screen.
The first thing you *need* to do on the system is establish your tty
paramters. As eldritch and arcane sounding as this term may seem, it’s
actually quite simple… you need to tell the system what keys are
going to do what.
The command to set these parameters is ‘stty’. Watch:

squinkyB ] stty erase ^h
squinkyB ]

There… that wasn’t so bad, was it? Well, it’s also pretty
meaningless to you, unless you have the ascii table memorized and are
pretty good at on-the-spot deduction.
The tty erase parameters determines which key is to be used as a
backspace. At times, this may already be set when you log in, or it
may be set to a suitable alternate (such as delete). Most of the time
the system will tell you when you log on if this is so. In this case,
we’ve entered ^h in order to make the backspace key, appropriately
enough, backspace.
Another extremely important parameter is ‘intr’. The ‘intr’ paramter
tells the Unix system what you intend to use as a break character…
you should have this set to ^c.

Getting Around
————–

A good thing to remember about Unix is that it’s alot like DOS. Files
are laid out in directories just as in DOS… in fact, the only
immediate difference in the directory structures is that Unix uses a
forward slash (“/”, moron!) instead of a backwards one.
Also, the basic Unix directory navigation command is identical to DOS.
In order to change directories, you use the command ‘chdir’, or ‘cd’.
A quick example:

1 /usr1/astoria ] cd ..
2 /usr ]

Wala. That simple. Quick notes:

? cd / will take you to root.
? cd /*pathname* will take you to *pathname*
? cd home will take you to your home directory.

You can make and delete your own directories with the mkdir/rmdir
commands. Simply put, mkdir makes a subdirectory off of the current
directory, and rmdir removes a subdirectory from the current
subdirectory. Good to know if you plan to do a lot of file transfers.
An important note about Unix directories, files, and concepts:
Unix is a case-sensitive operating system. Thus, the files

? Spleen
? spleen
? SPLEEN
? SpLeEn

are all different. This rule applies to directories and command line
paramters, as well as most other Unix ideas.
Another nice thing to know about Unix: Unix files are not subject to
the normal DOS 8 character limit. Thus, you can have vast filenames,
such as “this_file_ate_my_biscuit”.

Some other important commands
—————————–

First and foremost, you should know cp. cp is the basic Unix
equivalent of the DOS COPY command. The command line for cp is
identical to that of COPY.
Next on the scale of cosmic import is cat. cat is the Unix equivalent
of the DOS TYPE command, and once again, for simple file displaying,
the command line is identical.
Variations on the theme:
pg: displayes a file page by page. Type “pg x filename”, where x is a
number of lines to display before pausing and filename is the
file you wish to display.
more: displays a file screen by screen.
Stupid pet trick:
You can use your cat to copy files, simply by using the directional
operators. To copy a file from here to there using cat, simply type:

% cat here
this is the file here
% cat there
this is the file there
% cat here > there
% cat there
this is the file here

The operator “>” simply takes the output from the cat command and
places is in the location specified after it.
Another vital command to know is ‘rm’. rm deletes a file from the
system, in the same way DEL would on a DOS system. Not to much else to
say.
Critical in your navigation of a Unix system is the ls command. ls is
DOS DIR on heroin. Simply type ls and you get a nice, neat list of
files in the directory.
DIR on controlled substances:
There are a few command line parameters that you should know…
foremost is l. ls -l gets you a list of files, and valuable
information about each file, including permissions (more on that
later), size, and linked files.
Another useful command for long file lists is C. ls -C gets you a
list of files in multiple columns, much the same as DIR /W would
merit a double column report of all existing files. A quick reminder:
ls -C is NOT the same as ls -c. Unix = case sensitive.
Another good command to know, mv will move a file from directory to
directory. For those of you without DOS 6.0 <gasp>, mv simply copies a
file to another directory and deletes the original.
quick tip for files on the lam:
if you want to rename a file (to protect the innocent), you need to
mv a file to a different file name. A quick demo:

# ls
myfile
# cat myfile
this is my file
# mv myfile my_other_file
# ls
my_other_file
# cat my_other_file
this is my file

Another vastly important command is ‘man’. In fact, man is probably
one of the most important commands extant for a beginning user… it
calls up the system’s help files. To use man, simply type in ‘man
command’, where command is a Unix command you seek to gain
enlightenment regarding. It’s a great way to gain an understanding of
Unix commandline parameters.
If you are interested in seeing who’s been on of late, or just want a
few names to try to hack, type ‘who’. You get a quick list of users
that have accessed the system lately. If you <god forbid> need to know
who you are at this point, type ‘whoami’.
If you want to change your identity on the system, type ‘su name’
where name is an account on the system. It’ll ask you for the account
password, then, *presto*… instant transmogrification.
A Caveat for smart alec hackers:
Unix typically logs usage of the su command. While su may seem like a
great opportunity to try to hack out passwords manually without
worrying about the system hanging up after 3 attempts, it’s typically
not a good idea to do this, as it may alert the administrators to
your presence.
*Numero Uno on the list of commands NEVER to use on a Unix system:
The ‘passwd’ command changes your password on a Unix system. Seems
innocous enough, eh? Uh-uh. If your account is active, and there’s a
very strong chance that it either is or will be, there is no better
way to lose the account than to change the password, only to have the
legitimate user alert the sysadmins when he/she can’t gain access to
his/her normal account (well, there are better ways… you could
simply mail the sysadmin and tell him you are trying to hack his
grandmother’s life support machine through your account).
I’ve seen this single, quick command turn a extremely lax system
into an ironclad security compound in less than a day.
DONT-MISTAKE-WITH-IT.
*Numero Dos on that same list:
The ‘mail’ command reads and sends mail. So what? Well, unless your
account is stable (and it isn’t unless you either paid for it or
killed the original owner in such a way that his body cannot claw it’s
way out of it’s grave to it’s keyboard), the user is more likely than
not going to know if you read his mail. In addition, if you send mail
out of the system (type ‘mail’, and a username/address; type in your
message and end it with a ^d on it’s own line), the response from your
message will likewise alert the user to your presence.

