Secret Codes for Android Mobile Phones

0 comments
Hello Friends, today i am going to share several secret trick codes for Androids Mobile Phones. These android trick codes will help you to trick android cellphones and help you to explore more about your android Phone.

Secret trick codes are those codes which are usually hidden from users for any misuse and exploit. As we all know android is very new platform and thus very few trick codes of androids are there on internet. Today i am sharing all the trick codes of android cellphones that i know. And i surely hope you can't find codes better than that. So friends let's trick and explore our android Phones. I have tested these codes on my Phone Samsung Galaxy having an Android OS version 2.2. I am sure these will work on all previous versions.



Secret Tricking codes for Android Mobile Phones:

1. Complete Information About your Phone  

*#*#4636#*#*
 This code can be used to get some interesting information about your phone and battery. It shows following 4 menus on screen:
  • Phone information
  • Battery information
  • Battery history
  • Usage statistics

2. Factory data reset
*#*#7780#*#*
This code can be used for a factory data reset. It'll remove following things:
  • Google account settings stored in your phone
  • System and Applica data and settings
  • Downloaded applications
It'll NOT remove:
  • Current system software and bundled application
  • SD card files e.g. photos, music files, etc.
Note: Once you give this code, you get a prompt screen asking you to click on "Reset phone" button. So you get a chance to cancel your operation.

3. Format Android Phone

  *2767*3855#
Think before you give this code. This code is used for factory format. It'll remove all files and settings including the internal memory storage. It'll also reinstall the phone firmware.
Note: Once you give this code, there is no way to cancel the operation unless you remove the battery from the phone. So think twice before giving this code.

4. Phone Camera Update

*#*#34971539#*#*
This code is used to get information about phone camera. It shows following 4 menus:
  • Update camera firmware in image (Don't try this option)
  • Update camera firmware in SD card
  • Get camera firmware version
  • Get firmware update count
WARNING: Never use the first option otherwise your phone camera will stop working and you'll need to take your phone to service center to reinstall camera firmware.

5. End Call/Power

*#*#7594#*#*
This one is my favorite one. This code can be used to change the "End Call / Power" button action in your phone. Be default, if you long press the button, it shows a screen asking you to select any option from Silent mode, AirPlane mode and Power off.
You can change this action using this code. You can enable direct power off on this button so you don't need to waste your time in selecting the option.

6. File Copy for Creating Backup

*#*#273283*255*663282*#*#*

This code opens a File copy screen where you can backup your media files e.g. Images, Sound, Video and Voice memo.

7.  Service Mode

*#*#197328640#*#*
This code can be used to enter into Service mode. You can run various tests and change settings in the service mode.

8. WLAN, GPS and Bluetooth Test Codes:

*#*#232339#*#* OR *#*#526#*#* OR *#*#528#*#*           - WLAN test (Use "Menu" button to start various tests)

*#*#232338#*#*                  - Shows WiFi MAC address

*#*#1472365#*#*                - GPS test

*#*#1575#*#*                      - Another GPS test

*#*#232331#*#*                  - Bluetooth test

*#*#232337#*#                    - Shows Bluetooth device address

9. Codes to get Firmware version information:

*#*#4986*2650468#*#* - PDA, Phone, H/W, RFCallDate

*#*#1234#*#* - PDA and Phone

*#*#1111#*#* - FTA SW Version

*#*#2222#*#* - FTA HW Version

*#*#44336#*#* - PDA, Phone, CSC, Build Time, Changelist number

10. Codes to launch various Factory Tests:

*#*#0283#*#* - Packet Loopback

*#*#0*#*#* - LCD test

*#*#0673#*#* OR *#*#0289#*#* - Melody test

*#*#0842#*#* - Device test (Vibration test and BackLight test)

*#*#2663#*#* - Touch screen version

*#*#2664#*#* - Touch screen test

*#*#0588#*#* - Proximity sensor test

*#*#3264#*#* - RAM version


some-site-u-never-visited-before

0 comments
Hey!! check out these cool sites -
Imagination


Superb Clock
Check Your Age On Other PLanets
Great Clock
Ring tones That Only Kids Can Hear
CHAT Acronyms
20 Useless Bodyparts
Online Notepad
Free download fonts
Universal Currency Converter
Cool Text

important computer tricks needed our daily life

0 comments
Hello Guys ...... i am trying to post some of the computer tricks which are needed in our day to day life......
U are also requested to post some computer tricks if u have them....
Your valuable replies and comments are needed.....
Trick no 1:
Disable autorun of CD...
click on Start
>run
>type gpedit.msc
Then click on
>Computer Configuration
> Administrative templates
>System
>turn autoplay off and modify it
.

