Wednesday 30 October 2013

Dependency Walker 2.2,

Dependency Walker is a free utility that scans any 32-bit or 64-bit Windows module (exe, dll, ocx, sys, etc.) and builds a hierarchical tree diagram of all dependent modules. For each module found, it lists all the functions that are exported by that module, and which of those functions are actually being called by other modules. Another view displays the minimum set of required files, along with detailed information about each file including a full path to the file, base address, version numbers, machine type, debug information, and more.

Dependency Walker is also very useful for troubleshooting system errors related to loading and executing modules. Dependency Walker detects many common application problems such as missing modules, invalid modules, import/export mismatches, circular dependency errors, mismatched machine types of modules, and module initialization failures.

Dependency Walker runs on Windows 95, 98, Me, NT, 2000, XP, 2003, Vista, 7, and 8. It can process any 32-bit or 64-bit Windows module, including ones designed for Windows CE. It can be run as graphical application or as a console application. Dependency Walker handles all types of module dependencies, including implicit, explicit (dynamic / runtime), forwarded, delay-loaded, and injected. A detailed help is included.
Dependency Walker is completely free to use. However, you may not profit from the distribution of it, nor may you bundle it with another product.

What is New in Version 2.2:

Moved to new HTML help system and updated the help text.
Added support for MSDN 8.0 external help and updated the online help URL.
Improved Side-by-Side support that handles DLL manifests and app.exe.local files.
Updated internal information about known OS versions, build numbers, and flags up to the Vista RC1 build.

What was New in Version 2.1:

Support for Side-by-Side versioning of modules. This is a new feature introduced with Windows XP that allows applications to specify specific versions and/or locations of files it wishes to use.
Integration with Visual Studio help, MSDN help, and MSDN online to provide the ability to display detailed help for any known function.

What was New in Version 2.0:

Detection of dynamically loaded modules, including details about which module actually called LoadLibrary to dynamically load the module.
Detection of dynamically called functions, including details about which module actually called GetProcAddress to obtain the function address.
Detection of delay-load dependencies. This is a new type of dependency that was introduced with Microsoft Visual C++ 6.0. They work on Windows 95/98/Me and Windows NT/2000/XP/2003/Vista/7/8/+.
Support for 64-bit Windows modules.
Console mode that allows Dependency Walker to be ran without its graphical interface being displayed. This is useful for batch files and unattended automation of Dependency Walker features.
Command line options to configure module search order, column sorting, output files, profiling, and other settings.
Ability to monitor module entrypoints (like DllMain) looking for module initialization failures.
C++ function name undecorating to provide human readable C++ function prototypes including function names, return types, and parameter types.
User definable module search paths with support for "KnownDLLs" and the "App Paths" registry keys. Search paths can be saved and loaded from within the graphical interface or from the command line.
Ability to save a module's session to a text report file for easy viewing in any text viewer.
Ability to save a module's session to a comma separated value (CSV) file for easy importing into other applications.
Ability to save a snapshot of an entire module session to an image file, which can be loaded by Dependency Walker at a later time on any computer.
Module profiling to detect dynamic dependencies, child processes, thread activity, and exceptions. Child processes can also be profiled for their dependencies.
Ability to control what file extensions Dependency Walker will add the "View Dependencies" menu item to a file's context menu in explorer.
Added hotkeys to help match imports with exports, and modules in the list view with modules in the tree view. Also added hotkeys to locate the previous, next, or original instance of a module in the tree view.
Added some new columns to the Module List View. They include Link Time Stamp, Link Checksum, Real Checksum, Symbols, Actual Base, Virtual Size, and Load Order.
Added an OS Information dialog. This information is also saved to text and Dependency Walker Image (DWI) files.
All list views can now be sorted by icon, which provides an easy way of grouping items of similar type.
You can now search all list views for text by simply typing in a few characters to match in the currently sorted column.
Added color-coding to the module list view and log view to help highlight problems.

32-bit and 64-bit explained

Will this 32-bit software run on my 64-bit operating system? or
Will this 64-bit software run on my computer?
If you've asked these questions then this tutorial should help you to understand the concepts of 32-bit and 64-bit computing. We'll look at your computer system as three parts: the hardware, the operating system and the application programs. At the end we'll look at some of the common questions people have.

32-bit versus 64-bit

As the number of bits increases there are two important benefits.
  • More bits means that data can be processed in larger chunks which also means more accurately.
  • More bits means our system can point to or address a larger number of locations in physical memory.
32-bit systems were once desired because they could address (point to) 4 Gigabytes (GB) of memory in one go. Some modern applications require more than 4 GB of memory to complete their tasks so 64-bit systems are now becoming more attractive because they can potentially address up to 4 billion times that many locations.
Since 1995, when Windows 95 was introduced with support for 32-bit applications, most of the software and operating system code has been 32-bit compatible.
Here is the problem, while most of the software available today is 32-bit, the processors we buy are almost all 64-bit.

So how long will the transition from 32-bit to 64-bit systems take?