System Spelunking
—————–

The first place you want to check out in the wild uncharted directory
tree of your friendly neighborhood Unix system is the “/etc”
directory. What’s in it? The single most intensely important file on
the system (besides a world writable root owned SUID file… but don’t
worry about that)… the passwd file.
What is in the passwd file?

? a list of all accounts on the system
? a list of the passwords for these accounts
? a list of access levels for these accounts
? a list of the home directories for these accounts
? a list of information pertaining to these accounts.

Why the hell the Unix designers decided this file should be world
readable is beyond me. Be content to know that your standard everyday
run-of-the-mill-lacking-in-certified-cosmic-power ‘cat’ command WILL
display this file. As will pg and more. However, because most users
don’t have write permissions (more on that later) to the /etc
directory, ‘cat’ is pretty much the only applicable command here.
However, if you need to copy the file to your own directory (for
whatever reason), just cat it there with the directional operator (>).
The catch:
Well, there are two catches here. First off, regardless of system
security, if the passwords are in the file, they are encrypted. You
can’t decrypt them. Although you can get a list of accounts without
passwords this way (just look for accounts with no entry in the
password field), and a list of accounts that can’t be logged onto
remotely/at all (NO LOGIN), you can’t get much else. Sucks, don’t it?
Notice I said ‘if’ the passwords are there.
<ominous soundtrack please>
Some horrible, paranoid, draconian system administrators mutilate
their passwd files in such a way that (*gasp*) the passwords don’t
show up. All you get is one cold, icy X staring at you from the bowels
of Unix Shell Siberia, mocking you as you pull your hair out in
frustration (sorry, but this is a sore spot with me). The kidnapped
passwords reside in the shadow file in the /etc directory, available
with your standard everyday run-of-the-mill-but-distinct-in-the-fact-
that-only-root-level-accounts-can-use-it-to-this-extent ‘cat’ command.
Well, if the passwords are encrypted, what good are they?
By themselves, nothing. A account with a Unix encrypted password will
get you no further than an account with no listed password at all. You
can’t even deduce the amount of characters in the password if it’s
encrypted. So what’s the use?
The Unix method of encrypting files is available to the public. It is
also, to most mortals, irreversable. Essentially, this means you can
encrypt a string of characters, but not decrypt it. Even the unix
system itself doesn’t decrypt the password when you log on…
When you log on, the Unix system takes whatever you enter at the
password prompt, encrypts it, and matches it to the entry in the
passwd file. Thus, the Unix system never decrypts the password… it
only compares it to a different encrypted string.
While this may not sound too particularly useful at first, it is.
There are programs that have been written to do the same thing on a
personal computer… you supply it a list of passwords and a list of
words to attempt to use as passwords (called dictionaries), and it
spends the night encrypting dictionaries and matching them to password
entries. By running a dictionary through a passwd file, on a typical
system, you can usually get 10-20 accounts. Good personal computer
examples of this program idea include Killer Cracker (the industry
standard, so to speak) and CrackerJack (faster than Killer Cracker).
Quick tips for CrackerJunkies with leech access at an H/P BBS:
A standard dictionary will not uncover passwords protected with an
appended digit or non-alphanumeric character. In order to get around
this, you need only grab a program that processes the dictionary file
to add that digit to each entry in the dictionary… although this
takes longer, and you’ll need to do it multiple times, you can
typically get 10 more accounts just by adding a 1 to every entry.
Files and directories in Unix are characterized further by their
permissions. Permissions are a standard system of who gets access to a
specific function of that file or directory. Standard permissions
include read, write, and execute. You can get a list of permissions by
typing ‘ls -l’. The first field in the listing contains the
permissions, grouped as follows:

owner group world
——————–
rwx rwx rwx

(Not drawn to scale… in fact, it doesn’t look anything like that).
Essentially, as long as the letter is there, you have access to that
facet of the file. If the letter is not there, you’ll see a dash…
meaning you don’t have access to that function. An example:

rwxr-x–x

In this case, the owner of the file can Read the file, Write to the
file, and eXecute the file; members of his group (a bunch of linked
accounts) can Read the file, CANNOT Write to the file, and can eXecute
the file; and the rest of the user population CANNOT Read or Write to
the file, but CAN eXecute the file.

rwx—rwx

is a WORLD-READABLE, WORLD-WRITABLE, WORLD-EXECUTABLE file. This
simply means that anyone can read, write, or execute the file.

