site

This blog is under working

Friday 29 June 2012

Free Download Java Project

Thursday 28 June 2012

NTFS and FAT

What is NTFS and FAT?

NTFS
NTFS (New Technology File System). It was Introduced  in July 1993 (Windows NT 3.1)
An advanced file system that provides performance, security, reliability, and advanced features that are not found in any version of FAT. For example, NTFS guarantees volume consistency by using standard transaction logging and recovery techniques. If a system fails, NTFS uses its log file and checkpoint information to restore the consistency of the file system. In Windows 2000 and Windows XP, NTFS also provides advanced features such as file and folder permissions, encryption, reliability, disk space utilization,  plus additional extensions, compression. such as security access control lists (ACL) and file system journaling.
File Allocation Table (FAT)
A file system used by MS-DOS and other Windows-based operating systems to organize and manage files. The file allocation table (FAT) is a data structure that Windows creates when you format a volume by using the FAT or FAT32 file systems.
The FAT file system is a legacy filesystem which is very simple, but cannot offer the same performance, reliability and scalability that modern filesystems such as NTFS, ext4 and btrfs can offer. It is however supported for compatibility reasons by virtually all existing operating systems for personal computers, and thus is a well-suited format for data exchange between computers and devices of almost any type and age from the early 1980s up to the present.
Today, FAT file systems are still commonly found on floppy disks, solid-state memory cards, flash memory cards, and on many portable and embedded devices.
FAT32
A derivative of the file allocation table (FAT) file system. FAT32 supports smaller cluster sizes and larger volumes than FAT, which results in more efficient space allocation on FAT32 volumes.

NTFS vs FAT
* NTFS Removal of the limitations of the FAT and HPFS file systems 
* NTFS is much faster than FAT32, it fragments less, and has a 4k cluster size which matches the rocessors  paging size.
* NTFS is safer than FAT32, because it allows the use of per file permissions. Real file ownership limits access to files to their ownersup to 4GB in size.
* Allows you to have files in any size, that is, if you have 200GB of free space, then you can have a 200GB file, compared to a maximum of 4GB on fat32. 
Converting FAT volumes to NTFS
 To convert a volume to NTFS from the command prompt
  1. Open Command Prompt. Click Start, point to All Programs, point to Accessories, and then click Command Prompt.
  2. In the command prompt window, type: convert drive_letter: /fs:ntfs
     
    C:\>CONVERT  C:  /fs:ntfs
For example, typing convert C: /fs:ntfs would format drive D: with the ntfs format. You can convert FAT or FAT32 volumes to NTFS with this command.
Now you are recommended to restart the system. After Restart the System you will get message NTFS converted Succesfully.

Warning  Converting file system can be cause of losing the data.
Important  Once you convert a drive or partition to NTFS, you cannot simply convert it back to FAT or FAT32. You will need to reformat the drive or partition which will erase all data, including programs and personal files, on the partition.


Wednesday 27 June 2012

64 bit Microarchitecture

Index 
64 bit Micro architecture Based 
     -Core 2 Solo
     -Core 2 Duo
     -Core 2 Quad
     -Core 2 Extreme

Core 2 Solo
The Core 2 Solo, introduced in September 2007, is the successor to the Core Solo and is available only as an ultra-low-power mobile processor with 5.5 Watt thermal design power. The original U2xxx series "Merom-L" used a special version of the Merom chip with CPUID number 10661 (model 22, stepping A1) that only had a single core and was also used in some Celeron processors. The later SU3xxx are part of Intel's CULV range of processors in a smaller µFC-BGA 956 package but contain the same Penryn chip as the dual-core variants, with one of the cores disabled during manufacturing.

Core 2 Duo
The majority of the desktop and mobile Core 2 processor variants are Core 2 Duo[8][9] with two processor cores on a single Merom, Conroe, Allendale, Penryn, or Wolfdale chip. These come in a wide range of performance and power consumption, starting with the relatively slow ultra-low-power Uxxxx (10 W) and low-power Lxxxx (17 W) versions, to the more performance oriented Pxxxx (25 W) and Txxxx (35 W) mobile versions and the Exxxx (65 W) desktop models. The mobile Core 2 Duo processors with an 'S' prefix in the name are produced in a smaller µFC-BGA 956 package, which allows building more compact laptops.
Within each line, a higher number usually refers to a better performance, which depends largely on core and front-side bus clock frequency and amount of second level cache, which are model-specific. Core 2 Duo processors typically use the full L2 cache of 2, 3, 4, or 6 MB available in the specific stepping of the chip, while versions with the amount of cache reduced during manufacturing are sold for the low-end consumer market as Celeron or Pentium Dual-Core processors. Like those processors, some low-end Core 2 Duo models disable features such as Intel Virtualization Technology. Details can be found at the list of Intel Core 2 microprocessors.