Play Movie in mspaint

0 comments
uysss......... here iam share it again with another trick........ Play movie in mspaint with simple stepss......
Step 1. play video on Desktop........ press Print Screen/SysRq key button whil;e playing
2. Next open Pbrush(mspaint)
3.press Cntrl+V in mspaint.......
thats it................ I'll b back with other trick soon

19 secrets of xp

0 comments
1. It boasts how long it can stay up. Whereas previous versions of Windows were coy about how long they went between boots, XP is positively proud of its stamina. Go to the Command Prompt in the Accessories menu from the All Programs start button option, and then type 'systeminfo'. The computer will produce a lot of useful info, including the uptime. If you want to keep these, type 'systeminfo > info.txt'. This creates a file called info.txt you can look at later with Notepad. (Professional Edition only).

2. You can delete files immediately, without having them move to the Recycle Bin first. Go to the Start menu, select Run... and type ' gpedit.msc'; then select User Configuration, Administrative Templates, Windows Components, Windows Explorer and find the Do not move deleted files to the Recycle Bin setting. Set it. Poking around in gpedit will reveal a great many interface and system options, but take care -- some may stop your computer behaving as you wish. (Professional Edition only).

3. You can lock your XP workstation with two clicks of the mouse. Create a new shortcut on your desktop using a right mouse click, and enter 'rundll32.exe user32.dll,LockWorkStation' in the location field. Give the shortcut a name you like. That's it -- just double click on it and your computer will be locked. And if that's not easy enough, Windows key + L will do the same.

4. XP hides some system software you might want to remove, such as Windows Messenger, but you can tickle it and make it disgorge everything. Using Notepad or Edit, edit the text file /windows/inf/sysoc.inf, search for the word 'hide' and remove it. You can then go to the Add or Remove Programs in the Control Panel, select Add/Remove Windows Components and there will be your prey, exposed and vulnerable.

5. For those skilled in the art of DOS batch files, XP has a number of interesting new commands. These include 'eventcreate' and 'eventtriggers' for creating and watching system events, 'typeperf' for monitoring performance of various subsystems, and 'schtasks' for handling scheduled tasks. As usual, typing the command name followed by /? will give a list of options -- they're all far too baroque to go into here.

6. XP has IP version 6 support -- the next generation of IP. Unfortunately this is more than your ISP has, so you can only experiment with this on your LAN. Type 'ipv6 install' into Run... (it's OK, it won't ruin your existing network setup) and then 'ipv6 /?' at the command line to find out more. If you don't know what IPv6 is, don't worry and don't bother.

7. You can at last get rid of tasks on the computer from the command line by using 'taskkill /pid' and the task number, or just 'tskill' and the process number. Find that out by typing 'tasklist', which will also tell you a lot about what's going on in your system.

8. XP will treat Zip files like folders, which is nice if you've got a fast machine. On slower machines, you can make XP leave zip files well alone by typing 'regsvr32 /u zipfldr.dll' at the command line. If you change your mind later, you can put things back as they were by typing 'regsvr32 zipfldr.dll'.

9. XP has ClearType -- Microsoft's anti-aliasing font display technology -- but doesn't have it enabled by default. It's well worth trying, especially if you were there for DOS and all those years of staring at a screen have given you the eyes of an astigmatic bat. To enable ClearType, right click on the desktop, select Properties, Appearance, Effects, select ClearType from the second drop-down menu and enable the selection. Expect best results on laptop displays. If you want to use ClearType on the Welcome login screen as well, set the registry entry HKEY_USERS/.DEFAULT/Control Panel/Desktop/FontSmoothingType to 2.

10. You can use Remote Assistance to help a friend who's using network address translation (NAT) on a home network, but not automatically. Get your pal to email you a Remote Assistance invitation and edit the file. Under the RCTICKET attribute will be a NAT IP address, like 192.168.1.10. Replace this with your chum's real IP address -- they can find this out by going to www.whatismyip.com -- and get them to make sure that they've got port 3389 open on their firewall and forwarded to the errant computer.
11. You can run a program as a different user without logging out and back in again. Right click the icon, select Run As... and enter the user name and password you want to use. This only applies for that run. The trick is particularly useful if you need to have administrative permissions to install a program, which many require. Note that you can have some fun by running programs multiple times on the same system as different users, but this can have unforeseen effects.