Another permission sometimes set to a file is the SUID bit. An SUID
file contains a smallcase s in the user executable section of the
permissions list…

rws–x–x

When you execute an SUID file, your user ID becomes that of the owner
of the file. While this may not look to important at first, by now you
should know that no really important super elite hacker concept does.
Take a look at this:

rwsr-x–x

Synopsis? It’s a world executable SUID file. In essence, anyone can
execute the file, and in doing so, become the owner of the file for
the duration of the time that file is operating. However, this doesn’t
get you much, because you typically can’t do anything while the
programis running. More likely than not, it’s calculating how many
pencils it needs to order for school tomorrow or some other such
drivel.
The real power of the SUID file comes into play in this situation:

rwsrwxrwx

You won’t see a lot of these, but when you do, look out. What you have
here is a world writable SUID file… and a world writable program can
be any program on the system you have read access to. Like, say,
/bin/sh… the Unix shell…
Quick command line example… ‘diablo’ is a root owned, world writable
SUID file. I’m going to ignore the rest of the output of the ls
command.

#ls -l
rwsrwxrwx… …diablo
#cat /bin/sh > diablo
#diablo
$

Oh, just so you know, the $ prompt denotes root access.
Good deal, huh? In general, if you have right privs to an SUID file,
copy it to your own directory and cat /bin/sh into it. You now have an
instant gateway to the account of the owner of that file.
If you want to find files that you can do this with, try this out:

#find / -user root -perm -4000 -exec /bin/ls -al {} “;”

This will give you a list of all root owned SUID files. If you want
more info on the ‘find’ command, just ‘man find’.

Well, I’m overdo for an appointment on the IRC in #warez… so I’ll
cut off here. I hope I’ve been of assistance to you.

—————————————————————————-
A C T U A L A R T I C L E E N D S H E R E . . .

Please feel free to save an extra 1k of file space and invoke the DOS
EDIT CUT command at the dotted line. Do not remove the rest of this
article on penalty of law.

S00P3R GR00P-3SQU3 GR33TZ / +HANX

Greets go out to Nowhere Man, INC, THG, UNT, SaD, SoD, PTA, SOB
Thanks to… ________________________
your ad here

Current DWE Akshul M3mbre Boards:

Nitro Burnin’ Funny Cars WHQ/DWEnet HOST (312)582-1115 <XANAX>
The Prodigal Sun CHQ/MECCA (312)238-3585 <ASRIEL>
Dark Waters HQ/Infosite (312)667-0222 <MONK>
PyroTechnics II Infosite (708)991-9403 <PYRO>

DWE M3/\/\B3R LiST

President and Dictator for Life: Xanax
Head Courier/Warez Cracker: Asriel
Head Fisherman/Trout Expert: Changeling
Head Person That Gets Asriel Free CDs: Monk
Head Person That Gets DWE Members Free WaReZ: Pyro
Head Person That Knows More Than Asriel (Honorary Title): LVX
Head Person That Actually Wrote for DWE without Coercion: Cosmos
Head Know-It-All Stoner that runs 386bsd: Goldstein

Want to write for DWE? Neither do we. But if the spirit moves you,
write up an article about anything we haven’t discussed already, and
post it somewhere in DWEnet or at any of the member boards, or call
any of the members voice and dictate it to them, or submit it to them
school newspaper of any of the members, or tack it on a bulletin board
in the Third Coast Cafe in Century Mall, and chances are it’ll be
released as a s00per c00l DWE article.

W H A T F O L L O W S M U S T N O T B E D E L E T E D
—————————————————————————
(c) 2003 Hackers-Network
Asriel(tm) appears courtesy of Hasbro, Inc.

A World Map of the Most Visited Websites



This world map represents the most popular websites by country. No big surprises here as Google reigns supreme in most parts of the world followed by Facebook. Yahoo is still the most visited website in Japan and Congo while Baidu is the Google of China in every sense.

Next-generation Retina MacBook Pro





I got my hands on a whole new generation of MacBook Pro Retina, and no other way to describe it – is nice. The display of the retina is the best I’ve ever seen, period. It’s almost too good if possible. Many websites (including BGR) do not have enough large images at high resolution for the new iPad, and the entry of Retina-equipped MacBook Pro highlights this problem further. But enough about this team is a marvel of technology in almost every way possible. It is as thin as a MacBook Air, but powerful. Is reconsidered from the ground and is portable for the future of the race that I found. With flash and USB 3.0, a display of the retina, the latest generation of Intel processors, faster RAM, an SSD of 500 Mbps, a FaceTime HD camera, two microphones, two speakers (amazing), a keyboard backlit and 7 hours (we did not have to know each other all the time yet), it’s a slam dunk. My only problem? I can not exchange it against a 13-inch MacBook Air has a much smaller footprint, more mobile, weight and feel? A 13-inch MacBook Pro might be the best compromise for the next generation, but we’re not there yet.



Find Exact Date When a Google Map Image was Taken

Curious to know the exact date when the Google cameras captured these photos of aerial views and street of your home (or any other address)? Well, you can easily find these data in Google Maps and Google Earth.


