Showing posts with label INTERNET. Show all posts
Showing posts with label INTERNET. Show all posts

Friday, July 25, 2008

Reveal/recover lost password behind asterisks (***)

Many applications, like CuteFTP, CoffeeCup Free FTP, VNC, IncrediMail, Outlook Express, and others, allows you to type a password for using it in the application. The typed password is not displayed on the screen, and instead of the real password, you see a sequence of asterisk ('****') characters. This utility can reveal the passwords stored behind the asterisks in standard password text-boxes.
Asterisk Logger is a successor of AsterWin utility. It reveals the asterisk passwords in the same way as AsterWin utility, but it has some advantages over the previous utility:
  • You don't have to press a button in order to reveal the asterisk passwords. Whenever a new window containing a password box is opened, Asterisk Logger automatically reveals the password inside the password-box, and add a record to passwords list in the main window of Asterisk Logger.
  • Asterisk Logger displays additional information about the revealed password: The date/time that the password was revealed, the name of the application that contains the revealed password box, and the executable file of the application.
  • Asterisk Logger allows you the save the passwords to HTML file and to 3 types of text files.

Versions History

  • Version 1.04:
    • Fixed bug: The main window lost the focus when the user switched to another application and then returned back to Asterisk Logger.
  • Version 1.03:
    • The configuration is now saved to a file, instead of the Registry.
  • Version 1.02:
    • 'Copy Selected Items' now copies the items as tab-delimited line.
    • New option: Copy the password to the clipboard.
    • Added support for Windows XP style.
  • Version 1.01 - Add support for translation to other languages.
  • Versions 1.00 - First Release.

System Requirements

This utility works properly under Windows 9x, Windows ME, Windows 2000, and Windows XP. If you work on Windows NT, you should download the 'psapi.dll' and place it in your system32 directory. If you don't download this file under Windows NT, the Asterisk Logger utility will properly reveal the asterisk passwords, but it won't display the information about the application that contains the passwords. (Application and Executable File fields)

If you want to reveal a password stored behind asterisks in a Pocket PC device, you may try the PocketAsterisk and RemotePocketAsterisk utilities.

Known Limitations

This utility works fine with most password text-boxes, but there are some applications that don't store the password behind the asterisks, in order to increase their security. In such cases, Asterisk Logger will not be able to reveal the password.
The following applications and OS components don't store the password behind the asterisks:
  • Netscape 6.x (Passwords in the Web page)
  • Dialup and network passwords in Windows 2000
  • Windows NT/2000/XP user management tools.
Asterisk Logger also cannot reveal the passwords in Internet Explorer Web pages, Because they are stored in different way than in other applications. if you want to reveal the passwords behind the asterisks in Internet Explorer, you can download the AsterWin IE utility.

License

This utility is released as freeware for personal and non-commercial use. You are allowed to freely distribute this utility via floppy disk, CD-ROM, Internet, or in any other way, as long as you don't charge anything for this. If you distribute this utility, you must include all files in the distribution package, without any modification !

Disclaimer

The software is provided "AS IS" without any warranty, either expressed or implied, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. The author will not be liable for any special, incidental, consequential or indirect damages due to loss of data or any other reason.

Using Asterisk Logger

except for Windows NT, this utility doesn't require any installation process or additional DLLs. Just copy to executable to any folder you want, and run it.
Under Windows NT, you can still use this utility without any additional DLLs, but the information about the application that contains the asterisk password won't be displayed. In order to display the application information under Windows NT, you have to download psapi.dll and put it in your system32 directory. If this file is already exist on your system, you don't need to overwrite it.

In order to reveal the passwords inside asterisk text-boxes, follow the instructions below:

  1. Run the Asterisk Logger utility. The main window will appear, with no items in it.
  2. Open the windows that contains the asterisk text-box you want to reveal. The password will be instantly revealed inside the password box, and in addition, a record containing the password and other information will be added to the main window of Asterisk Logger utility.
  3. After you reveal all the passwords you need, you can select the desired passwords in the main window of Asterisk Logger, and save them into text or HTML file.

The Asterisk Logger utility also provides 2 additional options for using in special cases:

  • Log Changes In Password Box: If this option is checked, Asterisk Logger automatically traces all changes in the revealed password boxes, and whenever it find a change in the password, it instantly add a new record to the passwords list, which contains the new modified password. This option can be useful for some applications, like CuteFTP. When you open to site manager of CuteFTP, the password of the current selected FTP item is revealed. In order to easily reveal the passwords of other items, check this option, and then move through all items that you want to get their password. Each time you move into a new item, the password will be added to the list in the main window of Asterisk Logger.
  • Log Duplicate Passwords: This option is available only if the previous option is checked. If this options is checked, a modified password will be added even if it's identical to one of the previous passwords of the same password-box.