12. Windows XP can be very insistent about you checking for auto updates, registering a Passport, using Windows Messenger and so on. After a while, the nagging goes away, but if you feel you might slip the bonds of sanity before that point, run Regedit, go to HKEY_CURRENT_USER/Software/Microsoft/Windows/Current Version/Explorer/Advanced and create a DWORD value called EnableBalloonTips with a value of 0.

13. You can start up without needing to enter a user name or password. Select Run... from the start menu and type 'control userpasswords2', which will open the user accounts application. On the Users tab, clear the box for Users Must Enter A User Name And Password To Use This Computer, and click on OK. An Automatically Log On dialog box will appear; enter the user name and password for the account you want to use.

14. Internet Explorer 6 will automatically delete temporary files, but only if you tell it to. Start the browser, select Tools / Internet Options... and Advanced, go down to the Security area and check the box to Empty Temporary Internet Files folder when browser is closed.

15. XP comes with a free Network Activity Light, just in case you can't see the LEDs twinkle on your network card. Right click on My Network Places on the desktop, then select Properties. Right click on the description for your LAN or dial-up connection, select Properties, then check the Show icon in notification area when connected box. You'll now see a tiny network icon on the right of your task bar that glimmers nicely during network traffic.

16. The Start Menu can be leisurely when it decides to appear, but you can speed things along by changing the registry entry HKEY_CURRENT_USER/Control Panel/Desktop/MenuShowDelay from the default 400 to something a little snappier. Like 0.

17. You can rename loads of files at once in Windows Explorer. Highlight a set of files in a window, then right click on one and rename it. All the other files will be renamed to that name, with individual numbers in brackets to distinguish them. Also, in a folder you can arrange icons in alphabetised groups by View, Arrange Icon By... Show In Groups.

18. Windows Media Player will display the cover art for albums as it plays the tracks -- if it found the picture on the Internet when you copied the tracks from the CD. If it didn't, or if you have lots of pre-WMP music files, you can put your own copy of the cover art in the same directory as the tracks. Just call it folder.jpg and Windows Media Player will pick it up and display it.

19. Windows key + Break brings up the System Properties dialogue box; Windows key + D brings up the desktop; Windows key + Tab moves through the taskbar buttons
.

How to Trace an Email Address Using Header

0 comments
How to Trace an Email Address Using Header



What is an Email Header?

Email header is small piece of information that go with every email and have informations about sender, receiver, date, subject, type of email, route etc.Its used to trace email path and location of sender. icon smile How to Trace an Email Address Using Header
How to Extract Email Header?

  
    Yahoo and Hotmail users checkout this site, Cyberforensics
Click Here To Trace

Trace Email Using E-Mail Tracer

1. Goto this page.
2. Click E-Mail Tracer under navigation menu in left side.
3. Just copy and paste email header and click Start Tracing.


4. It will display the path traced by the mail.

Data Loss In FAT File System If FAT Table Is Not Updated Regularly

0 comments
Data Loss In FAT File System If FAT Table Is Not Updated Regularly
Are you unable to find or access the files stored on your FAT file system partition? Is you FAT file system partition of Windows computer is damaged and inaccessible? This behavior may occur due to file system corruption, partition table damage, and other similar situations. In such circumstances, you come across partition loss and data loss situations. To get your mission critical and valuable data back, Windows Data Recovery becomes need of hour, if the backup is either not updated or unavailable.
FAT is so far the most simplistic of Windows file systems. The FAT is characterized by FAT (File Allocation Table) table. It is actually a table, which resides at very top of FAT file system volume. In order to protect the Windows volume/partition, two copies of FAT table are kept if one gets damaged. Along with this, the root directory and the FAT tables must be stored at a fixed storage location so that boot files of your system can be located correctly.
A hard drive formatted with the FAT file system is allocated in the clusters. The size of clusters is determined by size of Windows partition. When you create a file on FAT partition, an entry in the directory is created and first cluster number having data is demonstrated. The entry in FAT file system table either points to next cluster or indicates that it is the ending cluster of file.
It is quite essential as well as a time consuming process to update the file allocation table. If you do not regularly update the FAT table, it may lead to critical file system issues and data loss. It is a time consuming process because the hard drive read head needs to be repositioned to logical track zero of the hard drive every time when you update the FAT table.
There is no management of FAT directory structure and the files that are given first open storage location on hard drive. Along with this, FAT file system supports only hidden, read-only, archive, and system file attributes.
In case of data loss, Partition Recovery Tools to help you to retrieve lost, missing and inaccessible data. The applications are powerful enough to Recover inaccessible Partition in most of the partition loss situations, through high-end scanning techniques. With simple user-interface and non-destructive conduct, they enable easy and safe recovery.
Windows Data Recovery is the most advanced application that ensure absolute Windows Data Recovery in all cases of data loss. The software recovers data from FAT16, FAT32, VFAT, NTFS, and NTFS5 file system partitions. It is usable with Microsoft Windows 7, Vista, 2003, XP, and 2000.