If you live in a country where Google Street View is available, you can use the Google Maps site itself to determine the date on which Google Street Views cars were stills in your area of the district.

Search an address in Google Maps and go to the street view by dragging the icon to view the street map. Date image will be displayed in the status bar again if in this case, Google reveals only the month and year of the image but not the exact date.

All about SpyWare




What is spy-ware?

Spy-ware is Internet jargon for Advertising Supported software (Ad-ware). It is a way for shareware authors to make money from a product, other than by selling it to the users. There are several large media companies that offer them to place banner ads in their products in exchange for a portion of the revenue from banner sales. This way, you don’t have to pay for the software and the developers are still getting paid. If you find the banners annoying, there is usually an option to remove them, by paying the regular licensing fee.
Known spywares

There are thousands out there, new ones are added to the list everyday. But here are a few:
Alexa, Aureate/Radiate, BargainBuddy, ClickTillUWin, Conducent Timesink, Cydoor, Comet Cursor, eZula/KaZaa Toptext, Flashpoint/Flashtrack, Flyswat, Gator, GoHip, Hotbar, ISTbar, Lions Pride Enterprises/Blazing Logic/Trek Blue, Lop (C2Media), Mattel Brodcast, Morpheus, NewDotNet, Realplayer, Songspy, Xupiter, Web3000, WebHancer, Windows Messenger Service.

How to check if a program has spyware?
The is this Little site that keeps a database of programs that are known to install spyware.
Check Here: http://www.spywareguide.com/product_search.php
If you would like to block pop-ups (IE Pop-ups).
There tons of different types out there, but these are the 2 best, i think.
Try: Google Toolbar (http://toolbar.google.com/) This program is Free
Try: AdMuncher (http://www.admuncher.com) This program is Shareware
If you want to remove the “spyware” try these.
Try: Lavasoft Ad-Aware (http://www.lavasoftusa.com/) This program is Free

Info: Ad-aware is a multi spyware removal utility, that scans your memory, registry and hard drives for known spyware components and lets you remove them. The included backup-manager lets you reinstall a backup, offers and multi language support.
Try: Spybot-S&D (http://www.safer-networking.org/) This program is Free

Info: Detects and removes spyware of different kinds (dialers, loggers, trojans, user tracks) from your computer. Blocks ActiveX downloads, tracking cookies and other threats. Over 10,000 detection files and entries. Provides detailed information about found problems.
Try: BPS Spyware and Adware Remover (http://www.bulletproofsoft.com/spyware-remover.html) This program is Shareware

Info: Adware, spyware, trackware and big brotherware removal utility with multi-language support. It scans your memory, registry and drives for known spyware and lets you remove them. Displays a list and lets you select the items you’d like to remove.
Try: Spy Sweeper v2.2 (http://www.webroot.com/wb/products/spysweeper/index.php) This program is Shareware

Info: Detects and removes spyware of different kinds (dialers, loggers, trojans, user tracks) from your computer.
The best scanner out there, and updated all the time.
Try: HijackThis 1.97.7 (http://www.spywareinfo.com/~merijn/downloads.html) This program is Freeware

Info: HijackThis is a tool, that lists all installed browser add-on, buttons, startup items and allows you to inspect them, and optionally remove selected items.
If you would like to prevent “spyware” being install.
Try: SpywareBlaster 2.6.1 (http://www.wilderssecurity.net/spywareblaster.html) This program is Free

Info: SpywareBlaster doesn`t scan and clean for so-called spyware, but prevents it from being installed in the first place. It achieves this by disabling the CLSIDs of popular spyware ActiveX controls, and also prevents the installation of any of them via a webpage.
Try: SpywareGuard 2.2 (http://www.wilderssecurity.net/spywareguard.html) This program is Free

Info: SpywareGuard provides a real-time protection solution against so-called spyware. It works similar to an anti-virus program, by scanning EXE and CAB files on access and alerting you if known spyware is detected.
Try: XP-AntiSpy (http://www.xp-antispy.org/) This program is Free

Info: XP-AntiSpy is a small utility to quickly disable some built-in update and authentication features in WindowsXP that may rise security or privacy concerns in some people.
Try: SpySites (http://camtech2000.net/Pages/SpySites_Prog…ml#SpySitesFree) This program is Free

Info: SpySites allows you to manage the Internet Explorer Restricted Zone settings and easily add entries from a database of 1500+ sites that are known to use advertising tracking methods or attempt to install third party software.
If you would like more Information about “spyware”.
Check these sites.
http://www.spychecker.com/
http://www.spywareguide.com/
http://www.cexx.org/adware.htm
http://www.theinfomaniac.net/infomaniac/co…rsSpyware.shtml
http://www.thiefware.com/links/
http://simplythebest.net/info/spyware.html
Usefull tools…
Try: Stop Windows Messenger Spam 1.10 (http://www.jester2k.pwp.blueyonder.co.uk/j…r2ksoftware.htm) This program is Free