Download Asterisk Logger
For Windows NT only: Download psapi.dll

Track a user’s Internet Explorer History with IEHistoryView

Each time that you type a URL in the address bar or click on a link in Internet Explorer browser, the URL address is automatically added to the history index file. When you type a sequence of characters in the address bar, Internet Explorer automatically suggests you all URLs that begins with characters sequence that you typed (unless AutoComplete feature for Web addresses is turned off). However, Internet Explorer doesn't allow you to view and edit the entire URL list that it stores inside the history file.

This utility reads all information from the history file on your computer, and displays the list of all URLs that you have visited in the last few days. It also allows you to select one or more URL addresses, and then remove them from the history file or save them into text, HTML or XML file. In addition, you are allowed to view the visited URL list of other user profiles on your computer, and even access the visited URL list on a remote computer, as long as you have permission to access the history folder.

Versions History

Date Version Description
26/05/20081.37
  • Fixed bug: The main window lost the focus when the user switched to another application and then returned back to IEHistoryView.
08/09/20071.36
  • Added new option: Show All Google Searches.
30/05/20071.35
  • Updated the 'Select User Profile' option to work properly under Vista.
28/01/20071.34
  • Dates are now formatted according to user locale, instead of system locale in previous versions.
21/07/20061.33
  • A tooltip is displayed when a string in a column is longer than the column length.
  • New option: Copy URL. (Copy to the clipboard only the URL)
30/06/20061.32
  • Fixed bug: '???????????' string appeared in the title, while it should be empty.
  • Fixed bug: Wrong 'Modified Date' values on IE6 with XP/SP2 and IE7.
03/12/20051.31
  • -folder and -user options now can be used without a save command - for loading IEHistoryView with specified folder or user.
12/10/20051.30
  • New option: View All Subfolders - View all subfolders in one chunk.
  • New column: Subfolder - Display the Subfolder name when 'View all subfolders' option is turned on.
  • Added XP style support.
  • Fixed bug: Open links that doesn't contain the 'http://' string.
  • Added more accelerator keys.
27/06/20041.22
  • Bug fix: Typed URLs displayed even when this option is not selected.
01/06/20041.21
  • Ability to translate to other languages.
  • Copy to clipboard in tab-delimited format.
  • Minor changes in HTML reports.
14/01/20041.20
  • New option: View older URLs list from subfolders under the main history folder. ('Select History Subfolder' in File menu)
  • New option to create URL shortcuts of the selected URLs.
  • New option: Delete all items except...
  • Improvement in HTML report display to avoid oversized columns.
  • Clicking on the URL in HTML report opens the URL in new browser window.
21/12/20031.10 Added command-line support
01/11/20031.00 First Release

System Requirement

This utility works on any version of Windows operating system with Internet Explorer version 4.00 or greater.

Using IEHistoryView

IEHistoryView is provided as standalone executable, so it doesn't require any installation process or additional DLLs. Just copy the executable (iehv.exe) to any folder you like, and run it.
After you run it, the main window displays the list of all URLs stored in the history file of the current logged on user. If you want to view the history information of other users on your computer, choose the "Select User Profile" from the file menu, and select the desired user profile.
If you want to view the history information of another computer on a network, connect to the desired network drive, and from the File menu, choose "Select History Folder", and select the history folder in the remote drive.

The Typed URLs List

Most URLs that you visit are saved in the History folder. However, Internet Explorer also saves the last 25 URLs that you typed in the following Registry key: HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TypedURLs
By default, IEHistoryView doesn't display the URLs list from the Registry, but you can change this setting by choosing the "Display Typed URLs" option under the View menu. If this option is selected, the URLs list in the Registry are displayed, in addition to the list of all URLs stored in the History folder. You can distinguish between the 2 types of URLs by looking at the 'Hits' column or at the one of the dates columns. As opposed to the URLs extracted from the History folder, The URLs from the Registry doesn't provide any additional information except the URL itself, so the other columns contains 'N/A' string (Not Available).
Be aware that the typed URLs list can only be displayed for your local system. You cannot view the typed URLs list if choose to watch the history data from another computer or from another operating system.

Deleting URLs From The History File

IEHistoryView allows you to delete URL items from the history file and from the typed URLs list in the Registry. In order to that, select the URLs that you want to delete, and press the Del key.

Viewing Older History Information

In some circumstances, Internet Explorer saves some older history information in subfolders located under the main history folder. Starting from version 1.20, you can view the history information stored in these subfolders by using the 'Select History Subfolder' option in the File menu.