The main issue is that your computer works from the hardware such as the processor (or CPU, as it is called), through the operating system (OS), to the highest level which is your applications. So the computer hardware is designed first, the matching operating systems are developed, and finally the applications appear.
We can look back at the transition from 16-bit to 32-bit Windows on 32-bit processors. It took 10 years (from 1985 to 1995) to get a 32-bit operating system and even now, more than 15 years later, there are many people still using 16-bit Windows applications on older versions of Windows.
The hardware and software vendors learnt from the previous transition, so the new operating systems have been released at the same time as the new processors. The problem this time is that there haven't been enough 64-bit applications. Ten years after the PC's first 64-bit processors, installs of 64-bit Windows are only now exceeding those of 32-bit Windows. Further evidence of this inertia is that you are probably reading this tutorial because you are looking to install your first 64-bit software.

Your computer system in three parts

Now we'll look at those three components of your system. In simple terms they are three layers with the processor or CPU as the central or lowest layer and the application as the outermost or highest layer as shown below:
Processor, OS and application hierarchy


















To run a 64-bit operating system you need support from the lower level: the 64-bit CPU.
To run a 64-bit application you need support from all lower levels: the 64-bit OS and the 64-bit CPU.
This simplification will be enough for us to look what happens when we mix the 32-bit and 64-bit parts. But if you want to understand the issue more deeply then you will also need to consider the hardware that supports the CPU and the device drivers that allow the OS and the applications to interface with the system hardware.

What 32-bit and 64-bit combinations are compatible and will work together?

This is where we get to the practicalities and can start answering common questions.
The general rule is that 32-bit will run on a lower level 64-bit component but 64-bit does not run on a lower level 32-bit component:
  • A 32-bit OS will run on a 32-bit or 64-bit processor without any problem.
  • A 32-bit application will run on a 32-bit or 64-bit OS without any problem.
  • But a 64-bit application will only run on a 64-bit OS and a 64-bit OS will only run on a 64-bit processor.
These two tables illustrate the same rule:


To run a 64-bit operating system you need support from the lower level: the 64-bit CPU.
To run a 64-bit application you need support from all lower levels: the 64-bit OS and the 64-bit CPU.
This simplification will be enough for us to look what happens when we mix the 32-bit and 64-bit parts. But if you want to understand the issue more deeply then you will also need to consider the hardware that supports the CPU and the device drivers that allow the OS and the applications to interface with the system hardware.

What 32-bit and 64-bit combinations are compatible and will work together?

This is where we get to the practicalities and can start answering common questions.
The general rule is that 32-bit will run on a lower level 64-bit component but 64-bit does not run on a lower level 32-bit component:
  • A 32-bit OS will run on a 32-bit or 64-bit processor without any problem.
  • A 32-bit application will run on a 32-bit or 64-bit OS without any problem.
  • But a 64-bit application will only run on a 64-bit OS and a 64-bit OS will only run on a 64-bit processor.
These two tables illustrate the same rule:

Table 1 — What is compatible if I have a 32-bit CPU?
Processor (CPU) 32-bit 32-bit 32-bit 32-bit
Operating System (OS) 32-bit 32-bit 64-bit 64-bit
Application Program 32-bit 64-bit 32-bit 64-bit
  Yes No No No

Table 2 — What is compatible if I have a 64-bit CPU?
Processor (CPU) 64-bit 64-bit 64-bit 64-bit
Operating System (OS) 64-bit 64-bit 32-bit 32-bit
Application Program 64-bit 32-bit 32-bit 64-bit
  Yes Yes Yes No

The main reason that 32-bit will always run on 64-bit is that the 64-bit components have been designed to work that way. So the newer 64-bit systems are backward-compatible with the 32-bit systems (which is the main reason most of us haven't moved to 64-bit software).
An example of backward compatibility is Windows 64-bit. It has software called WOW64 that provides compatibility by emulating a 32-bit system. See the article How Windows 7 / Vista 64 Support 32-bit Applications if you want to know more. One important point that is made in that article is that it is not possible to install a 32-bit device driver on a 64-bit operating system. This is because device drivers run in parallel to the operating system. The emulation is done at the operating system level so it is available to the higher layer, the application, but it is not available to the device driver which runs on the same level.

Hardware virtualization is the exception to the rule

Another question many people have is whether a 32-bit system can run 64-bit software. As more people are looking to use 64-bit Windows they are wanting to try it out on their existing systems. So we are getting more questions about whether they can run it on their 32-bit processor or under their 32-bit OS.
Following the general rule, we would expect that you cannot run 64-bit software on a 32-bit system. Except that there is one exception called virtualization.
Virtualization creates a virtual system within the actual system. Virtualization can be achieved in hardware or software but it works best if the virtual machine is created in the system hardware. The guest operating system is not aware that there is a host operating system already running. This is the way that a 64-bit operating system can think that it is running on 64-bit hardware without being aware that there is a 32-bit operating system in the mix.
Tables 3 and 4 illustrate the result. Provided that the virtual machine can actually be created and isolated by the virtualizing software then the host OS is effectively removed from the equation, so I've grayed it out. We can now apply the general rules for a non-virtualized system to the three remaining layers.
Table 3 — What is compatible if I have a 32-bit CPU and software virtualization?
Processor (CPU) 32-bit 32-bit 32-bit 32-bit
Host Operating System 32-bit 32-bit 32-bit 32-bit
Guest Operating System 32-bit 32-bit 64-bit 64-bit
Application Program 32-bit 64-bit 32-bit 64-bit
  Yes No No No
 