Info: “Stop Windows Messenger Spam” stops this Service from running and halts the spammers ability to send you these messages.
—————————————————————————-
All these softwares will help remove and prevent evil spammers and spywares attacking your PC. I myself recommend getting “spyblaster” “s&d spybot” “spy sweeper” & “admuncher” to protect your PC. A weekly scan is also recommended
Free Virus Scan
Scan for spyware, malware and keyloggers in addition to viruses, worms and trojans. New threats and annoyances are created faster than any individual can keep up with.
http://defender.veloz.com// – 15k
Finding . is a Click Away at 2020Search.com
Having trouble finding what you re looking for on: .? 2020Search will instantly provide you with the result you re looking for by drawing on some of the best search engines the Internet has to offer. Your result is a click away!
http://www.2020search.com// – 43k
Download the BrowserVillage Toolbar.
Customize your Browser! Eliminate Pop-up ads before they start, Quick and easy access to the Web, and much more. Click Here to Install Now!
http://www.browservillage.com/ – 36k

Sunday, 8 July 2012

Top 4 Twitter Tools Used by Experts Bloggers


Blogging has been popular for a long time now, but the fact is that its popularity isn’t wearing off just yet. There are millions of bloggers to be found on the World Wide Web, and all of them are in search of the same thing. Namely, all bloggers that are to be found want someone to read whatever they are writing every day, or every week. Well, there are a lot of great things one can do in order to achieve this, and one of the best things includes using Twitter tools for their blog.

Twitter and Blogging – What Is Their Connection


Twitter has been a very popular social platform for almost six years now, but many bloggers still fail to see the significance of this social platform for their blog. Well, the significance is great, and it will be explained here. Not only can you keep your existing readers informed by activities on your blog and new posts, but you can also gain new readership by using Twitter the right way. The reason for this is simple enough – you will advertize links to your posts easily and very effectively with Twitter.

Top 4 Twitter Tools for Expert Bloggers

Here will be listed the four most powerful Twitter tools you should start using for your blog:
  1. TweetBeep This is a tool that will alert you whenever a specific keyword is searched in Twitter. This is a very useful tool, as you will be able to set the keywords related to you and your niches, and then be informed when users search for these keywords. This way, you can keep track of which keywords are popular and often searched, and this will enable you to write blog posts that will be more popular.
  2. TwitterFeed By using this practical and easy to use tool, you will have all your newest blog posts posted to Twitter without you doing anything. It not only saves you time, but it also makes you and your blog look professional and punctual, as well.
  3. My Tweeple – A great tool for any blogger that doesn’t want to follow the wrong people. Namely, this tool will enable you to easily see who you are following and who is following you, as well as follow and unfollow people, as well as block them.
  4. Twit This Probably the most commonly used Twitter tool by bloggers, as it enables you to post links to Twitter quickly and easily, without any hassle at all. Aside from this, you also have the chance to have the button on your blog, so that your readers can re-tweet any blog posts they find interesting.
If You Want to Be a Successful Blogger Do Not Ignore Twitter
Even though it may not have nearly as many users as Facebook, Twitter is considered by many a much powerful tool for expert bloggers than any other social networking website. Therefore, you are strongly advised to do some research and start using Twitter tools in order to promote your blog and attract new readers to it.

Translate Web Pages Inline with Microsoft Translator



If you are using Google Chrome, you may safely skip reading this as your browser has built-in language translation that triggers automatically. That is, if you ever come across a web page written in a foreign language, Chrome will instantly translate the whole page into your native language without requiring any add-ons or toolbars.

Google Translate also offers bookmarklets – or browser buttons – that you can use to quickly translate web pages in any of the other browsers (including mobile phones).

One downside of Google Translation bookmarklets is that they always open the translated page in a new browser window (or tab). If you would like the translation to happen inline – just like Google Chrome – check this new bookmarklet that uses Microsoft Translator instead of Google Translate.


Smart Notebook

The ultra mobility is the main feature that sells notebooks these days. All manufacturers know this. Therefore, every single one of them is trying to launch as many models as it can in this range. You cannot find all sorts of notebooks or subnotebook, so called net books, with their main advantage being ultra portability. The final users, sometimes the actual customers, can take full advantage of this continuous quest of releasing more and more notebooks on the market. You can now not only find excellent notebooks with great specs list, but also with stylish design or even a notebook convertible to tablet. Sounds very transformers, but this is actually on the market.