Turn Off Unneeded Services,Speed Up PC

0 comments
Here is a list of services that can be turned off
this will speed up your pc a bit


  • right click my computer
  • manage
  • services and applications
  • services

set these to disabled you will need to reboot for them to take effect if you have a problem with any just reenable them again ie if you have a smart card and you disable it wont work

alerter
application layer gateway service
application management
ati hotkey poller
automatic updates
background intelligent transfer service
clipbook
com+ event system
com+ system application
distributed transaction coordinator
error reporting service
fast user switching compatibility
help and support
human interface device access
imapi cd burning com service
indexing service
internet connection firewall(icf)/internet connecton sharing(ics)
ipsec services
logical disk manager
logical disk manager administrative service
messenger
ms software shadow copy provider
net logon
netmeeting remote desktop sharing
network dde
network dde dsdm
nt lm securtiy support provider
performance logs and alerts
portable media serial number service
qos rsvp
remote desktop help sesson manager
remote registry
removable storage
secondary logon
security accounts manager
server
smart card
smart card helper
ssdp discovery service
system restore service
task scheduler
tcp/ip netbios helper
telnet
terminal services
uninterruptible power supply
universal plug and play device host
upload manager
video proes
volume shadow copy
webclient
windows time
wireless zone configuration
wmi performance adapter
workstation

Shocking News About Ctrl+c (the 'copy' Cmd)

0 comments
Shocking News About Ctrl+c (the 'copy' Cmd)

> Please be very careful when u press Ctrl + C ..

> Here is some useful information for all.

> Ctrl+C may be the most important work we do
> everyday. But it's
> not a very
> safe thing to do. Read on to know why.

> What happens when you press Ctrl+C while you are
> Online... We do
> copy various data by Ctrl + C for copying & pasting
> elsewhere.

> This copied data is stored in clipboard and is
> accessible from
> the net by
> a combination of Javascripts and ASP.

> Just try this:
> 1) Copy any text by Ctrl + C
>
> 2) Click the Link: <>


> 3) You will see the text you copied was accessed by
> this web
> page.

> Do not keep sensitive data (like passwords, credit
> card numbers,
> PIN etc.)
> in the clipboard while surfing the web. It is
> extremely easy to
> extract
> the text stored in the clipboard to steal your
> sensitive
> information.

See a suggestion from an expert:

> You can stop tricking of clipboard content by doing:

> Go to internet options of explorer -_ tools menu ->
> Internet
> option -> Security Custom level

> In settings - Select disable under allow past
> operations via
> script.

Tricks Google Sphere - Have fun with Google

0 comments
Google Sphere - Have fun with Google
Google is one of the most popular search engine in the world. Google is basically for searching but you can have fun with google. Now here is one more google fun trick.




Google Sphere - Google Sphere is a fun trick. It will start rotating all links on google in sphere. you can change rotation of sphere by moving cursor. Its for image search. Type any keyword to search image, now you have to struggle to click on search image button as it is rotating with sphere. On clicking of search button, search result images appears and they will also rotate in sphere.

Here are steps for google Sphere, just try this:

1). Go to Google homepage.

2). Type Google sphere.

3). Click on i m feeling lucky.
See the outcome... enjoy....

Speaking Computer Without Software

0 comments
This is the tutorial that teaches you to make your own software that speaks

first of all open the notepad then type the following things there

Dim message, sapi
message=InputBox("What do you want me to say?","computertipsnfacts.blogspot.com")
Set sapi=CreateObject("sapi.spvoice")
sapi.Speak message

Now save the file in .vbs extension. it will work..

Saturday, July 17, 2010 Disk I-O Error - Status 00000001 Error in Microsoft Windows

0 comments
When you attempt to start your Microsoft Windows computer, you might come across some error messages that indicate missing OS loader and input/output errors. In such situations, the system can not boot up and you can not get into it to access your hard drive partitions and data. This behavior of Microsoft Windows causes partitions loss and requires Partition Recovery solutions to be fixed.

In a practical scenario, when you start an NT based version of Microsoft Windows, you might encounter the following error message:

"OS Loader v4.01
Disk I/O Error: Status 00000001
Windows NT could not start because the following file is missing or corrupt:
%SystemRoot%\System32\Ntoskrnl.exe
Please reinstall a copy of this file."

After this error message, the boot process gets halted. At this point, you need to find out the cause of this problem and carry out Partition Recovery by resolving it.

Root of the issue
You may come across this behavior of Microsoft Windows if any of the below given situations is true:

  • You use any third party disk partitioning tool to expand the size of system partition.
  • You apply either a software update or service pack, which replaces the Windows system files and files that are needed to start MS Windows.
Nevertheless the cause of the above error message, the ultimate result would be the loss of your mission critical data. In such cases, resolving the issue becomes significant for retrieving lost data.

Resolution
In order to sort out this problem and gain access of your critical data, use following methods:
  • Format the hard drive and partition it to increase or decrease the size of system partition.
  • Carry out clean reinstallation of the operating system and then install latest updates.
  • If you have current and complete backup of your data, then restore it to get your data back.
Though, these methods may help you, but also have some disadvantages. Repartitioning and formatting removes all of your critical data from hard drive. In case of unavailability of backup, the situations may become more critical. In such case, Partition Recovery Software comes for your help.

These are powerful and advanced third party applications that use efficient and effective scanning mechanisms to scan the hard drive, locate lost partitions and recover them. With interactive and simple user interface, the Partition Recovery Software are very easy to use.

Create a shortcut for locking the Computer Screen in Windows 7

0 comments

There are many ways in which you can lock the computer screen. The most popular as well as the fastest way to lock it is to use a keyboard shortcut. The keyboard shortcut used to lock the computer screen is Win+L. A few of us choose to utilize the mouse to lock it. And of course many people like to use both the options.
There is another method in which we can lock the computer screen. It is to create a shortcut for locking the computer screen in Windows 7. You can create a shortcut for locking the computer screen in Windows 7, XP and Vista too. Follow these steps in order to create a shortcut for locking the computer screen in Windows 7 as well as other editions.
Step 1
1. Right-click on the desktop where you would like to create the shortcut.
2. Point to New
3. Click on Shortcut from the menu.

Step 2
Type in this text in the shortcut textbox –   rundll32.exe user32.dll, LockWorkStation

Click on the Next button.
Type in a name for your shortcut.
Click on the Finish button.
You have successfully created a shortcut to lock your workstation. Just click on the shortcut whenever you want to lock the computer screen.

How to upload profile picture in a blog account

0 comments

If you have not set an image in your Blog account, you should follow these few steps. Just register an id in Gravatar.
Your Gravatar is an image that follows you from site to site appearing beside your name when you do things like comment or post on a blog. Avatars help identify your posts on blogs and web forums, so why not on any site?

Bangla Typing Software Avro Keyboard 5.1.0

0 comments

Avro Keyboard is the best Bangla typing software i ever seen. And the great thing is, this application is absolutely free. You should try this.
  • English to Bangla Phonetic Typing
  • Traditional Keyboard Layout Based Typing
  • Automatic Vowel Forming
  • Old Style “Reph”
  • Easy Mouse Based Bangla Typing
  • Bangla spell checker
  • Both Unicode and ANSI typing support
mediafire
direct

Use android application from your pc or laptop

0 comments
No problem you have an android phone or not , now you can use any android application by your laptop or desktop.
Lets follow the instruction
1.download BlueStacks App Player from HERE
2.install that software then open.
3.Right click on your android application which you want to run via your pc & click > open with.
4.then click browse and go to c/program files/BlueStacks & select HD-ApkHandler from the list. your application will be installed.
android emulator
5.now open BlueStacks App Player and see your application list !!!

Free download Pdf to Word converter full version

0 comments
IF we want to edit any pdf then we need a good pdf editor tool or converter for make pdf to word.We can get a lot of pdf converter if we search on google. But all those are not free,you need to pay for buy one.Now i am going to share a Pdf to Word converter which price is 49$. Don’t worry i am also going to share serial key with you.
This tool is very easy to use, by the way a little instruction for you.
instruction :
        Download This converter from
    • mediafire
      direct
       
    • Extract it then install.
    • Run the software. it will be showing like below
pdf to word converter
  • Click on file menu then click on Open or press CTRL+F
  • Select pdf which you want to convert then click on save
  • Done !! it will take a few time for convert.

Download torrent via IDM or any other download manager

0 comments
As you all know Torrific.com in no longer available. So this is a problem to all those user who like to download torrent via IDM.
Let me introduce you with www.zbigz.com . This is another site like Torrific.com.
For download torrent via IDM or any other download manager follow those step -
step 1 : download any torrent from www.kat.ph / www.extratorrent.com /www.thepiratesbay.com or any other site. (n.b- always choose highest seed-peer torrent for better service)
step 2 : go to http://www.zbigz.com/ and register free account. After register click on upload and upload the torrent file what just download then select GO Free !
download torren by download manager
step 3 : Now zbigz.com will upload that torrent file to their own server and provide you a different download link for download with internet download manager or any other download manager.
torrent download by download manager
step 4 : After showing Ready for download click on download button then click on Limited-speed free
torrent download by idm
All done & now Download will be started with download manager
download torrent by internet download manager

Secrets Of Sify,Reliance,Beam Cable - Speed Upto 10 MBPS

0 comments
I got many requests on how to speed up the internet speed, although some buddy's are using the broadband connection, they wont get the maximum internet speed to browse or to view the online videos... so iam posting this article article specially for them.

First Download this ETHERNET Ip Sniffer called  ETHERDETECT Connection-Oriented Packet Sniffer And Protocol Analyzer.by using this tool you can easily speed up net speed.

Use the tool to Scan Ip's in your network,Keep Scanning till you get some 200 Ip's ..
Then just change the last 3 digits of your IP Address with the IP's you get In that scanner !!
NOTE:Please save your Ip address somewhere so as to get back to your original ip !

It will say "Ip conflict" error,keep trying with other Ip's untill you succeed.

Sometimes when you will change your Ip you will get same speed ...in that case ..try another ip

Download Link~:..
CODE
http://adf.ly/9L2dK

System Requirements:

Processor: Intel Pentium 133 MHz or above
Memory: 32 MB (64 MB recommended)
Free Drive Space: 2 MB for installing software
Operating System: Microsoft Windows XP, windows 2000, Windows 95/98 or Windows NT Workstation 4.0 or NT Server 4.0
Display: VGA color monitor 800x600
Pointing Device: Mouse or similar pointing device
Network Adapter: Network card configured with an IP address and connected to the network, Modem or ISDN NT+TA.

Top 10 Data/Packet Sniffing and Analyzer Tools

0 comments

What is Data Sniffing?






In common industry usage, a sniffer (with lower case “s”) is a program that monitors and analyzes network traffic, detecting bottlenecks and problems. Using this information, a network manager can keep traffic flowing efficiently.
A sniffer can also be used legitimately or illegitimately to capture data being transmitted on a network. A network router reads every packet of data passed to it, determining whether it is intended for a destination within the router’s own network or whether it should be passed further along the Internet. A router with a sniffer, however, may be able to read the data in the packet as well as the source and destination addresses. Sniffers are often used on academic networks to prevent traffic bottlenecks caused by file-sharing applications.
The term “sniffer” is occasionally used for a program that analyzes data other than network traffic. For example, a database could be analyzed for certain kinds of duplication.

Top 10 Data/Packet Sniffing and Analyzer Tools

1: Wireshark

Wireshark (known as Ethereal until a trademark dispute in Summer 2006) is a fantastic open source network protocol analyzer for Unix and Windows. It allows you to examine data from a live network or from a capture file on disk. You can interactively browse the capture data, delving down into just the level of packet detail you need. Wireshark has several powerful features, including a rich display filter language and the ability to view the reconstructed stream of a TCP session. It also supports hundreds of protocols and media types. A tcpdump-like console version named tethereal is included. One word of caution is that Ethereal has suffered from dozens of remotely exploitable security holes, so stay up-to-date and be wary of running it on untrusted or hostile networks (such as security conferences).
Tcpdump is the IP sniffer we all used before Ethereal (Wireshark) came on the scene, and many of us continue to use it frequently. It may not have the bells and whistles (such as a pretty GUI or parsing logic for hundreds of application protocols) that Wireshark has, but it does the job well and with fewer security holes. It also requires fewer system resources. While it doesn’t receive new features often, it is actively maintained to fix bugs and portability problems. It is great for tracking down network problems or monitoring activity. There is a separate Windows port named WinDump. TCPDump is the source of the Libpcap/WinPcap packet capture library, which is used by Nmap among many other tools.
UNIX users often smugly assert that the best free security tools support their platform first, and Windows ports are often an afterthought. They are usually right, but Cain & Abel is a glaring exception. This Windows-only password recovery tool handles an enormous variety of tasks. It can recover passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols. It is also well documented.
Kismet is an console (ncurses) based 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. It identifies networks by passively sniffing (as opposed to more active tools such as NetStumbler), and can even decloak hidden (non-beaconing) networks if they are in use. It can automatically detect network IP blocks by sniffing TCP, UDP, ARP, and DHCP packets, log traffic in Wireshark/TCPDump compatible format, and even plot detected networks and estimated ranges on downloaded maps. As you might expect, this tool is commonly used for wardriving. Oh, and also warwalking, warflying, and warskating, …
This popular and well-engineered suite by Dug Song includes many tools. dsniff, filesnarf, mailsnarf, msgsnarf, urlsnarf, and webspy passively monitor a network for interesting data (passwords, e-mail, files, etc.). arpspoof, dnsspoof, and macof facilitate the interception of network traffic normally unavailable to an attacker (e.g, due to layer-2 switching). sshmitm and webmitm implement active monkey-in-the-middle attacks against redirected ssh and https sessions by exploiting weak bindings in ad-hoc PKI. A separately maintained partial Windows port is available here. Overall, this is a great toolset. It handles pretty much all of your password sniffing needs.
Netstumbler is the best known Windows tool for finding open wireless access points (“wardriving”). They also distribute a WinCE version for PDAs and such named Ministumbler. The tool is currently free but Windows-only and no source code is provided. It uses a more active approach to finding WAPs than passive sniffers such as Kismet or KisMAC.
Ettercap is a terminal-based network sniffer/interceptor/logger for ethernet LANs. It supports active and passive dissection of many protocols (even ciphered ones, like ssh and https). Data injection in an established connection and filtering on the fly is also possible, keeping the connection synchronized. Many sniffing modes were implemented to give you a powerful and complete sniffing suite. Plugins are supported. It has the ability to check whether you are in a switched LAN or not, and to use OS fingerprints (active or passive) to let you know the geometry of the LAN.
ngrep strives to provide most of GNU grep’s common features, applying them to the network layer. ngrep is a pcap-aware tool that will allow you to specify extended regular or hexadecimal expressions to match against data payloads of packets. It currently recognizes TCP, UDP and ICMP across Ethernet, PPP, SLIP, FDDI, Token Ring and null interfaces, and understands bpf filter logic in the same fashion as more common packet sniffing tools, such as tcpdump and snoop.
9: Ntop
Ntop shows network usage in a way similar to what top does for processes. In interactive mode, it displays the network status on the user’s terminal. In Web mode, it acts as a Web server, creating an HTML dump of the network status. It sports a NetFlow/sFlow emitter/collector, an HTTP-based client interface for creating ntop-centric monitoring applications, and RRD for persistently storing traffic statistics.


10: EtherApe

EtherApe is a graphical network monitor for Unix modeled after etherman.Featuring link layer, IP and TCP modes, EtherApe displays network activity graphically with a color coded protocols display. Hosts and links change in size with traffic. It supports Ethernet, FDDI, Token Ring, ISDN, PPP and SLIP devices. It can filter traffic to be shown, and can read traffic from a file as well as live from the network.

 

Related Posts Plugin for WordPress, Blogger...
 

Copyright @ 2013 All Rights Reserved.