Table 4 — What is compatible if I have a 64-bit CPU and software virtualization?
Processor (CPU) 64-bit 64-bit 64-bit 64-bit
Host Operating System 32/64-bit 32/64-bit 32/64-bit 32/64-bit
Guest Operating System 64-bit 64-bit 32-bit 32-bit
Application Program 64-bit 32-bit 32-bit 64-bit
  Yes Yes Yes No
Before you hurry away to try running 64-bit in a virtual machine, you must check that your computer BIOS supports hardware virtualization. If it does not then hardware virtualization will not work even if the CPU does support it.

Emulation of the 64-bit CPU is not an option

All the feasible configurations that we have looked at so far have the processors (CPUs) running software that use the instruction set that is native to that processor. Running 64-bit software on a 32-bit processor doesn't work because the 64-bit instructions are not native to a 32-bit processor. But what if I could emulate a 64-bit processor using 32-bit software?
It is theoretically possible but practically impossible to emulate a 64-bit processor while running software on a 32-bit processor. Even if you can get non-native 64-bit emulation to work, the virtual machine that duplicates a 64-bit CPU would run very slowly because every 64-bit instruction has to be trapped and handled by the emulator. 64-bit memory pointers also have to be converted to work within the 32-bit address space.
Furthermore, my understanding is that the x86 (32-bit) processors used in PCs and Apple Macs are not able to completely emulate the x64 (64-bit) instruction set. Some 64-bit instructions cannot be trapped by the emulator. This causes the system to crash when the x86 processor tried to run those x64 instructions.

Answers to common questions about 32-bit and 64-bit systems

Will a 64-bit CPU run a 32-bit program on a 64-bit version of an OS?

Yes it will. 64-bit systems are backward-compatible with their 32-bit counterparts.

Will a 64-bit OS run a 32-bit application on a 64-bit processor?

Yes it will. Again, this is because of backward compatibility.

Can 64-bit applications contain 32-bit code?

Yes, many times 64-bit software will contain portions of 32-bit code.
Similarly 32-bit software (usually very old programs) can have some code in 16-bit which is why those 32-bit applications will usually fail to run properly on a 64-bit OS.

Can 16-bit applications or code run on 64-bit systems?

No, as we said previously. 16-bit code will NOT run on 64-bit OS because the designers did not provide backward-compatibility. This is one reason why some 32-bit programs will not work on 64-bit operating systems.

Can a 64-bit CPU with a 32-bit host OS run a virtual machine (VM) for a 64-bit guest OS?

Yes. It all depends upon the level of virtualization.
With software virtualization it is hardly likely to work, or if it does work it may be very slow.
Hardware virtualization will need to be supported by the CPU (e.g. with Intel-VT or AMD-V) and the BIOS.

Answers to common questions about 32- and 64-bit Windows

Can I run Windows 2000 and Windows XP on a 64-bit CPU, and use old software?

Yes, a 32-bit OS (Windows 2000 or XP) will run on a 64-bit processor.You should also be able to run older 32-bit software on a 64-bit OS.

Is a Windows Vista or Windows 7 license key valid for both 32-bit and 64-bit versions?

Yes, unless you have an OEM version. If it was installed on your computer when you bought it and you only have one Windows disk then it is almost certainly an OEM version and you will have to buy the other bit version if you want it. If you have two disks, one for 32-bit Windows and one for 64-bit Windows, then you have a non-OEM version so you get to choose which bit version you will use without having to buy another license. See Microsoft Answers for a discussion of these issues.
Remember, if you have only bought one license then, even if you have both bit versions on disk, you are only licensed to install and run one version on one computer.

How do find out if my system is 64-bit?

Microsoft provide resources to help you find out such as FAQ on 32-bit and 64-bit Windows and Taking the mystery our of 64-bit Windows.
I recommend that you look at downloading SecurAble from Gibson Research Corporation (GRC) which will tell you if you have a 64-bit processor with the useful features of hardware DEP and hardware virtualization.

How do I migrate my 32-bit system to 64-bit Windows?

There is no upgrade path from 32-bit to 64-bit Windows only from 64-bit Windows. You will almost certainly have to do a clean install of your 64-bit operating system, copy back your data files, and reinstall your 32-bit applications.
If you want to keep your old install then you can try dual booting or virtualization.

How do I run 32-bit software once I have installed 64-bit Windows?