About The History Folder

The location of the history folder is different from one operating system to another.
On Windows 98, the history folder is located under your Windows directory. For example: If your Windows 98 is installed under c:\win98, the history folder is c:\win98\history
On Windows 2000/XP, the History folder is located inside "Local Settings" folder of your user profile. For Example: C:\Documents and Settings\Administrator\Local Settings\History. The "Local Settings" folder is hidden by default, so you won't see this folder unless your system is configured to display hidden files and folders.
In most systems, IEHistoryView automatically identify your current History folder and uses it as default. However, you can always select History folder from another location by using the "Select History Folder" option under the File menu.

Be aware that when you watch the History folder from Windows environment, it doesn't show you the real files inside this folder, but instead it displays the history shell extension that provides limited information about the sites you visited.

Command-Line Options

Syntax: iehv [/Action] ["Destination File"] {-Source Type} {"Source"}

[/Action] can be one of the following options:

/stext Saves the URLs list into a text file specified in ["Destination File"] parameter.
/stab Saves the URLs list into tab-delimited text file specified in ["Destination File"] parameter.
/shtml Saves the URLs list into HTML file specified in ["Destination File"] parameter.
/sverhtml Saves the URLs list into vertical HTML file file specified in ["Destination File"] parameter.
/stabular Saves the URLs list into tabular text file specified in ["Destination File"] parameter.
/sxml Saves the URLs list into xml file specified in ["Destination File"] parameter.

The {-Source Type} parameter is optional. If you don't specify it, the URLs will be loaded from the default History folder on your system.
This parameter may contain one of the following values:

-folder Loads the URLs list from the folder specified in {"Source"} parameter.
-user Loads the URLs list of the user specified in {"Source"} parameter.

Examples:
iehv -folder "c:\Documents and Settings\Administrator\Local Settings\History"
iehv /shtml "c:\temp\urls.html"
iehv /stext "c:\temp\urls.txt" -user admin2
iehv /stext "c:\temp\urls1.txt" -folder "c:\windows\history"

Translating to other languages

IEHistoryView allows you to easily translate all menus, dialog-boxes, and other strings to other languages.
In order to do that, follow the instructions below:
  1. Run IEHistoryView with /savelangfile parameter:
    iehv.exe /savelangfile
    A file named iehv_lng.ini will be created in the folder of IEHistoryView utility.
  2. Open the created language file in Notepad or in any other text editor.
  3. Translate all menus, dialog-boxes, and string entries to the desired language.
  4. After you finish the translation, Run IEHistoryView, and all translated strings will be loaded from the language file.
    If you want to run IEHistoryView without the translation, simply rename the language file, or move it to another folder.

License

This utility is released as freeware. You are allowed to freely distribute this utility via floppy disk, CD-ROM, Internet, or in any other way, as long as you don't charge anything for this. If you distribute this utility, you must include all files in the distribution package, without any modification !

Disclaimer

The software is provided "AS IS" without any warranty, either expressed or implied, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. The author will not be liable for any special, incidental, consequential or indirect damages due to loss of data or any other reason.

Feedback

If you have any problem, suggestion, comment, or you found a bug , you can send a message to author nirsofer@yahoo.com

Download IEHistoryView

Wednesday, July 23, 2008

TRACK IP ADDRESS

1. Log into your Gmail account with your username and password.
2. Open the mail.
3. To display the headers,
* Click on More options corresponding to that thread. You should get a bunch of links.
* Click on Show original
4. You should get headers like this:
Gmail headers : name
Look for Received: from followed by a few hostnames and an IP address between square brackets. In this case, it is

65.119.112.245.
That is be the IP address of the sender!
5. Track the IP address of the sender

ERROR CODES

Error Codes Meaning

400 This is bad request error, First check you may be typing wrong URL name and server could not understand your request.

401 You are trying to open any unauthorized access site or page. Check your username and password if you are trying to open any webpage.

402 Payment Required Error

403 You are trying to open any forbidden page and you are blocked by that domain.

404 Here you are trying to open the webpage that was removed or re-named, also check the URL spelling.

408 This is time out error. you should send the request with in time that the server set for you

Sunday, July 20, 2008

GMail Anti Virus Scanner

Do you want to send MP3 songs and videos by gmail ? Or want to attach software executables (.exe) to your gmail email ? Read this guide.

When you send and receive attachments with GMail, they're auto scanned for viruses. If Gmail thinks your mail has viruses, it will attempt to clean the file or remove it. But if it detects a virus and can't remove it, then you won't be able to download it.