Setup up a FTP



Well, since many of us have always wondered this, here it is. Long and drawn out. Also, before attempting this, realize one thing; You will have to give up your time, effort, bandwidth, and security to have a quality ftp server.
That being said, here it goes. First of all, find out if your IP (Internet Protocol) is static (not changing) or dynamic (changes everytime you log on). To do this, first consider the fact if you have a dial up modem. If you do, chances are about 999 999 out of 1 000 000 that your IP is dynamic. To make it static, just go to a place like h*tp://www.myftp.org/ to register for a static ip address.
You’ll then need to get your IP. This can be done by doing this:
Going to Start -> Run -> winipcfg or www.ask.com and asking ‘What is my IP?’
After doing so, you’ll need to download an FTP server client. Personally, I’d recommend G6 FTP Server, Serv-U FTPor Bullitproof v2.15 all three of which are extremely reliable, and the norm of the ftp world.
You can download them on this site: h*tp://www.liaokai.com/softw_en/d_index.htm
First, you’ll have to set up your ftp. For this guide, I will use step-by-step instructions for G6. First, you’ll have to go into ‘Setup -> General’. From here, type in your port # (default is 21). I recommend something unique, or something a bit larger (ex: 3069). If you want to, check the number of max users (this sets the amount of simultaneous maximum users on your server at once performing actions – The more on at once, the slower the connection and vice versa).
The below options are then chooseable:
-Launch with windows
-Activate FTP Server on Start-up
-Put into tray on startup
-Allow multiple instances
-Show “Loading…” status at startup
-Scan drive(s) at startup
-Confirm exit
You can do what you want with these, as they are pretty self explanatory. The scan drive feature is nice, as is the 2nd and the last option. From here, click the ‘options’ text on the left column.
To protect your server, you should check ‘login check’ and ‘password check’, ‘Show relative path (a must!)’, and any other options you feel you’ll need. After doing so, click the ‘advanced’ text in the left column. You should then leave the buffer size on the default (unless of course you know what you’re doing ), and then allow the type of ftp you want.
Uploading and downloading is usually good, but it’s up to you if you want to allow uploads and/or downloads. For the server priority, that will determine how much conventional memory will be used and how much ‘effort’ will go into making your server run smoothly.
Anti-hammering is also good, as it prevents people from slowing down your speed. From here, click ‘Log Options’ from the left column. If you would like to see and record every single command and clutter up your screen, leave the defaults.
But, if you would like to see what is going on with the lowest possible space taken, click ‘Screen’ in the top column. You should then check off ‘Log successful logins’, and all of the options in the client directry, except ‘Log directory changes’. After doing so, click ‘Ok’ in the bottom left corner.
You will then have to go into ‘Setup -> User Accounts’ (or ctrl & u). From here, you should click on the right most column, and right click. Choose ‘Add’, and choose the username(s) you would like people to have access to.
After giving a name (ex: themoonlanding), you will have to give them a set password in the bottom column (ex: wasfaked). For the ‘Home IP’ directory, (if you registered with a static server, check ‘All IP Homes’. If your IP is static by default, choose your IP from the list. You will then have to right click in the very center column, and choose ‘Add’.
From here, you will have to set the directory you want the people to have access to. After choosing the directory, I suggest you choose the options ‘Read’, ‘List’, and ‘Subdirs’, unless of course you know what you’re doing . After doing so, make an ‘upload’ folder in the directory, and choose to ‘add’ this folder seperately to the center column. Choose ‘write’, ‘append’, ‘make’, ‘list’, and ‘subdirs’. This will allow them to upload only to specific folders (your upload folder).
Now click on ‘Miscellaneous’ from the left column. Choose ‘enable account’, your time-out (how long it takes for people to remain idle before you automatically kick them off), the maximum number of users for this name, the maximum number of connections allowed simultaneously for one ip address, show relative path (a must!), and any other things at the bottom you’d like to have. Now click ‘Ok’.
**Requested**
From this main menu, click the little boxing glove icon in the top corner, and right click and unchoose the hit-o-meter for both uploads and downloads (with this you can monitor IP activity). Now click the lightning bolt, and your server is now up and running.
Post your ftp info, like this:
213.10.93.141 (or something else, such as: ‘f*p://example.getmyip.com’)
User: *** (The username of the client)
Pass: *** (The password)
Port: *** (The port number you chose)
So make a FTP and join the FTP section
Listing The Contents Of A Ftp:
Listing the content of a FTP is very simple.
You will need FTP Content Maker, which can be downloaded from here:
ht*p://www.etplanet.com/download/application/FTP%20Content%20Maker%201.02.zip
1. Put in the IP of the server. Do not put “ftp://” or a “/” because it will not work if you do so.
2. Put in the port. If the port is the default number, 21, you do not have to enter it.
3. Put in the username and password in the appropriate fields. If the login is anonymous, you do not have to enter it.
4. If you want to list a specific directory of the FTP, place it in the directory field. Otherwise, do not enter anything in the directory field.
5. Click “Take the List!”
6. After the list has been taken, click the UBB output tab, and copy and paste to wherever you want it.
If FTP Content Maker is not working, it is probably because the server does not utilize Serv-U Software.
If you get this error message:
StatusCode = 550
LastResponse was : ‘Unable to open local file test-ftp’
Error = 550 (Unable to open local file test-ftp)
Error = Unable to open local file test-ftp = 550
Close and restart FTP Content Maker, then try again.
error messages:
110 Restart marker reply. In this case, the text is exact and not left to the particular implementation; it must read: MARK yyyy = mmmm Where yyyy is User-process data stream marker, and mmmm server’s equivalent marker (note the spaces between markers and “=”).