Windows 7 64-bit provides a 32-bit compatibility mode called WOW32 (Windows 32-bit on Windows 64-bit) that should run most if not all your applications. See How Windows 64-bit supports 32-bit Applications.
If you have 32-bit application you want to run from the Command Prompt then you need to use the WOW64 version of cmd.exe. At the Start Menu select Run and enter the following command. Note that the %systemroot% variable points to your Windows folder so this will work even if Windows is not installed on C: drive:
%systemroot%\SysWOW64\cmd.exe

If your application won't run under Windows 64-bit then try XP Mode, Windows Virtual PC, or other virtualization solution. Be aware that XP Mode reduces your system security and so it should be used as a last resort.

How can I tell if my application is 32-bit or 64-bit?

There are a number of indicators of the bit type for your program but they are not definitive as you will see if you use guidelines like the following.
  • Windows installs your programs to these folders on your system drive:
    • '\Program Files' for 64-bit programs
    • '\Program Files (x86)' for 32-bit programs
  • In Task Manager, 32-bit processes will usually have a suffix of '*32' and 64-bit processes will not.
The reason that these indicators cannot be relied upon relates to the way 64-bit Windows installs software. 64-bit install packages usually install 64-bit applications or a mixture of 32- and 64-bit components but can even install only 32-bit components.
What determines where a component is installed is the registry setting for that component rather than the setting for the install package. Windows also assumes that all components are 32-bit unless told otherwise. This means that a 64-bit component not flagged as 64-bit will install to 32-bit folders and 32-bit registry keys but will execute as 64-bit.
You can, with the necessary knowledge, find the information yourself but there are better solutions:
  • Run a system information or audit tool such as Belarc Adviser. Just be aware that most of these types of applications are helpful but not definitive e.g. SIW, MSINFO.
  • I recommend running the PowerShell script from Auditing 32-Bit and 64-Bit Applications with PowerShell which will list all installed applications and their bitness. Just remember to run the 64-bit script to get all versions as the 32-bit script will not have access to the 64-bit portions of the registry.
  • If you want more detail about the modules used by a program then try Dependency Walker, which is also part of Microsoft development tools such as Visual Studio and Visual C++.
    As with other software running under 64-bit Windows you will get the best results if you run the 32- or 64-bit version of Dependency Walker that matches the application you want to check. Remember that Windows 64-bit restricts access to the relevant 32-bit or 64-bit portions of the registry.

What are the differences between Windows 32-bit and 64-bit?

I've chosen to highlight the physical and logical differences between each version of desktop Windows as shown in Table 5. This table illustrates the progressive improvement of Windows 64-bit and indicates that Windows has a long way to go before it exhausts the capabilities of 64-bit processors.
Many of the limits in the 64-bit versions of Windows are design choices rather than limitations of the 64-bit CPUs. The number of physical processors is the most obvious as Windows Server editions support many more.
Hardware is also limited by design. For example, while 64-bit AMD and Intel CPUs use 64-bit  memory pointers, the supporting chipsets only use a 52-bit physical address space (4 Petabytes) and a 48-bit virtual memory space (256 Terabytes). This is presently more than sufficient because Windows 7 64-bit only allows 192 GB of physical memory and 16 Terabytes (44-bits) of virtual memory.
Table 5: Physical and Logical limits for Windows Versions
Numbers in parentheses indicate extended settings that are not the default and require compatible hardware
Version: XP Vista 7
Version Bits: 32 64 32 64 32 64
System:            
Physical Processors 2 2 2 2 2 2
Logical Processors 32 64 32 64 32 256
System Cache 1 GB 1,024 GB 1 (2) GB 1,024 GB 1 (2) GB 1,024 GB
Physical Memory 4 GB 128 GB 4 GB 128 GB 4 GB 192 GB
Virtual Memory 4 GB 16,384 GB 4 GB 16,384 GB 4 GB 16,384 GB
Kernel 1 (2) GB 8 GB 2 GB 8 GB 2 GB 8 GB
User Process:            
Physical Memory 2 (3) GB 2 (4) GB 2 (3) GB 8 GB 2 (4) GB 8 GB
Virtual Memory 2 (3) GB 2 (8,192) GB 2 (3) GB 2 (8,192) GB 2 (4) GB 2 (8,192) GB
Note 1. I have used Gigabytes (GB) for consistency even though it would be convenient to convert  1,024 GB to 1 TB.
Note 2. I've excluded the first 64-bit version of Windows XP (2002) because it has a different architecture. It used Intel Itanium (IA-64) CPUs which had an x86 processor built-in for compatibility. It was replaced by AMD's 64-bit architecture (x86-64) which extended the x86 instruction set and worked so well that it has been licensed by Intel and other chip makers. The name is commonly shortened to x64 as it is the most common 64-bit CPU type today.

Monday 21 October 2013

Anonymous Surfing

JonDo 
To Protect Your Privacy..!!
JonDos publishes a new version of the JonDo-Software, an IP changer and IP anonymization program, that you can use for anonymous surfing in the Internet with high security anonymous proxy servers.

What is JonDo?