Thanks to the new GMail Anti Virus Scanner, you cannot send or receive emails with exe, dll, ocx, com or bat attachments even if they are sent in a zipped (.zip, .tar, .tgz, .taz, .z, .gz) format (The .rar format is still allowed)

GMail has some the best spam filtering and phishing detection capabilities but the GMail virus scanning is a bit disappointing. When I tried to email a Firefox 1.5 installer to a colleague, GMail uploaded the entire file (Firefox Setup 1.5.exe 4.98 MB) and then threw this alert:

This is an executable file. For security reasons, Gmail does not allow you to send this type of file.

This is such a poor solution. GMail Virus Scanner didn't scan the attachment, it just blocked it since it was an exe file. Why is Google calling it an AntiVirus scanner when it is merely blocking attachments of certain types like .exe? Yahoo! webmail too have an anti-virus but they accept .exe files since the yahoo anti-virus would scan even exe files and clean them if found infected.

Secondly, why did GMail upload the entire exe file to its server for scanning but didn't scan since it was an exe.? The GMail file uploader should be smart enough to disallow users from uploading files with extensions like exe, com, ocx, etc.

Google has no plans to make the "limited" antivirus feature optional, nor does it plan to stop blocking executables. Yahoo! Mail uses Symantec software to scan for viruses. Hotmail licenses its technology from Trend Micro. Google isn’t saying which vendor is providing the antivirus technology.

Since you cannot Turn Off GMail Anti Virus Scanning, you can use these GMail hacks to send program file (exe), virus samples and other blocked formats with GMail:

Technique 1. Use a free file hosing online service like Rapidshare, Megaupload or Yousendit to upload your file and send the link of the uploaded file in your GMail message.

2. Rename the file: Change the file extension to fool the GMail scanner. The new attachment could contain instructions making it easier for the recepient to derive the actuall attachment type. For instance,

Rename Adobe-Reader.exe to Adobe-Reader.exe.removeme

3. If you have lot of exe files to send, put them in a zip file and change the extension of the zip file as mentioned in the previous step. Remember that GMail denies zip attachments that contain exe files. Pass-Protection won't work either since GMail can examine exe filenames even in password protected zipped files as the archived filename listings are not encrypted by the Zip program.

4. Use a different compression software like WinRAR which compresses files in .rar format. GMail is currently not scanning or blocking .rar filetypes. But there is a high probability that GMail might support rar formats in future. In that case, you can consider splitting the rar files and attaching them separately (like .r1, .r2..)

Important: I would recommend only the first technique since all others violate Google policies and Google could even terminate your GMail account.

Sending Virus infected files with GMail: Yes, it is against the GMail TOS to send viruses in email but occasionally, we need to mail an infected file for reporting purposes to an antivirus vendor. Like the Symantec Security Response center encourages users to submit virus samples for analysis. You can use any of the above techniques to bypass the virus scanner and attach infected files in your emails.

Now that limited virus scanning is in, we can expect GMail to move quickly out of the beta once the GCal (Google Calendar) application is available. The Google Calendar domain is already live.

Awesome Gmail tip

Let’s say that your email address is ‘GeorgeBush@gmail.com’, basically everything sent to any of the following email addresses will be forwarded to your primary email.

* GeorgeBush@gmail.com
* G.eorgeBush@gmail.com
* Ge.orgeBush@gmail.com



* GeorgeBus.h@gmail.com



* GeorgeBush@googlemail.com
* G.eorgeBush@googlemail.com
* Ge.orgeBush@googlemail.com



* GeorgeBus.h@googlemail.com

And that’s not all, you can place as many dots as you want, it can be even something like ‘G.e.o.r.g.e.B.u.s.h@gmail.com’ and you’ll still get it on ‘GeorgeBush@gmail.com’

Additionally, I just also found out that you can embed random text to your email ID using ‘+’ sign. That is to say ‘GeorgeBush+anythingyouwant@gmail.com’ can be used as your email address, as well.

Ok I got it. Now what ?

1. One email for every purpose

Instead of using different email addresses for various purposes (work, school, friends, etc.) you can use different variations of your Gmail and filter incoming mails by ’sent to’ address. For instance, all incoming mail sent to ‘Name.Surname@gmail.com’ can be put to folder ‘work’, messages sent to ‘NameSurname@gmail.com’ can be put to ‘friends’, ‘N.ameSurname@gmail.com’ can be used for newsletters, and so on.

2. Track/Block spammers

When signing up for some website, say thatwebsite.com, you can add thatwebsite to your Gmail user ID (eg. GeorgeBush+thatwebsite@gmail.com). This way you can block your subscription whenever you want and even identify those websites that distribute your email address to spammers.