Core 2 Quad
Core 2 Quad processors are multi-chip modules consisting of two dies similar to those used in Core 2 Duo, forming a quad-core processor. This allows twice the performance of a dual-core processors at the same clock frequency in ideal conditions.
Initially, all Core 2 Quad models were versions of Core 2 Duo desktop processors, Kentsfield derived from Conroe and Yorkfield from Wolfdale, but later Penryn-QC was added as a high-end version of the mobile dual-core Penryn.
The Xeon 32xx and 33xx processors are mostly identical versions of the desktop Core 2 Quad processors and can be used interchangeably.

Core 2 Extreme
Core 2 Extreme processors[12][13] are enthusiast versions of Core 2 Duo and Core 2 Quad processors, usually with a higher clock frequency and an unlocked clock multiplier, which makes them especially attractive for overclocking. This is similar to earlier Pentium processors labeled as Extreme Edition. Core 2 Extreme processors were released at a much higher price than their regular version, often $999 or more.
Where Brand Name Core 2 extreme X6800 available with highest frequency 2.93 MHz, L2 Cache 4 MB,Socket LGA 775,  Released on july 2006 with Price $999.
and
odel Brand Name    Mobile Core 2 Extreme X9xxx, L2 Cache 6 MB, Socket P

X86 & X86-64


x86 Designer     Intel, AMD
Bits                   16-bit, 32-bit, and/or 64-bit
Introduced        1978
Design              CISC
Type                 Register-memory
Encoding          Variable (1 to 15 bytes)
Branching         Status register
Endianness        Little
Page size       8086–i286: None  i386, i486: 4 kB pages P5 Pentium: added 4 MB pages (Legacy PAE: 4       kB?2 MB) x86-64: added 1 GB pages.
Extensions       x87, IA-32, P6, MMX, SSE, SSE2, x86-64, SSE3, SSSE3, SSE4, SSE5, AVX

see Itanium.

x86-64 is an extension of the x86 instruction set. It supports vastly larger virtual and physical address spaces than are possible on x86, thereby allowing programmers to conveniently work with much larger data sets. x86-64 also provides 64-bit general purpose registers and numerous other enhancements. The original specification was created by AMD, and has been implemented by AMD, Intel, VIA, and others. It is fully backwards compatible with Intel x86 16-bit and 32-bit code.[1](p13-14) Because the full x86 16-bit and 32-bit instruction sets remains implemented in hardware without any intervening emulation, existing x86 executables run with no compatibility or performance penalties,[2] although existing applications that are recoded to take advantage of new features of the processor design may see performance increases.

AMD's method of extending Intel's x86 32-bit instruction set to be a subset of its x86-64 instruction set is the same technique Intel employed to extend its 16-bit x86 instruction set to 32-bits.

Prior to launch, "x86-64" and "x86_64" were used to refer to the instruction set. Upon release, AMD named it AMD64[3] Intel initially used the names IA-32e and EM64T before finally settling on Intel 64 for their implementation. x86-64 is still used by many in the industry, while others, notably Sun Microsystems[4] (now Oracle Corporation) and Microsoft,[5] use x64 while the BSD family of OS's use AMD64.


64-bit Core microarchitecture based
The successor to Core is the mobile version of the Intel Core 2 line of processors using cores based upon the Intel Core microarchitecture,[6] released on July 27, 2006. The release of the mobile version of Intel Core 2 marks the reunification of Intel's desktop and mobile product lines as Core 2 processors were released for desktops and notebooks, unlike the first Intel Core CPUs that were targeted only for notebooks (although some small form factor and all-in-one desktops, like the iMac and the Mac Mini, also used Core processors).
Unlike the Intel Core, Intel Core 2 is a 64-bit processor, supporting Intel 64. Another difference between the original Core Duo and the new Core 2 Duo is an increase in the amount of Level 2 cache. The new Core 2 Duo has tripled the amount of on-board cache to 6 MB. Core 2 also introduced a quad-core performance variant to the single- and dual-core chips, branded Core 2 Quad, as well as an enthusiast variant, Core 2 Extreme. All three chips are manufactured at a 65 nm lithography, and in 2008, a 45 nm lithography and support Front Side Bus speeds ranging from 533 MHz to 1600 MHz. In addition, the 45 nm die shrink of the Core microarchitecture adds SSE4.1 support to all Core 2 microprocessors manufactured at a 45 nm lithography, therefore increasing the calculation rate of the processors.