JonDo is an open source and free-of-charge program for Windows, Linux and MacOS X.
It hides the user's IP adress behind an anonymous IP address. In contrast to other anonymizers (VPNs, anonymous proxy servers), the user's anonymity stays protected even against the providers (operators) of the anonymous IP address.



Thursday 17 October 2013

Send anonymous email or SMS




Web site Sharpmail let's you send anonymous email and SMS messages to any recipient.
Sharpmail might come in handy in those delicate situations where you don't feel quite right about broaching a touchy subject with someone yourself. For example, say you write for a technology and productivity "weblog," and your boss keeps forwarding you videos of stupid dancing animals, but you don't have the heart to directly tell Gina your boss that you don't find them that funny. However, you might want to think long and hard about whether an anonymous email is the smartest plan of action, since it's likely to make the receiver a bit paranoid (or at least it would me).
On the other hand, you could use anonymous email for evil, but keep in mind that Sharpmail will give you up in a heartbeat if they feel you're violating any laws.


Anonymous SMS, Spoof SMS & How It Works

Anonymous SMS Text Message

- Fake SMS from number - Personal SMS outbox
- Global SMS coverage - No advertising
- SMS Delivery reports - No Sharpmail markings
- Delay SMS delivery - Unicode SMS supported
- Receive reply for free - Concatenated SMS
- Personal Address Book

Anonymous SMS is a mobile/cell phone text message that can be sent from any international number, or if you wish a name. Sharpmail allows you to send Anonymous SMS text messages to any global destination.

This unique addition is one of it's kind from Sharpmail, one of the first servive providers. All Anonymous SMS text messages are instantly delivered or delayed until a time and date you specify. Delivery Reports are updated in real time in your personal SMS outbox.

Sender information can contain up to 16 numeric digits or 11 alphanumeric characters. The maximum limit to the Anonymous SMS text message is the industry standard, 160 characters. We enable longer spoof sms messages using Concat SMS. We also support Unicode SMS (UCS2) to send messages in foreign characters. Unicode will reduce the limit of each Anonymous SMS text message to 70 characters. Sharpmail: The original solution to anonymous SMS.


Tuesday 15 October 2013

Sam Spade: The Swiss Army Knife of network analysis


 For a variety of network analysis and management functions, consider putting Sam Spade to work. As Jason Hiner explains, this free, downloadable utility offers a versatile suite of TCP/IP and internetworking tools

Every administrator’s computer contains a toolbox full of useful utilities for network management. These can include performance and diagnostic counters, network packet analyzers, remote control programs, administration modules for server software, and a variety of other tools. If your organization’s connected to the Internet 24/7, I would recommend that you consider adding Sam Spade to your toolbox. Sam Spade for Windows offers a suite of tools for protecting against spam on mail servers, analyzing and troubleshooting Web servers, and gathering information on Internet hosts.

Many of these utilities were previously available only on UNIX machines. Most are aimed at stopping and tracking down spammers. Nevertheless, you can also use Sam Spade to gather some great general information about your network. This information will help you identify areas where hackers can gather too much information about your hosts, in addition to helping you keep your mail servers protected from spam.

One of my favorite features of Sam Spade is that it’s free. If you’re a Windows user, simply go to their Web site and download the latest version. On the main page, you’ll also find online versions of many of these networking tools. These are helpful when you are away from your main workstation or at a computer connected to the Internet behind a very restrictive firewall. Otherwise, the Windows version of Sam Spade is preferable because of its fast and easy access to a variety of tools and because you can run a number of different inquiries simultaneously.

Configuration
Once you download Sam Spade and install it on your workstation, you’ll want to configure a few settings. First, open Sam Spade and click Edit | Options, as shown in Figure A. In the Basics tab, enter your default DNS server (or use DHCP), your e-mail address, so that you can do SMTP relay checking, and your ISP’s Web server, so that you can use the Awake feature to have Sam Spade send out periodic packets to keep a dial-up connection from being dropped.

Figure A
Basics tab of the Options dialog box


Using the tools
Sam Spade has a nice user interface, as shown in Figure B. It combines many of the traditional TCP/IP tools with some unique tools that give an administrator a great look at a network. Best of all, these tools are combined in one package. You’ll find versions of ping, nslookup, and traceroute. And the Sam Spade versions are intuitive and flexible, especially when compared to the Windows versions of these TCP/IP tools. For example, with the ping feature, you can set the number of echo requests you prefer on the toolbar; then, every time you use ping, it will use that setting. At the command line, you have to use a switch such as “ping -n 2” each time you want to set the echo number.

Figure B
Example of Sam Spade user interface


The traceroute feature is one of my favorites. You can do a fast traceroute or a slow traceroute. The fast traceroute gives you the quick list of hops your packet makes from your machine to a designated host. The slow traceroute is more like the traditional traceroute utility. However, both traceroute options provide a nice graph to accompany the information, as shown in Figure C.