120 Service ready in nnn minutes.
125 Data connection already open; transfer starting.
150 File status okay; about to open data connection.
200 Command okay.
202 Command not implemented, superfluous at this site.
211 System status, or system help reply.
212 Directory status.
213 File status.
214 Help message. On how to use the server or the meaning of a particular non-standard command. This reply is useful only to the human user.
215 NAME system type. Where NAME is an official system name from the list in the Assigned Numbers document.
220 Service ready for new user.
221 Service closing control connection. Logged out if appropriate.
225 Data connection open; no transfer in progress.
226 Closing data connection. Requested file action successful (for example, file transfer or file abort).
227 Entering Passive Mode (h1,h2,h3,h4,p1,p2).
230 User logged in, proceed.
250 Requested file action okay, completed.
257 “PATHNAME” created.
331 User name okay, need password.
332 Need account for login.
350 Requested file action pending further information.
421 Too many users logged to the same account
425 Can’t open data connection.
426 Connection closed; transfer aborted.
450 Requested file action not taken. File unavailable (e.g., file busy).
451 Requested action aborted: local error in processing.
452 Requested action not taken. Insufficient storage space in system.
500 Syntax error, command unrecognized. This may include errors such as command line too long.
501 Syntax error in parameters or arguments.
502 Command not implemented.
503 Bad sequence of commands.
504 Command not implemented for that parameter.
530 Not logged in.
532 Need account for storing files.
550 Requested action not taken. File unavailable (e.g., file not found, no access).
551 Requested action aborted: page type unknown.
552 Requested file action aborted. Exceeded storage allocation (for current directory or dataset).
553 Requested action not taken. File name not allowed.
Active FTP vs. Passive FTP, a Definitive Explanation
Introduction
One of the most commonly seen questions when dealing with firewalls and other Internet connectivity issues is the difference between active and passive FTP and how best to support either or both of them. Hopefully the following text will help to clear up some of the confusion over how to support FTP in a firewalled environment.
This may not be the definitive explanation, as the title claims, however, I’ve heard enough good feedback and seen this document linked in enough places to know that quite a few people have found it to be useful. I am always looking for ways to improve things though, and if you find something that is not quite clear or needs more explanation, please let me know! Recent additions to this document include the examples of both active and passive command line FTP sessions. These session examples should help make things a bit clearer. They also provide a nice picture into what goes on behind the scenes during an FTP session. Now, on to the information…
The Basics
FTP is a TCP based service exclusively. There is no UDP component to FTP. FTP is an unusual service in that it utilizes two ports, a ‘data’ port and a ‘command’ port (also known as the control port). Traditionally these are port 21 for the command port and port 20 for the data port. The confusion begins however, when we find that depending on the mode, the data port is not always on port 20.
Active FTP
In active mode FTP the client connects from a random unprivileged port (N > 1024) to the FTP server’s command port, port 21. Then, the client starts listening to port N+1 and sends the FTP command PORT N+1 to the FTP server. The server will then connect back to the client’s specified data port from its local data port, which is port 20.
From the server-side firewall’s standpoint, to support active mode FTP the following communication channels need to be opened:
FTP server’s port 21 from anywhere (Client initiates connection)
FTP server’s port 21 to ports > 1024 (Server responds to client’s control port)
FTP server’s port 20 to ports > 1024 (Server initiates data connection to client’s data port)
FTP server’s port 20 from ports > 1024 (Client sends ACKs to server’s data port)
In step 1, the client’s command port contacts the server’s command port and sends the command PORT 1027. The server then sends an ACK back to the client’s command port in step 2. In step 3 the server initiates a connection on its local data port to the data port the client specified earlier. Finally, the client sends an ACK back as shown in step 4.
The main problem with active mode FTP actually falls on the client side. The FTP client doesn’t make the actual connection to the data port of the server–it simply tells the server what port it is listening on and the server connects back to the specified port on the client. From the client side firewall this appears to be an outside system initiating a connection to an internal client–something that is usually blocked.
Active FTP Example
Below is an actual example of an active FTP session. The only things that have been changed are the server names, IP addresses, and user names. In this example an FTP session is initiated from testbox1.slacksite.com (192.168.150.80), a linux box running the standard FTP command line client, to testbox2.slacksite.com (192.168.150.90), a linux box running ProFTPd 1.2.2RC2. The debugging (-d) flag is used with the FTP client to show what is going on behind the scenes. Everything in red is the debugging output which shows the actual FTP commands being sent to the server and the responses generated from those commands. Normal server output is shown in black, and user input is in bold.
There are a few interesting things to consider about this dialog. Notice that when the PORT command is issued, it specifies a port on the client (192.168.150.80) system, rather than the server. We will see the opposite behavior when we use passive FTP. While we are on the subject, a quick note about the format of the PORT command. As you can see in the example below it is formatted as a series of six numbers separated by commas. The first four octets are the IP address while the second two octets comprise the port that will be used for the data connection. To find the actual port multiply the fifth octet by 256 and then add the sixth octet to the total. Thus in the example below the port number is ( (14*256) + 178), or 3762. A quick check with netstat should confirm this information.
testbox1: {/home/p-t/slacker/public_html} % ftp -d testbox2
Connected to testbox2.slacksite.com.
220 testbox2.slacksite.com FTP server ready.
Name (testbox2:slacker): slacker
—> USER slacker
331 Password required for slacker.
Password: TmpPass
—> PASS XXXX
230 User slacker logged in.
—> SYST
215 UNIX Type: L8
Remote system type is UNIX.
Using binary mode to transfer files.
ftp> ls
ftp: setsockopt (ignored): Permission denied
—> PORT 192,168,150,80,14,178
200 PORT command successful.
—> LIST
150 Opening ASCII mode data connection for file list.
drwx—— 3 slacker users 104 Jul 27 01:45 public_html
226 Transfer complete.
ftp> quit
—> QUIT
221 Goodbye.
Passive FTP
In order to resolve the issue of the server initiating the connection to the client a different method for FTP connections was developed. This was known as passive mode, or PASV, after the command used by the client to tell the server it is in passive mode.
In passive mode FTP the client initiates both connections to the server, solving the problem of firewalls filtering the incoming data port connection to the client from the server. When opening an FTP connection, the client opens two random unprivileged ports locally (N > 1024 and N+1). The first port contacts the server on port 21, but instead of then issuing a PORT command and allowing the server to connect back to its data port, the client will issue the PASV command. The result of this is that the server then opens a random unprivileged port (P > 1024) and sends the PORT P command back to the client. The client then initiates the connection from port N+1 to port P on the server to transfer data.
From the server-side firewall’s standpoint, to support passive mode FTP the following communication channels need to be opened:
FTP server’s port 21 from anywhere (Client initiates connection)
FTP server’s port 21 to ports > 1024 (Server responds to client’s control port)
FTP server’s ports > 1024 from anywhere (Client initiates data connection to random port specified by server)
FTP server’s ports > 1024 to remote ports > 1024 (Server sends ACKs (and data) to client’s data port)
In step 1, the client contacts the server on the command port and issues the PASV command. The server then replies in step 2 with PORT 2024, telling the client which port it is listening to for the data connection. In step 3 the client then initiates the data connection from its data port to the specified server data port. Finally, the server sends back an ACK in step 4 to the client’s data port.
While passive mode FTP solves many of the problems from the client side, it opens up a whole range of problems on the server side. The biggest issue is the need to allow any remote connection to high numbered ports on the server. Fortunately, many FTP daemons, including the popular WU-FTPD allow the administrator to specify a range of ports which the FTP server will use. See Appendix 1 for more information.
The second issue involves supporting and troubleshooting clients which do (or do not) support passive mode. As an example, the command line FTP utility provided with Solaris does not support passive mode, necessitating a third-party FTP client, such as ncftp.
With the massive popularity of the World Wide Web, many people prefer to use their web browser as an FTP client. Most browsers only support passive mode when accessing ftp:// URLs. This can either be good or bad depending on what the servers and firewalls are configured to support.
Passive FTP Example
Below is an actual example of a passive FTP session. The only things that have been changed are the server names, IP addresses, and user names. In this example an FTP session is initiated from testbox1.slacksite.com (192.168.150.80), a linux box running the standard FTP command line client, to testbox2.slacksite.com (192.168.150.90), a linux box running ProFTPd 1.2.2RC2. The debugging (-d) flag is used with the FTP client to show what is going on behind the scenes. Everything in red is the debugging output which shows the actual FTP commands being sent to the server and the responses generated from those commands. Normal server output is shown in black, and user input is in bold.
Notice the difference in the PORT command in this example as opposed to the active FTP example. Here, we see a port being opened on the server (192.168.150.90) system, rather than the client. See the discussion about the format of the PORT command above, in the Active FTP Example section.
testbox1: {/home/p-t/slacker/public_html} % ftp -d testbox2
Connected to testbox2.slacksite.com.
220 testbox2.slacksite.com FTP server ready.
Name (testbox2:slacker): slacker
—> USER slacker
331 Password required for slacker.
Password: TmpPass
—> PASS XXXX
230 User slacker logged in.
—> SYST
215 UNIX Type: L8
Remote system type is UNIX.
Using binary mode to transfer files.
ftp> passive
Passive mode on.
ftp> ls
ftp: setsockopt (ignored): Permission denied
—> PASV
227 Entering Passive Mode (192,168,150,90,195,149).
—> LIST
150 Opening ASCII mode data connection for file list
drwx—— 3 slacker users 104 Jul 27 01:45 public_html
226 Transfer complete.
ftp> quit
—> QUIT
221 Goodbye.
Summary
The following chart should help admins remember how each FTP mode works:
Active FTP :
command : client >1024 -> server 21
data : client >1024 <- server 20
Passive FTP :
command : client >1024 -> server 21
data : client >1024 -> server >1024
A quick summary of the pros and cons of active vs. passive FTP is also in order:
Active FTP is beneficial to the FTP server admin, but detrimental to the client side admin. The FTP server attempts to make connections to random high ports on the client, which would almost certainly be blocked by a firewall on the client side. Passive FTP is beneficial to the client, but detrimental to the FTP server admin. The client will make both connections to the server, but one of them will be to a random high port, which would almost certainly be blocked by a firewall on the server side.
Luckily, there is somewhat of a compromise. Since admins running FTP servers will need to make their servers accessible to the greatest number of clients, they will almost certainly need to support passive FTP. The exposure of high level ports on the server can be minimized by specifying a limited port range for the FTP server to use. Thus, everything except for this range of ports can be firewalled on the server side. While this doesn’t eliminate all risk to the server, it decreases it tremendously.