Monday, September 28, 2009

G-20 BRING ON PRESSURES ON PEERS

The G-20 summit that began last night in Pittsburgh marks a new phase of global economics, just as the climate summit at the United Nations earlier in the week marked a new phase of global cooperation in environmental policies.

At the end of World War II, the United States was the only economy left standing and alone shaped the global economic agenda. With Europe rebuilt and Japan resurgent, the G-1 (the United States) became the G-7, which included Canada, Europe and Japan. Now the emerging giants, China, India, Brazil and others, have taken their seat at the table.

Americans worry that their waning influence and rising global indebtedness means sinking fortunes, but the G-20 could help to rescue the global prosperity that U.S. political gridlock threatens to squander.

The G-20 forces the U.S. political system to grapple with problems that it has dangerously sidestepped for 30 years. Why are we in a state of economic collapse? Because our policies have been driven by Wall Street lobbyists rather than sound financial regulation. Why are we building a massive debt to China? Because powerful campaign contributors and lobbyists for decades have preferred to put the federal budget into hock rather than pay a prudent level of taxes. Why are we squandering our future by wrecking the climate? Because oil and coal interests have repeatedly trumped the well-being of our children.

The G-20 is important for the United States because the rest of the world is pushing for real answers to these problems. It is the rest of the world pushing for limits on bankers' compensation, not as a populist ploy, but as a proper attempt to tame financial risk-taking and take back the economy and politics from the banking lobby. It is the rest of the world warning that the fate of the U.S. dollar depends on America getting its budget back under control. And it is the rest of the world warning the U.S. Senate that time has run out for obfuscation on climate change. It would be one thing for the United States to wreck its own climate, say the other countries, but the laws of atmospheric physics mean that the United States is wrecking everybody else's climate as well.

Of course there is nothing pleasant about being lectured from outside. Other countries have recoiled for decades when the United States has lectured them, and many Americans won't like to be on the receiving end. Nationalists will scream at any "concessions" given by President Barack Obama to the other 19 countries, even when those so-called concessions are strongly in the interest of the United States and rest of the world.

The fact is that much of what the other G-20 countries are calling for is fully in line with the reform agenda that Mr. Obama has already put forth, but which is stuck in Congress. As the president himself noted at the United Nations earlier this week, U.S. interests in this interconnected world are best served through closer cooperation and integration of policies.

Political theater aside, there is therefore much to gain by strengthening rather than bashing the G-20 process that has gained force since the Great Financial Crash of 2008. Every one of the G-20 countries must upgrade institutions inherited from the 20th century to meet 21st-century challenges. The G-20 at this point is a motley group of imperfect political systems, none of which functions all that well. Every one of the G-20 can do with more than a little peer review. This is a case where there really could be wisdom in crowds.

The United States certainly should be taken to task for a political system that has fallen prey to shortsightedness and the excessive sway of lobbyists. Yet in Europe, too, banking lobbies have had their play with the politicians and need to be controlled.

China understandably worries about a collapse of the dollar and the losses this would entail on China's $2 trillion of foreign-exchange reserves, but China and its neighbors also need to fix Asia's exchange-rate system to solve long-term currency problems.

And no country or region has been a saint on energy and climate issues. While the United States has been the most negligent, all of the G-20 have tried to hide behind the inactions of others.

In sum, a healthy dose of group problem solving is long overdue.

What should be the G-20 outcome today?

The financial sector should be reined in, with banking bonuses capped and derivatives such as credit default swaps strictly regulated. The United States should signal a future path of reduced budget deficits through a judicious balance of spending limits and tax increases. Asian economic growth should be spurred at home through heavy spending on infrastructure, pollution control and clean-energy systems. The dollar should be encouraged to weaken relative to the Euro and the Asian currencies to cut the huge U.S. trade imbalances and restore jobs in the industrial heartland. And the G-20 should recognize that increased financial support and cooperation with the G-172 (the 172 mostly poorer U.N. members not in the G-20) is in the vital interest of the entire world, rich and poor alike.

We of course won't complete this kind of sweeping readjustment today. Each of the G-20 political systems will continue to lurch under the burdens of domestic interests. The G-20 summit will pass and we in the United States will quickly be back to our divisive debates over health care, energy, taxes and the role of the military.

Yet the G-20 will have served to open a better view of global reality for an America which needs to realize it counts for only 5 percent of the world population, which is increasingly indebted to foreign nations and which has a Congress that turns dangerously inward under economic stress. We should work to strengthen the G-20. The whole world will reap vast benefits if collective global actions pierce through the stifling burdens of powerful vested interests within each of the countries.

Thursday, September 24, 2009

FIRST TIME FOR ECONOMICS [INTERSTING READS]

  • Writings about Lehman, in the broad Indian discourse, are a reminder of the low quality of the Indian economics discourse. Meghnad Desai looks back at a year after Lehman, in Financial Express. For a person who was in my father's class at M.A., he is remarkably free of socialist cobwebs of the mind. And, for other interesting treatments, see : see: Jayanth Varma in Financial Express, Dhiraj Nayyar in Indian Express, Andy Kessler in Forbes, Avinash Persaud on bankers pay in Financial Express.
  • P. Vaidyanathan Iyer in Indian Express on some thinking about the role and function of government agencies in finance that is afoot at MOF. Hmm, I could get used to a Financial Stability and Development Authority.
  • Subhomoy Bhattacharjee on India's capital controls and the proposed Bharti/MTN transaction.
  • Bibek Debroy on the role and function of the Chief Economic Advisor to MOF.
  • Sangeeta Singh and Rahul Chandran have an article in Mint on one of the most important infrastructure projects in India: the Bombay-Delhi freight corridor. It is going to work wonders in establishing the straight line connecting Bombay to Delhi as an axis of prosperity. See the CMIE Capex database on this.
  • The `trilemma of the international financial system' in India by Koji Kobayashi of the Mizuho Research Institute.
  • The Afghanistan impasse by Ahmed Rashid in The New York Review of Books.
  • In the New York Times, Steve Dougherty has a great idea: to walk through today's Warsaw trying to reach the locations of Alan Furst's great book The spies of Warsaw.

CURRENCY FUTURES LIQUIDITY

At NSE, currency futures did $1.8 billion yesterday. With this, India is starting to look like the first country where the turnover of the currency futures market is big when compared with the currency forward market.

Turnover is, of course, not liquidity. Liquidity is about the transactions cost faced when transacting. Liquidity comparisons between the OTC market and the futures need to take into account the fact that the OTC market trades bigger contracts. So, let's see what impact cost is visible in the information present on the web, pertaining to closing time (5 PM) on the 22nd. The quantities available at the best five prices are visible on the web. There is surely more available beyond the top five in the book, but you probably don't want to trade at those adverse prices.

Let's focus on 1000 contracts, or $1 million. Based on conversations, I get the sense that the forward market would have impact cost of 0.01% to 0.02% for this transaction size. The graph shows that the NSE contract had smaller numbers than this for both buying and selling.



The futures market seems to be able to serve upto $6 million to a buyer and $2 million to a seller, while suffering reasonable values of impact cost, within the top five prices.

This is admittedly one data point. Late in the day, I noticed a big number for turnover and wondered what was happening to liquidity, so I looked at the `market by price' display visible on the web. But for a currency futures market to beat a currency forward market on liquidity is unusual, even if it is for one data point.

Sunday, May 10, 2009

LIST OF TROJAN PORTS

The following are the default Trojan port numbers and the Trojan Daemons running in it. Check whether any of the following ports are opened on your computer and avoid getting infected again.

TCP 1 Breach.2001, SocketsDeTroie.230, SocketsDeTroie.250
TCP 28 Amanda.200
TCP 31 MastersParadise.920
TCP 68 Subseven.100
TCP 142 NetTaxi.180
TCP 146 Infector.141, Intruder.100, Intruder.100
TCP 171 ATrojan.200
TCP 285 WCTrojan.100
TCP 286 WCTrojan.100
TCP 334 Backage.310
TCP 370 NeuroticKat.120, NeuroticKat.130
TCP 413 Coma.109
TCP 420 Breach.450
TCP 555 Id2001.100, PhaseZero.100, StealthSpy.100
TCP 623 Rtb666.160
TCP 660 Zaratustra.100
TCP 661 Noknok.800, Noknok.820
TCP 666 BackConstruction.210, BackConstruction.250, Bla.100, Bla.200, Bla.400, Bla.503, Cain.150, Dimbus.100, Noknok.820, Ripper.100, SatansBackdoor.100, SatansBackdoor.101, SatansBackdoor.102, Unicorn.100, Unicorn.101, Unicorn.110
TCP 667 SniperNet.210, Snipernet.220
TCP 668 Unicorn.101, Unicorn.110
TCP 680 Rtb666.160
TCP 777 Tiny.100, Undetected.230, Undetected.300, Undetected.310, Undetected.320, Undetected.330, Undetected.331, Undetected.332
TCP 785 NetworkTerrorist.100
TCP 800 NeuroticKitten.010
TCP 831 NeuroticKat.100, NeuroticKat.120, NeuroticKat.130
TCP 901 NetDevil.130, NetDevil.140
TCP 1000 DerSpaeher.200
TCP 1001 Silencer.100
TCP 1008 AutoSpy.100
TCP 1010 DerSpaeher.200
TCP 1015 Doly.150
TCP 1111 TPort.100
TCP 1130 Noknok.800, Noknok.820
TCP 1207 SoftWAR.100
TCP 1243 Subseven.100, SubSeven.110, SubSeven.180, SubSeven.190, Subseven.200
TCP 1245 VoodooDoll.006
TCP 1269 Matrix.130
TCP 1480 RemoteHack.130
TCP 1568 RemoteHack.100, RemoteHack.110
TCP 1600 DirectConnection.100
TCP 1601 DirectConnection.100
TCP 1602 DirectConnection.100
TCP 1634 NetCrack.100
TCP 1784 Snid.120, Snid.212
TCP 1999 TransmissionScout.100, TransmissionScout.110
TCP 2000 ATrojan.200, InsaneNetwork.400
TCP 2001 DIRT.220, TrojanCow.100
TCP 2003 TransmissionScout.100, TransmissionScout.110
TCP 2023 RipperPro.100
TCP 2040 InfernoUploader.100
TCP 2115 Bugs.100
TCP 2140 DeepThroat.100, DeepThroat.200, DeepThroat.310
TCP 2332 SilentSpy.202
TCP 2589 Dagger.140
TCP 2600 DigitalRootbeer.100
TCP 2989 Rat.200
TCP 3128 MastersParadise.970
TCP 3129 MastersParadise.920, MastersParadise.970
TCP 3150 DeepThroat.100, DeepThroat.200, DeepThroat.310, MiniBacklash.110
TCP 3215 BlackStar.100, Ghost.230
TCP 3333 Daodan.123
TCP 3410 OptixPro.100, OptixPro.110
TCP 3456 Force.155, TerrorTrojan.100
TCP 3505 AutoSpy.130, AutoSpy.140
TCP 3586 Snid.120, Snid.212
TCP 3700 PortalOfDoom.100
TCP 3723 Mantis.100
TCP 3800 Eclypse.100
TCP 3996 RemoteAnything.364
TCP 4000 SkyDance.220, SkyDance.229
TCP 4201 Wartrojan.160, Wartrojan.200
TCP 4225 SilentSpy.202
TCP 4321 Bobo.100
TCP 4444 AlexTrojan.200, Crackdown.100
TCP 4488 EventHorizon.100
TCP 4523 Celine.100
TCP 4545 InternalRevise.100, RemoteRevise.150
TCP 4567 FileNail.100
TCP 4666 Mneah.100
TCP 4950 ICQTrojan.100
TCP 5005 Aladino.060
TCP 5025 Keylogger.WMRemote.100
TCP 5031 NetMetro.104
TCP 5032 NetMetro.104
TCP 5033 NetMetro.104
TCP 5050 RoxRat.100
TCP 5151 OptixLite.020, OptixLite.030, OptixLite.040
TCP 5190 MBomber.100
TCP 5277 WinShell.400
TCP 5343 WCRat.100
TCP 5400 BackConstruction.120, BackConstruction.150, BladeRunner.080, DeepThroat.300
TCP 5401 BackConstruction.120, BackConstruction.150, BackConstruction.210, BackConstruction.250, BladeRunner.080, DeepThroat.300, Mneah.100
TCP 5402 BackConstruction.210, BackConstruction.250, BladeRunner.080, DeepThroat.300, Mneah.100
TCP 5534 TheFlu.100
TCP 5550 XTCP.200, XTCP.201
TCP 5555 Noxcape.100, Noxcape.200
TCP 5695 Assassin.100
TCP 5714 WinCrash.100
TCP 5741 WinCrash.100
TCP 5742 WinCrash.103
TCP 5802 Y3KRat.160
TCP 5810 Y3KRat.160
TCP 5838 Y3KRat.170
TCP 5858 Y3KRat.110, Y3KRat.120, Y3KRat.140
TCP 5880 Y3KRat.140
TCP 5881 Y3KRat.110, Y3KRat.120, Y3KRat.140
TCP 5882 Y3KRat.100, Y3KRat.110, Y3KRat.120, Y3KRat.140, Y3KRat.150
TCP 5883 Y3KRat.110, Y3KRat.140
TCP 5884 Y3KRat.140, Y3KRat.150
TCP 5885 Y3KRat.110, Y3KRat.120, Y3KRat.140
TCP 5886 Y3KRat.120, Y3KRat.140
TCP 5887 Y3KRat.110, Y3KRat.120, Y3KRat.140
TCP 5888 Y3KRat.100, Y3KRat.110, Y3KRat.120, Y3KRat.140, Y3KRat.150
TCP 5889 Y3KRat.100, Y3KRat.110, Y3KRat.120, Y3KRat.140, Y3KRat.150
TCP 5890 Y3KRat.140
TCP 6400 Thething.100, Thething.150
TCP 6556 AutoSpy.120, AutoSpy.122
TCP 6655 Aqua.020
TCP 6660 LameSpy.095
TCP 6666 LameRemote.100, ProjectMayhem.100
TCP 6669 Vampire.100
TCP 6670 DeepThroat.200, DeepThroat.210
TCP 6671 DeepThroat.310
TCP 6699 HostControl.101
TCP 6711 DeepThroat.300, Noknok.820, SubSeven.180, SubSeven.190
TCP 6712 Subseven.100
TCP 6713 Subseven.100
TCP 6767 NTRC.120
TCP 6776 SubSeven.180, SubSeven.190, Subseven.200
TCP 6789 Doly.200
TCP 6796 SubSeven.214
TCP 6912 ShitHeep.100
TCP 6939 Indoctrination.100
TCP 6953 Lithium.100
TCP 6969 2000Cracks.100, Bigorna.100, Danton.110, Danton.210, Danton.220, Danton.310, Danton.320, Danton.330, GateCrasher.110, NetController.108, Sparta.110, VagrNocker.120
TCP 6970 Danton.330
TCP 7001 Freak88.100
TCP 7119 Massaker.100
TCP 7200 Massaker.110
TCP 7300 Coced.221
TCP 7301 Coced.221
TCP 7306 NetSpy.200, NetSpy.200
TCP 7410 Phoenix.190, Phoenix.200
TCP 7511 Genue.100
TCP 7609 Snid.120, Snid.212
TCP 7614 Wollf.130
TCP 7648 BlackStar.100, Ghost.230
TCP 7788 Last.2000, Matrix.200
TCP 7826 MiniOblivion.010, Oblivion.010
TCP 7887 SmallFun.110
TCP 7891 Revenger.100
TCP 7979 VagrNocker.200
TCP 7997 VagrNocker.200
TCP 8000 XConsole.100
TCP 8011 Way.240
TCP 8012 Ptakks.215, Ptakks.217
TCP 8110 LoseLove.100
TCP 8111 LoseLove.100
TCP 8301 LoseLove.100
TCP 8302 LoseLove.100
TCP 8372 NetBoy.100
TCP 8720 Connection.130
TCP 8734 AutoSpy.110
TCP 8811 Force.155
TCP 8899 Last.2000
TCP 9000 Aristotles.100
TCP 9301 LoseLove.100
TCP 9400 InCommand.100, InCommand.110, InCommand.120, InCommand.130, InCommand.140, InCommand.150, InCommand.153, InCommand.160, InCommand.167, InCommand.170
TCP 9401 InCommand.100, InCommand.110, InCommand.170
TCP 9402 InCommand.100, InCommand.110
TCP 9561 CRatPro.110
TCP 9563 CRatPro.110
TCP 9580 TheefLE.100
TCP 9696 Danton.210, Ghost.230
TCP 9697 Danton.320, Danton.330, Ghost.230
TCP 9870 R3C.100
TCP 9872 PortalOfDoom.100
TCP 9873 PortalOfDoom.100
TCP 9874 PortalOfDoom.100
TCP 9875 PortalOfDoom.100
TCP 9876 Rux.100, SheepGoat.100
TCP 9877 SmallBigBrother.020
TCP 9878 SmallBigBrother.020, TransmissionScout.100, TransmissionScout.110, TransmissionScout.120
TCP 9879 SmallBigBrother.020
TCP 9999 ForcedEntry.100, Infra.100, Prayer.120, Prayer.130, TakeOver.200, TakeOver.300
TCP 10001 DTr.130, DTr.140
TCP 10013 Amanda.200
TCP 10067 PortalOfDoom.100
TCP 10100 Gift.240
TCP 10101 NewSilencer.100
TCP 10167 PortalOfDoom.100
TCP 10528 HostControl.100, HostControl.260
TCP 10607 Coma.109
TCP 10666 Ambush.100
TCP 11011 Amanda.200
TCP 11050 HostControl.101
TCP 11051 HostControl.100, HostControl.260
TCP 11223 AntiNuke.100, Progenic.100, Progenic.110
TCP 11225 Cyn.100, Cyn.103, Cyn.120
TCP 11306 Noknok.800, Noknok.820
TCP 11831 Katux.200, Latinus.140, Latinus.150, Pest.100, Pest.400
TCP 11991 PitfallSurprise.100
TCP 12043 Frenzy.2000
TCP 12345 Fade.100, Netbus.160, Netbus.170, VagrNocker.400
TCP 12346 Netbus.160, Netbus.170
TCP 12348 Bionet.210, Bionet.261, Bionet.280, Bionet.302, Bionet.305, Bionet.311, Bionet.313, Bionet.316, Bionet.317
TCP 12349 Bionet.084, Bionet.261, Bionet.280, Bionet.302, Bionet.305, Bionet.311, Bionet.313, Bionet.314, Bionet.316, Bionet.317, Bionet.401, Bionet.402
TCP 12389 KheSanh.210
TCP 12478 Bionet.210
TCP 12623 Buttman.090, Buttman.100
TCP 12624 Buttman.090, Buttman.100
TCP 12625 Buttman.100
TCP 12904 Akropolis.100, Rocks.100
TCP 13473 Chupacabra.100
TCP 13753 AFTP.010
TCP 14100 Eurosol.100
TCP 14194 CyberSpy.840
TCP 14286 HellDriver.100
TCP 14500 PCInvader.050, PCInvader.060, PCInvader.070
TCP 14501 PCInvader.060, PCInvader.070
TCP 14502 PCInvader.050, PCInvader.060, PCInvader.070
TCP 14503 PCInvader.050, PCInvader.060, PCInvader.070
TCP 14504 PCInvader.050, PCInvader.060
TCP 15092 HostControl.100, HostControl.260
TCP 15382 SubZero.100
TCP 15432 Cyn.210
TCP 15555 ICMIBC.100
TCP 16322 LastDoor.100
TCP 16484 MoSucker.110
TCP 16661 Dfch.010
TCP 16969 Progenic.100
TCP 16982 AcidShiver.100
TCP 17300 Kuang.200
TCP 17499 CrazzyNet.370, CrazzyNet.375, CrazzyNet.521
TCP 17500 CrazzyNet.370, CrazzyNet.375, CrazzyNet.521
TCP 17569 Infector.141, Infector.160, Infector.170, Infector.180, Infector.190, Infector.200, Intruder.100, Intruder.100
TCP 17593 AudioDoor.120
TCP 19191 BlueFire.035, BlueFire.041
TCP 19604 Metal.270
TCP 19605 Metal.270
TCP 19991 Dfch.010
TCP 20000 Millenium.100
TCP 20001 Millenium.100, PshychoFiles.180
TCP 20002 AcidKor.100, PshychoFiles.180
TCP 20005 MoSucker.200, MoSucker.210, MoSucker.220
TCP 21212 Schwindler.182
TCP 21554 Exploiter.100, Exploiter.110, Girlfriend.130, GirlFriend.135
TCP 21579 Breach.2001
TCP 21584 Breach.2001
TCP 21684 Intruse.134
TCP 22068 AcidShiver.110
TCP 22115 Cyn.120
TCP 22222 Prosiak.047, Ruler.141, Rux.300, Rux.400, Rux.500, Rux.600
TCP 22223 Rux.400, Rux.500, Rux.600
TCP 22456 Bla.200, Bla.503
TCP 22457 AcidShiver.120, Bla.200, Bla.503
TCP 22784 Intruzzo.110
TCP 22845 Breach.450
TCP 22847 Breach.450
TCP 23005 Infinaeon.110, NetTrash.100, Oxon.110, WinRat.100
TCP 23006 Infinaeon.110, NetTrash.100, Oxon.110, WinRat.100
TCP 23032 Amanda.200
TCP 23432 Asylum.010, Asylum.012, Asylum.013, Asylum.014, MiniAsylum.110
TCP 23456 EvilFTP.100, VagrNocker.400
TCP 23476 DonaldDick.153, DonaldDick.154, DonaldDick.155
TCP 23477 DonaldDick.153
TCP 24000 Infector.170
TCP 24307 Wildek.020
TCP 25386 MoonPie.220
TCP 25486 MoonPie.220
TCP 25555 FreddyK.100, FreddyK.200
TCP 25556 FreddyK.100
TCP 25685 MoonPie.010, MoonPie.012, MoonPie.130, MoonPie.220, MoonPie.240, MoonPie.400
TCP 25686 MoonPie.135, MoonPie.200, MoonPie.400
TCP 25982 MoonPie.135, MoonPie.200
TCP 26274 Delta.050
TCP 27160 MoonPie.135, MoonPie.200
TCP 27184 Alvgus.100, Alvgus.800
TCP 27374 Muerte.110, Subseven.210, SubSeven.213
TCP 28429 Hack’a'Tack.2000
TCP 28430 Hack’a'Tack.2000
TCP 28431 Hack’a'Tack.2000
TCP 28432 Hack’a'Tack.2000
TCP 28433 Hack’a'Tack.2000
TCP 28434 Hack’a'Tack.2000
TCP 28435 Hack’a'Tack.2000
TCP 28436 Hack’a'Tack.2000
TCP 29559 DuckToy.100, DuckToy.101, Katux.200, Latinus.140, Latinus.150, Pest.100, Pest.400
TCP 29891 Unexplained.100
TCP 30000 Infector.170
TCP 30001 Error32.100
TCP 30003 LamersDeath.100
TCP 30029 AOLTrojan.110
TCP 30100 NetSphere.127, NetSphere.130, NetSphere.131
TCP 30101 NetSphere.127, NetSphere.130, NetSphere.131
TCP 30102 NetSphere.127, NetSphere.130, NetSphere.131
TCP 30103 NetSphere.131
TCP 30947 Intruse.134
TCP 31320 LittleWitch.400, LittleWitch.420
TCP 31337 BackOrifice.120, Khaled.100, OPC.200
TCP 31415 Lithium.101
TCP 31416 Lithium.100, Lithium.101
TCP 31557 Xanadu.110
TCP 31631 CleptoManicos.100
TCP 31745 Buschtrommel.100, Buschtrommel.122
TCP 31785 Hack’a'Tack.100, Hack’a'Tack.112
TCP 31787 Hack’a'Tack.100, Hack’a'Tack.112
TCP 31789 Hack’a'Tack.100, Hack’a'Tack.112
TCP 31791 Hack’a'Tack.100, Hack’a'Tack.112
TCP 31887 BDDT.100
TCP 31889 BDDT.100
TCP 32100 ProjectNext.053
TCP 32418 AcidBattery.100
TCP 32791 Akropolis.100, Rocks.100
TCP 33291 RemoteHak.001
TCP 33333 Blackharaz.100, Prosiak.047, SubSeven.214
TCP 33577 SonOfPsychward.020
TCP 34324 TelnetServer.100
TCP 34763 Infector.180, Infector.190, Infector.200
TCP 35000 Infector.190, Infector.200
TCP 35600 Subsari.140
TCP 36794 BugBear.100
TCP 37237 Mantis.020
TCP 37651 YAT.210
TCP 37653 YAT.310
TCP 40308 Subsari.140
TCP 40412 TheSpy.100
TCP 40421 MastersParadise.970
TCP 40422 MastersParadise.970
TCP 40999 DiemsMutter.110, DiemsMutter.140
TCP 41626 Shah.100
TCP 44444 Prosiak.070
TCP 45673 Akropolis.100, Rocks.100
TCP 47262 Delta.050
TCP 48006 Fragglerock.200
TCP 49683 HolzPferd.210
TCP 50000 Infector.180
TCP 50130 Enterprise.100
TCP 50766 Fore.100
TCP 51234 Cyn.210
TCP 51966 Cafeini.080, Cafeini.110
TCP 54321 PCInvader.010
TCP 57341 NetRaider.100
TCP 57922 Bionet.084
TCP 58008 Tron.100
TCP 58009 Tron.100
TCP 59090 AcidReign.200
TCP 59211 DuckToy.100, DuckToy.101
TCP 59345 NewFuture.100
TCP 60000 DeepThroat.300, MiniBacklash.100, MiniBacklash.101, MiniBacklash.101
TCP 60411 Connection.100, Connection.130
TCP 60412 Connection.130
TCP 60552 RoxRat.100
TCP 63536 InsaneNetwork.500
TCP 63878 AphexFTP.100
TCP 63879 AphexFTP.100
TCP 64969 Lithium.100
TCP 65000 Socket.100
UDP 1 SocketsDeTroie.250
UDP 666 Bla.200, Bla.400, Bla.503, Noknok.820
UDP 1130 Noknok.800, Noknok.820
UDP 2140 DeepThroat.100, DeepThroat.200, DeepThroat.310
UDP 2989 Rat.200
UDP 3128 MastersParadise.970
UDP 3129 MastersParadise.920, MastersParadise.970
UDP 3150 DeepThroat.100, DeepThroat.200, DeepThroat.310, MiniBacklash.110
UDP 3333 Daodan.123
UDP 3800 Eclypse.100
UDP 3996 RemoteAnything.364
UDP 4000 RemoteAnything.364
UDP 5555 Daodan.123
UDP 5881 Y3KRat.110, Y3KRat.140
UDP 5882 Y3KRat.100, Y3KRat.110, Y3KRat.120, Y3KRat.140, Y3KRat.150
UDP 5883 Y3KRat.110, Y3KRat.140
UDP 5884 Y3KRat.140, Y3KRat.150
UDP 5885 Y3KRat.110, Y3KRat.120, Y3KRat.140
UDP 5886 Y3KRat.120, Y3KRat.140
UDP 5887 Y3KRat.110, Y3KRat.120, Y3KRat.140
UDP 5888 Y3KRat.100, Y3KRat.110, Y3KRat.120, Y3KRat.150
UDP 6953 Lithium.100
UDP 8012 Ptakks.217
UDP 10067 PortalOfDoom.100
UDP 10167 PortalOfDoom.100
UDP 10666 Ambush.100
UDP 11225 Cyn.100, Cyn.103, Cyn.120
UDP 11306 Noknok.800, Noknok.820
UDP 12389 KheSanh.210
UDP 12623 Buttman.090, Buttman.100
UDP 12625 Buttman.100
UDP 14100 Eurosol.100
UDP 23476 DonaldDick.155
UDP 26274 Delta.050
UDP 27184 Alvgus.100
UDP 28431 Hack’a'Tack.2000
UDP 28432 Hack’a'Tack.2000
UDP 28433 Hack’a'Tack.2000
UDP 28434 Hack’a'Tack.2000
UDP 28435 Hack’a'Tack.2000
UDP 28436 Hack’a'Tack.2000
UDP 29891 Unexplained.100
UDP 30103 NetSphere.131
UDP 31320 LittleWitch.400, LittleWitch.420
UDP 31337 BackOrifice.120, OPC.200
UDP 31416 Lithium.100, Lithium.101
UDP 31789 Hack’a'Tack.100, Hack’a'Tack.112
UDP 31791 Hack’a'Tack.100, Hack’a'Tack.112
UDP 33333 Blackharaz.100
UDP 47262 Delta.050
UDP 49683 HolzPferd.210
UDP 60000 MiniBacklash.100

Tuesday, February 17, 2009

VPN CONFIG

Virtual Private Networks (VPN) allow users working at home, on the road or at a branch office to connect in a secure manner to a remote corporate server using the public Internet. VPN server or host is a computer that accepts VPN connections from VPN clients. A VPN server or host can be a NT/W2K server or W2K/XP Pro. VPN client is a computer that initiates a VPN connection to a VPN server or host. A VPN client can be an individual computer running MS Windows NT version 4.0, Windows 2000, 9x. VPN clients can also be any non-Microsoft Point-to-Point Tunneling Protocol (PPTP) client or Layer Two Tunneling Protocol (L2TP) client using IPSec.

Steps

(1).Basic VPN Requirement

* User Permission. Enable a user to access the VPN. To do this, go to AD Users and Computers, select the user who need to access the VPN, click Dial-in. Check Allow access on the Remote Access Permission (Dial-in or VPN).
* IP Configuration. The VPN server should have a static IP address and assign the arrange IP addresses to VPN clients. The VPN server must also be configured with DNS and WINS server addresses to assign to the VPN client during the connection.
* Data Encryption. Data carried on the public network should be rendered unreadable to unauthorized clients on the network.
* Protocol Support. The TCP/IP is common protocols used in the public network. The VPN also include IP, Internetwork Packet Exchange (IPX), NetBEUI and so on.
* Firewall Ports. When you place a VPN server behind your firewall, be sure to enable IP protocol 47 (GRE) and TCP port 1723.
* Interface(s) for VPN server. If your network doesn't have a router or the VPN is also a gateway, your computer must have at least two interfaces, one connecting to the Internet and another connecting to the LAN. If it is behind a router, you just need one NIC.
* One interface for VPN client. The interface can be a dial-in modem, or a dedicated connection to the Internet.

(2).Configuring VPN in Windows XP Professional

* For configuring the VPN connection, you need to have a static IP address of the remote computer of your company and the host name. You can configure the VPN connection in Windows XP Professional by the following method.
* Click Start > Control Panel > Click Network and Internet connection > Click Network Connections.
* Here you need to create new connection and click next.
* Here click “Connect to network at my work place” click next.
* Click “Virtual Private Network” and click next.
* Here type the meaningful name for your company or any other network connection and click next.
* Here click “Do not dial the initial connection and click next.
* Here type the hostname and the IP address of the computer to which you want to connect.
* Press next and then press finish.

#

(3).Installing VPN in Windows 2000 Professional

* Make sure that you are connected to the internet and you are also connected to the LAN.
* Start > Administrative Tools > Routing and Remote Access.
* Click the server name in the tree and on the action menu click Configure and Enable Routing and Remote Access and click next.
* Click Virtual Private Network (VPN Server) in the common configurations and click next.
* In the remote client protocols, make sure that the TCP/IP is included in the list. Click yes to all available protocols and click next.
* Select the Internet connection that will connect to the internet in the internet connection box and click next.
* Select the Internet connection that will connect to the internet in the internet connection box and click next.
* In the “Managing Multiple Remote Access Server select this option “No, I don’t want to setup this server to use Radius Server Now. Click Next > Click Finish.
* Now right click on the Ports node and click properties now click WAN mini port (PPTP) and then click configure.
* Type the maximum number of the allowed simultaneous PPTP VPN connections to this server.
(4).Configuring VPN Connection in the Client Computer

* Start > Settings > Network and dialup connection.
* Make new connection.
* Click next and then click connect to a private network through Internet.
* Click Automatically Dial this initial connection and select your dial up internet connection from the list.
* If you use cable modem then select “Do not dial this initial connection”.
* Click next.
* Here type the host name and the IP address of the remote computer to which you want to connect.
* Type the descriptive name of the connection and click next.

Tips

* If your VPN client cannot find servers or cannot ping computernmae, you may need to add DNS and WINS into your VPN server. For example, to add DNS and WINS on a Cisco Firewall PIX, add vpdn group 1 client configuation dns dnsservername and vpdn group 1 client configuration wins winsservername.
* If you have Windows 2003 server as VPN server, you can assign a static IP under user's properties. If you use other Windows OS as VPN server, you may want to create a DHCP reservation.
* If you are running w2k/xp pro setup for a domain controller, you will have a option to "log on using dial-up connection" on logon screen after creating a VPN/dial-up connection. In the Log On to Windows dialog box, the user can select the Log on using dial-up connection check box. After clicking OK, the user is prompted to choose a network connection.

Monday, February 16, 2009

LOGGING INTO ADMISTRATOR WITHOUT PRIVILEGES

The following method will allows you to access any local account including Administrator’s on any Windows 2000 or Windows XP machine. The best thing about this trick is that you don’t have to mess around with password. So, Administrator will never know that anyone else has accessed his account. The following tool will create a god like password which can be used to login to any account. The only thing you’ll need is a CD or DVD-ROM drive.

You need to download a tool called DreamPackPL. It turns off the password protection features in Windows XP, thereby allowing you to log into any account. It’s a ready to burn ISO (4MB only). I do hope you know how to burn a CD. Follow the steps:

1. Burn the ISO into a CD-ROM.
2. Boot the system making the CD-ROM as first boot option in BIOS.
3. Boot from the CD.
4. A windows installation console will come up. Press R then C.
5. Backup your original sfcfiles.dll by typing:
“ren C:\Windows\System32\sfcfiles.dll sfcfiles.lld” (without quotes)
6. Copy the hacked file from CD to system32 folder. Type:
“copy H:\i386\pinball.ex_ C:\Windows\System32\sfcfiles.dll” (without quotes and assuming your CD drive is H:)
7. Now type exit, reboot.
8. When you reach the logon screen, enter dreamon as the username or password.
9. The options window will open, there is a setting called God-Password, enable it and type the God Password there.
Dreampackpl Settings
10. Now for any account, type the password which you have set in previous step to login.

Spliting Large Files Into Small Files

If you want to share a video or other file, that seems to be too large to upload, you can use a couple of programs to split the file into smaller parts that can be joined later.

Split Files Using Winzip :

One way is using a Zip utility program, such as WinZip. The following information applies to WinZip. If you are using a different program, refer to its help files if you are unsure how to proceed. To split a Zip file into smaller pieces:
1. Open or create the Zip file.
2. Choose Split from the Actions menu.
3. Specify the name to be used for the split Zip file. The name must be different from the name of the open Zip file.
4. Specify the size to be used for the individual parts. You can choose from common sizes using the Part size drop-down list or you can specify your own size. To specify your own size, choose "Other size" in the drop-down list and type the desired size in the Other size field. You can specify the size in bytes, kilobytes (KB), or megabytes (MB); indicate which you're using by clicking the appropriate radio button. For uploading to sendspace, make sure you make the split files less than 300MB each.
5. Click OK to create the split Zip file.



Split Files Using Winrar :

Another program you can use, is WinRar. Right-click on the folder or file you want to split, then choose "Add to archive". A new window pops up, and then you can choose the archive format - RAR or Zip. Zip is a format that can compress the file size a little, but if you want to split the file into a couple of files, you`d better choose RAR. You can also set the compression method (normal will take more time than fastest, for instance) and the most important thing here is "Split to volumes, bytes". Best size for the parts is 100MB - 98 078k - ZIP 100 because you can upload every part without worrying whether it`s bigger than the upload limit, besides it`s most convenient to download. Click "Ok" and wait till the big files is split into 100MB parts.



Here is a list of some freewares to split large files into smaller ones.

1. Rapid Split :


Rapid Split is an easy-to-use, wizard-based file splitting software with step-by-step assistance in splitting process. It enables you to split files of all types into pieces that can be stored on removable storage media such as floppy disk and zip disk.It allows you to specify the file either split by size or number of pieces and you can also use the predefined sizes for common removable storage media. This software has drag-and-drop functionality and command line operation

http://cdn.simtel.net/pub/simtelnet/handheld/compress/dm/download-RapidSplit.exe.exe

2. GSplit :

GSplit is a powerful file splitter that lets you split your large files into a set of smaller files called pieces. These pieces are easier to copy to floppies, distribute over the Internet or through E-mail, share with friends or colleagues, archive to Zip disks or CDs. The pieces can be easily combined, using the generated Self-Uniting Executable, that automatically restores the original file for you without requiring GUnite. GSplit also includes advanced features like different splitting methods CRC32 checks (detects file corruption), splitting logs, keep file information, create specific pieces with your own names and shell integration.

http://www.gdgsoft.com/files/gsplits.exe

3. JR Split :



JR Split File allows you to split a large file into smaller files and create a standard .bat file that can be used to reconstruct a copy of the original file.This function is useful for breaking large text files into more usable segments or for breaking a file into segments to fit on multiple diskettes

Sunday, February 15, 2009

HOW TO SAFELY UNINSTALL LINUX WHEN DUAL BOOTED WITH WINDOWS

How to do it:

1. Reboot your laptop/PC with windows 98 start up disc or Windows XP CD and type the command “fixmbr”.

2. Above command will repair ur bootloader and rewrite ntldr which will replace grub loader of Linux and now you can see only Windows XP in the boot menu.

3. Now Boot up in Windows xp.

4. Go to Start > Control Panel > Administrative Tools > Computer Management

5. Go to Disk Management under “Storage”

6. Select your Hard Disk and then the linux partition.

7. Delete the linux partition this will delete linux and grub.

8. Thats it done now boot your laptop or desktop normally it will be booted by default in windows xp.

If you have any problem in the procedure given above leave a comment here…