Figure C
Graph using the fast traceroute function


Sam Spade also includes some traditional UNIX tools, such as whois and finger. Whois is actually the default tool. If you simply enter a domain such as techrepublic.com in the Sam Spade toolbar hostname field and press [Enter], Sam Spade will return the whois information on who owns the domain name, as well as other registration information, such as the technical contact for the domain.

In addition to nslookup, Sam Spade offers a more advanced DNS querying tool called dig, which requests all the DNS records for an individual host and/or a domain. An advanced whois tool, called “IP block whois,” tries to find who owns a block of IP addresses.

Spam is its specialty
The core of Sam Spade is in its spam tools:
  • SMTP VRFY: Checks to see whether an e-mail address is a true address or if it is being forwarded.
  • SMTP relay check: Measures the security of a mail server. It attempts to relay mail externally. If it is successful, the mail server is vulnerable to being exploited by spammers looking for a third-party machine to relay their mail.
  • E-mail header analysis: Allows you to paste an e-mail address from your mail client into the Sam Spade toolbar and analyze it with all of the standard tools.
  • Blacklist lookups and Abuse.net query: Both allow you to interact with Web sites (and organizations) that track down and report known spammers.

In addition to these anti-spamming tools, Sam Spade’s help files contain some good tutorials on tracking down spammers. See Spam-tracking 101 through Spam-tracking 104 in the Manuals and Tutorials category of the help files.

Useful Web site tools
The Sam Spade suite also provides some useful Web site tools. The Crawl Web tool, shown in Figure D, allows you to search a Web site based on specific query parameters you set. It also enables you to download all the documents of an entire Web site. The program includes a Web browser that offers a raw source-code view of a Web site rather than a graphical view. The browser doesn’t send any identifying information to the host Web server. In addition, it doesn’t support any plug-ins, scripting languages, or other browser add-ons, and it doesn’t actually render the HTML into a graphical format. As a result, it allows you to see meta fields, hidden form fields, white-on-white text, and other developer tricks for disguising information.

Figure D
Crawl Web tool


Sam Spade also includes some security tools that could send up some red flags if you decide to use them to look at information on other companies, especially large multinational organizations. These tools include a port scanner, a DNS zone transfer tool, and the SMTP relay checker. The port scanner in Sam Spade is fairly basic, as you can see in Figure E, but it’s functional. For a better port scanner, go to the Eeye Web site, which offers a freeware port scanner for Windows NT and a commercial port scanner for serious hacker prevention. If you use the port scanner on another network, be aware that you can set off hacker detection programs.

Figure E
Port scanner


The SMTP relay checker we discussed above can also set off alerts for companies that carefully guard against spamming. In order to use port scanning, SMTP relay checking, and zone transfers, you have to go to Edit | Options and then click on the Advanced tab, shown in Figure F. Here, you can select any of these tools you want to use.

Figure F
Selecting security tools in the Advanced tab


Zone transfers are extremely useful for testing your own domain to make sure hackers can’t gather valuable information about your systems architecture. Once you have enabled zone transfers, go to the fields at the top of the Sam Spade toolbar and enter your fully qualified domain name in the hostname field (on the left side) and enter the IP address of one of your DNS servers in the name server field (on the right side). Then click Tools | Zone Transfer. If you see Query refused, you’re in good shape. However, if you discover that Zone Transfer has provided a list of your DNS entries, your network is vulnerable. You’ll need to disable zone transfers on your DNS servers if you are managing your own name servers, or you’ll need to call your ISP and request that it disable zone transfers if it’s doing DNS for your Internet servers.

Saturday 12 October 2013

The Taliban’s Letter to Malala Yousafzai - Must Read









Miss Malala Yousafzai,

I am writing to you in my personal capacity this may not be the opinion or policy of Tehreek-e-Taliban Pakistan or other ****** faction or group.

I heard about you through BBC Urdu service for the first time, when I was in bannu prison, at that time I wanted to write to you, to advise you to refrain from anti-Taliban activities you were involved in. but I could not find your address and I was thinking how to approach you with real or pseudo name, my all emotions were brotherly for you because we belong to same Yousafzai tribe. Meanwhile the prison brake happened and I was supposed to be in hiding. when you were attacked it was shocking for me I wished it would never happened and I had advised you before.

Taliban attacked you, was it islamically correct or wrong, or you were deserved to be killed or not, I will not go in this argument now, let’s we leave it to Allah All mighty, He is the best judge. Here I want to advise you as I am already late, I wish I would have advised u in my prison time and this accident would never happened. First of all please mind that Taliban never attacked you because of going to school or you were education lover, also please mind that Taliban or Mujahideen are not against the education of any men or women or girl. Taliban believe that you were intentionally writing against them and running a smearing campaign to malign their efforts to establish Islamic system in swat and your writings were provocative.

You have said in your speech yesterday that pen is mightier than sword, so they attacked you for your sword not for your books or school. There were thousands of girls who were going to school and college before and after the Taliban insurgency in swat, would you explain why were only you on their hit list???