Hacking Tools

vulnerability
In computer security, a vulnerability is a weakness which allows an attacker to reduce a system's information assurance.
Vulnerability is the intersection of three elements: a system susceptibility or flaw, attacker access to the flaw, and attacker capability to exploit the flaw. To exploit a vulnerability, an attacker must have at least one applicable tool or technique that can connect to a system weakness. In this frame, vulnerability is also known as the attack surface.
Vulnerability management is the cyclical practice of identifying, classifying, remediating, and mitigating vulnerabilities" This practice generally refers to software vulnerabilities in computing systems.
A security risk may be classified as a vulnerability. The usage of vulnerability with the same meaning of risk can lead to confusion. The risk is tied to the potential of a significant loss. Then there are vulnerabilities without risk: for example when the affected asset has no value. A vulnerability with one or more known instances of working and fully implemented attacks is classified as an exploitable vulnerability — a vulnerability for which an exploit exists. The window of vulnerability is the time from when the security hole was introduced or manifested in deployed software, to when access was removed, a security fix was available/deployed, or the attacker was disabled.
Security bug is a narrower concept: there are vulnerabilities that are not related to software: hardware, site, personnel vulnerabilities are examples of vulnerabilities that are not software security bugs.
Constructs in programming languages that are difficult to use properly can be a large source of vulnerabilities.

exploit
An exploit (from the verb to exploit, in the meaning of using something to one’s own advantage) is a piece of software, a chunk of data, or sequence of commands that takes advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behaviour to occur on computer software, hardware, or something electronic (usually computerised). This frequently includes such things as gaining control of a computer system or allowing privilege escalation or a denial-of-service attack.
     Bug
A software bug is the common term used to describe an error, flaw, mistake, failure, or fault in a computer program or system that produces an incorrect or unexpected result, or causes it to behave in unintended ways. 
Glitch
A glitch is a short-lived fault in a system. It is often used to describe a transient fault that corrects itself, and is therefore difficult to troubleshoot. The term is particularly common in the computing and electronics industries, and in circuit bending, as well as among players of video games, although it is applied to all types of systems including human organizations and nature.

Payload
Payload in computing (sometimes referred to as the actual or body data) is the cargo of a data transmission. It is the part of the transmitted data which is the fundamental purpose of the transmission, to the exclusion of information sent with it (such as headers or metadata, sometimes referred to as overhead data) solely to facilitate delivery.[1][2]
In the analysis of malicious software such as worms, viruses and Trojans, it refers to the software's harmful results. Examples of payloads include data destruction, messages with insulting text or spurious e-mail messages sent to a large number of people.
In computer security, payload refers to the part of a computer virus which performs a malicious action


Computer Crime

Computer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. Netcrime refers to criminal exploitation of the Internet. Cybercrimes are defined as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS)". Such crimes may threaten a nation’s security and financial health. Issues surrounding this type of crime have become high-profile, particularly those surrounding cracking, copyright infringement, child pornography, and child grooming. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise.
Internationally, both governmental and non-state actors engage in cybercrimes, including espionage, financial theft, and other cross-border crimes. Activity crossing international borders and involving the interests of at least one nationstate is sometimes referred to as cyber warfare. The international legal system is attempting to hold actors accountable for their actions through the International Criminal Court.
 
Crimeware
Crimeware is a class of malware designed specifically to automate cybercrime.[1] The term was coined by Peter Cassidy, Secretary General of the Anti-Phishing Working Group to distinguish it from other kinds of malevolent programs.[citation needed]
Crimeware (as distinct from spyware, adware, and malware) is designed (through social engineering or technical stealth) to perpetrate identity theft in order to access a computer user's online accounts at financial services companies and online retailers for the purpose of taking funds from those accounts or completing unauthorized transactions that enrich the thief controlling the crimeware. Crimeware also often has the intent to export confidential or sensitive information from a network for financial exploitation. Crimeware represents a growing problem in network security as many malicious code threats seek to pilfer confidential information.
 

Empty 9


What is Keylogger techniques


Computer Mother Board


Computer Hard Disk


Tuesday 26 June 2012

Browser Exploitation Framework


The Browser Exploitation Framework (BeEF) is a powerful professional security tool. BeEF is pioneering techniques that provide the experienced penetration tester with practical client side attack vectors.
Unlike other security frameworks, BeEF focuses on leveraging browser vulnerabilities to assess the security posture of a target. This project is developed solely for lawful research and penetration testing.
BeEF hooks one or more web browsers as beachheads for the launching of directed command modules. Each browser is likely to be within a different security context, and each context may provide a set of unique attack vectors.
Notable Features
BeEF provides an easily integratable framework that demonstrates the impact of browser and Cross-site Scripting issues in real-time. Development has focused on creating a modular framework. This has made module development a very quick and simple process.
§  Browser exploitation modules
§  Browser proxying
§  Integration with Metasploit via XML-RPC
§  Plugin detection
§  Intranet service exploitation
§  Tor detection
§  Browser functionality detection modules
BeEF
Wade Alcorn and others
0.4.2.7 / July 10, 2011
Development status
Active
AGPL
Website


What is BeEF?

BeEF is short for The Browser Exploitation Framework. It is a penetration testing tool that focuses on the web browser.

Amid growing concerns about web-borne attacks against clients, including mobile clients, BeEF allows the professional penetration tester to assess the actual security posture of a target environment by using client-side attack vectors. Unlike other security frameworks, BeEF looks past the hardened network perimeter and client system, and examines exploitability within the context of the one open door: the web browser. BeEF will hook one or more web browsers and use them as beachheads for launching directed command modules and further attacks against the system from within the browser context. 



Intel i7 Processor in detail

1 Desktop processors
              1.1 Nehalem micro architecture
                     1.1.1 "Lynnfield" (45 nm)
                     1.1.2 "Bloomfield" (45 nm)
                     1.1.3 "Gulftown" (32 nm)
             1.2 Sandy Bridge microarchitecture
                     1.2.1 "Sandy Bridge" (32 nm)
                     1.2.2 "Sandy Bridge-E" (32 nm)
                     1.2.3 "Ivy Bridge" (22 nm)
2 Mobile processors
             2.1 Nehalem microarchitecture
                    2.1.1 "Clarksfield" (45 nm)
                    2.1.2 "Arrandale" (32 nm)
             2.2 Sandy Bridge microarchitecture
                    2.2.1 "Sandy Bridge (Dual-Core)" (32 nm)
                    2.2.2 "Sandy Bridge (Quad-Core)" (32 nm)
                    2.2.3 "Ivy Bridge (Dual-Core)" (22 nm)
                    2.2.4 "Ivy Bridge (Quad-Core)" (22 nm)

Desktop processors
"Lynnfield" (45 nm)
Lynnfield is the code name for a quad-core processor from Intel released in September 2009.[1] It is sold in varying configurations as Core i5-7xx, Core i7-8xx or Xeon X34xx. Lynnfield uses the Nehalem microarchitecture and replaces the earlier Penryn based Yorkfield processor, using the same 45 nm process technology, but a new memory and bus interface. The product code for Lynnfield is 80605, its CPUID value identifies it as family 6, model 30 (0106Ex).
Lynnfield is related to the earlier Bloomfield and Gainestown microprocessors, which are used in server and high-end desktop systems. The main difference between the two is Lynnfield's use of the LGA 1156 processor socket as opposed to the LGA 1366 used in the others. LGA 1156 processors include Direct Media Interface and PCI Express links, which Intel has previously connected to the processor with a dedicated northbridge chip, called the memory controller hub or I/O hub.
 The mobile version of Lynnfield is Clarksfield.

Produced                                in 2009 Designed by Intel
Max. CPU clock rate             2.40 GHz to 3.06 GHz
Min. feature size                     45 nm
Instruction set                                     x86, x86-64, MMX, SSE, SSE2, SSE3, SSSE3, SSE4.1, SSE4.2 Microarchitecture                    Nehalem
CPUID code                           106Ex
Product code                           80605
Cores                                       4
L2 cache                                  4x256kb
L3 cache                                  8 MB
Application                             Desktop
Socket(s)                                 LGA 1156
Brand name(s)                         Core i5-7xx, Core i5-7xxS, Core i7-8xx, Core i7-8xxS, Core i7-8xxK,
Xeon X34xx, Xeon L34xx


"Bloomfield" (45 nm)
Bloomfield is the code name for Intel high-end desktop processors sold as Core i7-9xx and single-processor servers sold as Xeon 35xx.,[1][2][3] in almost identical configurations, replacing the earlier Yorkfield processors. The Bloomfield core is closely related to the dual-processor Gainestown, which has the same CPUID value of 0106Ax (family 6, model 26) and which uses the same socket. Bloomfield uses a different socket than the later Lynnfield and Clarksfield processors based on the same 45 nm Nehalem microarchitecture, even though some of these share the same Intel Core i7 brand.
Produced From 2008 to present
Designed by                       Intel
Max. CPU clock rate        2.66 GHz to 3.33 GHz
Min. feature size              45 nm Instruction set x86, x86-64, MMX, SSE, SSE2, SSE3, SSSE3, SSE4.1, SSE4.2
Microarchitecture        Nehalem
CPUID code               106Ax
Product code               80601
 Cores                          4
 L2 cache 4× 256 kB
L3 cache                      8 MB
Application                 Desktop
Socket(s)                     LGA 1366
Brand name(s)             Xeon 35xx, Core i7-9xx


"Gulftown" (32 nm)
processor able to run up to 12 threads in parallel. It is based on Westmere microarchitecture, the 32 nm shrink of Nehalem.[3] Originally rumored to be called the Intel Core i9, it is sold as an Intel Core i7.[4] The first release was the Core i7 980X in the first quarter of 2010,[5][6][7] along with its server counterpart, the Xeon 3600 and the dual-socket Xeon 5600 (Westmere-EP) series using identical chips.
First figures indicate that at equivalent clock rates, depending on the software, it has up to 50% higher performance than the identically clocked quad core Bloomfield Core i7 975. However, consumer software that utilizes six real cores is still quite rare as of 2011, and not every multithreaded program is able to take advantage of this many cores. Despite having 50% more transistors, the CPU strongly benefits from the 32-nm process, drawing the same or even less power (depending on the operating system) than its Bloomfield predecessors with merely four cores. The thermal design power (TDP) of all planned models is stated to be 130 watts.
Produced 1H 2010
Designed by                            Intel Corporation
Max. CPU clock rate              3.2 GHz to 4.4 GHz
Min. feature size                     32 nanometer
Instruction set                         x86, x86-64, MMX, SSE, SSE2, SSE3, SSSE3, SSE4.1, SSE4.2, AES-NI Microarchitecture                    Westmere
CPUID code                           0206Cx
Product code                           80613, 80614
Cores                                       6 (physical), 12 (logical)
L2 cache                                  6 × 256 KB
L3 cache                                  12 MB
Application                             UP/DP  Server, Workstation
Package(s)                               LGA-1366
Brand name(s)                         Core i7-970, 980, 980X, 990X,  Xeon 3600s, 5600s

"Sandy Bridge" (32 nm)
"Sandy Bridge-E" (32 nm)
"Ivy Bridge" (22 nm)


Mobile processors

"Clarksfield" (45 nm)
Clarksfield is the code name for an Intel processor, initially sold as mobile Intel Core i7.[1] It is closely related to the desktop Lynnfield processor, both use quad-core dies based on the 45 nm Nehalem microarchitecture and have integrated PCI Express and DMI links.
The predecessor of Clarksfield, Penryn-QC was a multi-chip module with two dual-core Penryn dies based on Penryn microarchitecture, a shrink of Core microarchitecture. The name of the direct successor of Clarksfield has not been announced. Arrandale is a later mobile processor but opens a new line of mid-range dual-core processors with integrated graphics.
At the time of its release at the Intel Developer Forum on September 23, 2009, Clarksfield processors were significantly faster than any other laptop processor,[2] including the Core 2 Extreme QX9300. The initial laptop manufacturers shipping products based on Clarksfield processors include MSI, Dell/Alienware, Hewlett-Packard, Toshiba and Asustek.[3]

Produced                            From 2009 to present
 Designed by                      Intel
Max. CPU clock rate        1.60 GHz to 2.00 (turbo up to 3.2) GHz  
Min. feature size              45 nm
Instruction set                   x86, x86-64, MMX, SSE, SSE2, SSE3, SSSE3, SSE4.1, SSE4.2
Microarchitecture            Nehalem
CPUID code                        106Ex
Product code                     80607
Cores                                    4
L2 cache                               4x256kb
L3 cache                               6 to 8 MB
Application                         Mobile
Socket(s)                             µPGA-988
Brand name(s)                  Core i7-7xxQM,  Core i7-8xxQM, Core i7-9xxXM