Now to explain you the second point, why Taliban are blowing up schools? The answer to this questions in that not only Taliban in KPK or FATA are blowing up the schools but Pakistan Army and Frontier Constabulary is equally involved in this issue. The reason for this action is common between them that is turning of schools into hide outs and transit camps once it comes under control of either party Pakistan Army or Taliban.

In 2004 I was in Swat, I was researching on the causes of failure of the first revolution attempt by Sufi Muhammad. I came to know that FC was stationed in the schools of swat in tehsil Matta and FC was using schools as their transit camps and hid outs. Now tell me who to blame???

Dozens of schools and colleges are being used by Pakistan Army and FC as their barracks in FATA, you can find out easily if you like. So when something sacred is turned lethal it needs to be eliminated this is the policy of Taliban.

Blowing up schools when they are not using strategically is not the Taliban job, some black sheep of local administration may be involved to extract more and more funds in the name of schools to fill their bank accounts.

it was shocking for me I wished it would never happened

Now I come to the main point that is EDUCATION, it is amazing that you are Shouting for education, you and the UNO is pretending that as you were shot due to education, although this is not the reason, be honest, not the education but your propaganda was the issue and what you are doing now, you are using your tongue on the behest of the others and you must know that if the pen is mightier than the sword then tongue is sharper and the injury of sword can be hailed but the injury of the tongue never hails and in the wars tongue is more destructive than any weapon.

I would like to share with you that Indian sub-continent was highly educated and almost every citizen was able to read or write before British invasion. Locals used to teach British officers Arabic, Hindi, Urdu and Persian. Almost every mosque was acting as school too and Muslim emperors used to spend a huge sum of money on education. Muslim India was rich in farming, silk, and jute and from textile industry to ship building. No poverty, no crises and no clashes of civilization or religion. Because the education system was based on noble thoughts and noble curriculum.

I want to draw your attention to an extract from the minute written by Sir T.B Macaulay to British parliament dated 2nd February 1835 about what type of education system is required in Indian sub-continent to replace the Muslim education system. He stated “We must at present do our best to form a class who may be interpreters between us and the millions whom we govern, –a class of persons Indian in blood and color, but English in tastes, in opinions, in morals and in intellect” This was and this is the plan and mission of this so called education system for which you are ready to die, for which UNO takes you to their office to produce more and more Asians in blood but English in taste, to produce more and more Africans in color but English in opinion, to produce more and more non English people but English in morale. This so called education made Obama, the mass murder, your ideal. isn’t it?

Why they want to make all human beings English? because Englishmen are the staunch supporters and slaves of Jews. Do you know Sir Syed Ahmed Khan, the founder and symbol of English education in India was a freemasons.

You say a teacher, a pen and a book can change the world, yes I agree with, but which teacher which pen and which book? It is to be specified, Prophet Muhammad Peace be upon him said I am sent as a teacher, and the book He sent to teach is Quran. So a noble and pious teacher with prophetic curriculum can change the world not with satanic or secular curriculum.

You have given the example that once a journalist asked a student that why a talib afraid of this education he replied a talib didn’t know what was in this book. The same I say to you and through you to whole world that why they afraid from the book of Allah because they don’t know what is in it. Taliban want to implement what is in the book of ALLAH and UNO want to implement what they have in man-made books. We want to connect the world to their creator through the book of Allah and UNO want to enslave the world to few evil creatures.


You have talk about justice and equality from the stage of and unjust institution, the place where you were standing uttering for justice and equality, all the nations are not equal there, only five wicked states have the veto power and rest of them are powerless, dozens of time when all the world untied against the Israel only one veto was enough to press the throat of justice.

The place you were speaking to the world is heading towards new world order, I want to know what is wrong the old world order? They want to establish global education, global economy, global army, global trade, global government and finally global religion. I want to know is there any space for the prophetic guidance in all above global plans? Is there any space for Islamic sharia or Islamic law to which UN call inhumane and barbaric? You have talk about attack on polio team, would you explain why the then American foreign secretary of state Henry Kissinger, a Jew, said in 1973 to reduce the third world population by 80%. Why the sterilization and eugenics programs are running in different countries in one way or another under the umbrella of UNO. More than 1 million Muslim women have been sterilized in Uzbekistan forcibly without their consent. Bertrand Russell writes in his book the impact of science on society, “diet, injections and injunctions will combine, from a very early age, to produce the sort of character and sort of beliefs that the authorities consider desirable and any serious criticism of power that be will become psychologically impossible”. This is why we have the reservation on so called polio vaccination program.

You say Malala day is not your day it is the day of every person who has raised voice for their rights, I ask you why such a day in not assigned to Rachel Corrie, only because the bulldozer was Israeli? Why such a day in not assigned to AffiaSiddique because the buyers are Americans? Why such day is not assigned to Faizan and Faheem because the killer was Raymond Davis? Why such a day in not assigned to those16 innocent afghan women and children who were shot dead by an American Robert Belas because he was not a talib. I ask you and be honest in reply, if you were shot but Americans in a drone attack, would world have ever heard updates on your medical status? Would you be called ‘daughter of the nation? Would the media make a fuss about you? Would General Kiyani have come to visit you and would the world media be constantly reporting on you? Would you were called to UN? Would a Malala day be announced?

More than 300 innocent women and children have been killed in drones attacks but who cares because attackers are highly educated, non-violent, peaceful Americans.

I wish, the compassion you learnt from Prophet Muhammad peace be upon him should be learnt by Pakistan Army so they could stop shedding of Muslim blood in FATA and Baluchistan. I wish, the compassion you learnt from Prophet Jesus should be learnt by USA and NATO so they should stop shedding blood of innocent Muslims across the world and I wish the same for followers of Buddha to stop killing of innocent unarmed Muslims in Burma, and Sri Lanka and wish the same for Indian army to follow Gandhi jee and stop genocide in Kashmir, And yes, The followers of bacha khan, the ANP has an example of non-violence in their five years regime in KPK province, for example Swat, where a single shot was not fired and we witnessed the followers of bacha khan implemented the philosophy of nonviolence in its true soul, with support of jets, tanks and gunships.

At the end I advise you to come back home, adopt the Islamic and pushtoon culture, join any female Islamic madrassa near your home town, study and learn the book of Allah, use your pen for Islam and plight of Muslim ummah and reveal the conspiracy of tiny elite who want to enslave the whole humanity for their evil agendas in the name of new world order.



All praises to Allah the creator of the Universe.



July 15, 2013. SOURCE

Friday 4 October 2013

Windows RT explained: Microsoft finally gets tablet computing right


Windows RT is a version of Microsoft’s upcoming Windows 8 operating system that has been tailored specifically for tablets and notebooks powered by ARM processors. The new OS represents a massive shift for the Redmond-based company, as it is both the first version to support ARM SoCs and the first iteration to enable interaction on a tablet as enjoyable as a mouse and keyboard are on the desktop version of the OS.
Until recently, Microsoft has seen tablets as a niche hardware, and has focused most of its development efforts on running Windows on traditional desktop and laptop computers. Tablets are no longer solely used in vertical markets and by graphic designers, however. Thanks to relatively low-priced ARM hardware running Apple’s iOS and Google’s Android operating system, tablets are used by millions of consumers as a secondary media consumption device — or in some cases in place of a traditional computer all together.
Thankfully, Microsoft has recognized the importance of supporting the growing tablet market and has put together a purpose-built OS that not only blows away Microsoft’s previous tablet “support” strategy of bolting on touchscreen and digitizer support to the traditional Windows desktop UI, but rivals the user interfaces of iOS and Android.
While the familiar Windows desktop is still present, it is merely one of many applications available on a brand new operating system featuring a touch-friendly user interface. The Modern UI (formerly Metro) Start screen is essentially the new desktop of Windows RT, and it has drawn inspiration from Microsoft’s Windows Phone mobile OS to bring live tiles, gestures, multitouch, cloud syncing, and an app store to Windows users.





The software

Windows has traditionally been a versatile operating system that is extremely customizable, but one trait that makes tablets like the iPad and Nexus 7 attractive devices is an intuitive interface that makes the computer easier to use. Surely, that is not of much concern to power users (who are likely the majority of the ET audience), but for most people it is of supreme importance.
Windows RT goes against Windows tradition by limiting customization to smaller aesthetic tweaks (think customized lock screen photo, Start screen background), and presents a screen of live tiles much like Windows Phone. From there, you can launch, switch, and close applications with touch gestures. You can re-size the live tiles and reorder them, but that is the extent of customization allowed on what is essentially the new Windows RT desktop.
Microsoft has further embraced multitouch and gestures to navigate around the operating system. Swipe gestures in particular are used throughout the OS, and if you have used a smartphone or tablet before, after a couple of minutes playing around with Windows RT you will be right at home.
App switching in Windows 8
Easily switch apps by swiping in from the left of the screen.
The user interface of Windows RT is designed to work well on high-pixel-density displays. The full-screen nature of the Start Screen and all of the applications also ensures that precious screen real estate on mobile devices is not wasted by taskbars, window borders, file menus, and other features of previous Windows versions. Instead Microsoft has tucked away menus behind an overlay that can be brought up by swiping up from the bottom of the touchscreen.
While it will vary from tablet to tablet, Windows RT feels surprisingly snappy, despite the wimpy ARM SoC powering it, and the interface in general is really quite joyous to use. Buttons are larger, and there are extremely few areas in the Metro UI where you run the risk of your finger(s) not being accurate enough to select the thing you want. The Office 2013 applications running on the desktop will have a touch mode where the buttons will be spread further apart to make it easier to select items in the ribbon as well.
Users can run up to two applications at a time side-by-side, but for the most part Windows RT encourages you to focus on one app at a time. Applications in the background are put to sleep to conserve battery life. The limited multitasking is also well-suited to ARM hardware where you do not have the same level of computing power and memory as an x86 desktop or laptop.

Next  Application,Security: