Thursday 19 December 2013

online poker cheat engine software

http://www.pokercheat.org/

Wednesday 4 December 2013

DOS attack type and tools



Denial of service (DOS) attack
, a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic. Many DoS attacks, such as the Ping of Death and Teardrop attacks, exploit limitations in the TCP/IP protocols.

Types:-

Teardrop attack is type of attack where fragmented packets are forged to overlap each other when the receiving host tries to reassemble them.

Ping of death type of DoS attack in which the attacker sends a ping request that is larger than 65,536 bytes, which is the maximum size that IP allows. While a ping larger than 65,536 bytes is too large to fit in one packet that can be transmitted, TCP/IP allows a packet to be fragmented, essentially splitting the packet into smaller segments that are eventually reassembled. Attacks took advantage of this flaw by fragmenting packets that when received would total more than the allowed number of bytes and would effectively cause a buffer overload on the operating system at the receiving end, crashing the system. Ping of death attacks are rare today as most operating systems have been fixed to prevent this type of attack from occurring. 

DDOS Attack: A distributed denial of service attack (DDoS) occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers. This is the result of multiple compromised systems (for example a botnet) flooding the targeted system(s) with traffic. When a server is overloaded with connections, new connections can no longer be accepted.

Peer to Peer Attack: Attackers have found a way to exploit a number of bugs in peer-to-peer servers to initiate DDoS attacks. Peer-to-peer attacks are different from regular botnet-based attacks. With peer-to-peer there is no botnet and the attacker does not have to communicate with the clients it subverts. Instead, the attacker acts as a "puppet master," instructing clients of large peer-to-peer file sharing hubs to disconnect from their peer-to-peer network and to connect to the victim's website instead. As a result, several thousand computers may aggressively try to connect to a target website. While peer-to-peer attacks are easy to identify with signatures, the large number of IP addresses that need to be blocked (often over 250,000 during the course of a large-scale attack) means that this type of attack can overwhelm mitigation defenses.

For all known DOS attacks, there are software fixes that system administrators can install to limit the damage caused by the attacks.


Top 10 Dos Attack Tools:-

1. LOIC (Low Orbit Ion Canon)
This tool was used by the popular hackers group Anonymous. This tool is really easy to use, even for a beginner. This tool performs a DOS attack by sending UDP, TCP, or HTTP requests to the victim server. You only need to know the URL of IP address of the server and the tool will do the rest.

Download

2. HOIC:
High Orbit Ion Canon HOIC
HIgh Orbit Ion Canon HOIC is Anonymous DDOS Tool. HOIC is an Windows executable file

High-speed multi-threaded HTTP Flood


  • - Simultaenously flood up to 256 websites at once
  • - Built in scripting system to allow the deployment of 'boosters', scripts
  • designed to thwart DDoS counter measures and increase DoS output.
  • - Easy to use interface
  • - C an be ported over to Linux/Mac with a few bug fixes (I do not have
  • either systems so I do
  • - Ability to select the number of threads in an ongoing attack
  • - Ability to throttle attacks individually with three settings: LOW, MEDIUM,
  • and HIGH - 
Download

3. XOIC
XOIC is another nice DOS attacking tool. It performs a DOS attack an any server with an IP address, a user-selected port, and a user-selected protocol.


XOIC have 3 modes:

-Test Mode
-Normal DoS attack mode (No request counter and TCP HTTP UDP ICMP message because of performance )
-DoS attack with a TCP/HTTP/UDP/ICMP Message

Download

4. Tor Hammer
Tor's Hammer is a slow post dos testing tool written in Python. It can also be run through the Tor network to be anonymized. If you are going to run it with Tor it assumes you are running Tor on 127.0.0.1:9050. Kills most unprotected web servers running Apache and IIS via a single instance. Kills Apache 1.X and older IIS with ~128 threads, newer IIS and Apache 2.X with ~256 threads.

Download

5. Anonymous-DoS
Anonymous-DoS is a http flood program written in hta and javascript, designed
to be lightweight, portable, possible to be uploaded to websites whilst still
having a client version, and made for Anonymous ddos attacks.


How does it work?
It will flood a chosen web server with HTTP connections, with enough it will
crash the server, resulting in a denial of service.

Download


6. DAVOSET 

It is a tool for committing distributed denial of service attacks using execution on other sites.
Download

7.  PyLoris is a scriptable tool for testing a server's vulnerability to connection exhaustion denial of service (DoS) attacks. PyLoris can utilize SOCKS proxies and SSL connections, and can target protocols such as HTTP, FTP, SMTP, IMAP, and Telnet.
Download

8. Dereil 

Dereil is professional (DDoS) Tools with modern patterns for attack via tcp , udp and http protocols . In computing, a denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a machine or network resource unavailable to its intended users.
Download

9. Moihack Port-Flooder
This is a simple Port Flooder written in Python 3.2 Use this tool to quickly stress test your network devices and measure your router's or server's load. Features are available in features section below. Moihack DoS Attack Tool was the name of the 1st version of the program. Moihack Port-Flooder is the Reloaded Version of the program with major code rewrite and changes.

Download

10. DDOSIM
DDOSIM simulates several zombie hosts (having random IP addresses) which create full TCP connections to the target server. After completing the connection, DDOSIM starts the conversation with the listening application (e.g. HTTP server).

Saturday 27 July 2013

kakaotalk PC version

  • Sama je mcm dlm hp android tu. yg mana lum register, t leh register skali
  • download setup kat sini

  • http://upfile.mobi/157073
  • Wednesday 5 June 2013

           How do you define a real programmer? There are many facets that you can use to judge someone’s skill as a programmer: ability, experience, enthusiasm, dedication, etc. But I recently read an article by RethinkDB blogger Slava, and he boils all of these points down to one item, memorization. Some people agree with this idea, but I do not, at all.
    I have heard several companies bragging about having interview scripts like this, saying that this kind of testing is the most effective way to filter out unqualified applicants. However I think that the post by Slava perfectly demonstrates just how flawed this concept is. If there is one thing you should have learned in school, it’s that standardized tests are a terrible metric for gauging skill or intelligence.
    But more to the point, I think that this is the wrong way to define a real programmer. Allow me to present you with my definition of a real programmer.

    What is a real programmer?
                 This comes from one of my favorite quotes in all of history:
    “Real knowledge is to know the extent of ones ignorance” – Confucius
    Having an encyclopedic knowledge of a college curriculum is not required to be a great programmer. Real world software development isn’t about memorizing low-level  programming techniques, or math formulas. These are great tools to have at your disposal, but are certainly not the end-all-be-all of development. It’s all about problem solving, in  the most efficient and elegant way that circumstances allow.
    As a programmer you will be supplied with problems every day, and it’s your job to figure out how to solve these problems. To do this you need to know what your language of choice is capable of, this comes with experience. You will also need to be able to look at the possible solutions and pick the best one for the situation at hand.
    Now here’s the fact that breaks the machine, you do not know every possible solution for every problem, and you never will. I don’t care how experienced you are, how much education you have had, or how many millions of lines of code you have written, because there are so many possible ways to approach the practical problems you find in software development that it is literally impossible to know everything. So you need to have a mix of creativity and resources that let you learn how to solve new problems.
    Real programmers are the ones who can learn fast, and learn by doing.  These are the people who constantly strive to keep up with the  technology they love. They have ample real world experience building,  learning and growing their craft, but know that they still don’t know everything.
    In short the defining characteristic of real programmers is that they never stop learning.
    My experience with real programmers
            I’ve worked as a peon coder, link-in-the-chain guy, I’ve worked as a manager who did the hiring and firing, I’ve worked as a one-man-shop serving milti-billion dollar corporations, and I’ve worked as a solo freelancer. This experience has taught me two things:
    1. I am not the greatest programmer in the world, despite what my website says, and
    2. That you can rarely tell a good programmer from a bad one by the resume, or the interview.
    I’ve seen guys with terrible resumes turn out to be so far above my level that I still have them on my guru list, and I’ve seen guys with amazing resumes who couldn’t grasp even the most basic concepts.
    How to find a real programmer
               It is true that there is often a gap between what candidates say they can do and what they’re really capable of. That is why testing candidates is still a very good idea, but you need to test for higher level skills and abilities. Testing a candidate’s knowledge on obscure techniques and patterns means passing off great people for not remembering stuff that they simply do not  need to be top notch coders.
    In my experience, it is very easy to separate the wheat from the chaff: go through the normal interview process to see if this is a person you can work with (and let’s face it, that’s all that the interview is really for). Then give them a small project, something realistic that resembles what their real work would be like, and send them home. Not a knowledge test, but a real “build something that does this” task.
    When you get the finished result of their labor you will know if you’ve got the real deal. Is it done the way you would have expected (or better)? Is it high quality, showing some love some thought? Did they get it back to you reasonably quickly? Did they do anything cool to show off? If so, congratulations! You’ve just found a great programmer!
    code_by_google != bad_programmer
                 Yes, they could have just coded by Google. But you know what? That shows  they can learn and adapt. I have plenty of respect for a person who doesn’t immediately know how to accomplish a complex task, but can quickly find out how and do it on their own without bothering the other programmers on your team.
    Remember the key point of my real programmers definition, they never stop learning. Google is the greatest programming resource that has ever existed. You cannot look down on someone for using the most powerful learning tool computer science has ever known. I would go so far as to say knowing how to code by Google is the single most important skill in a programmers tool box, because if you want to grow as a programmer this is going to be the tool to use.
    Someone who knows how to search for code examples and how to learn from the work of others will be more or less self-sufficient. They can learn and grow their skills on their own without needing someone else to do it for them. The ability to learn and grow your knowledge is the single most important skill for any developer. Without the ability to grow you will find yourself quickly deprecated.
    I do expect people to know how to use the language and/or framework they were hired to work in, but I judge them primarily based on the work they submit. A guy who can figure out how to do things that he doesn’t know how to do, on his own, on the fly, is a real programmer.
    The catch-22 of impossibly high standards
              Of course it’s pretty absurd to require knowledge that 99% of programmers  have absolutely no need for in real life. But perhaps you don’t entirely know why. If you have very strict hiring standards then you are only going  to find people who match your specific model, and your code will suffer  because of this.
    Computer science grows at a fantastical rate, every day  there is another small innovation that someone came up with. This small innovation will  slowly propegate out to the rest of the programming community and become part of everyone’s toolbox. This happens because  some creative programmer tried some alternative idea and found a new way to solve a problem.
    If your team consists entirely of people with  the same background, skills and knowledge then your creativity bucket  will be quite small. This means you will not see as much innovation as a  varied team with people asking questions that wouldn’t normally be  asked, and people offering solutions that wouldn’t normally be offered.
    Most alternative idea’s will, of course, be immediately shot down. But that one in a hundred that actually sticks will give your team an advantage. This alternative idea has given a level of innovation to your project that would not have existed if you didn’t have a radical element thinking in a unique way.
    Get real
    This was a rather long-winded rant, but let me sum it up in a few nice bullet points.
    • People who are more interested in the buzz words and CS theory than actual experience and a history of practical application of skills are a perpetual thorn in the side of the programming industry.
    • Don’t look down on other programmers because they don’t fit your model definition of a programmer, they just might be better than you.
    • If 99 out of 100 candidates fail your interview then you are looking for something that doesn’t exist.
    • Without a varied group of developers in your team you will suffer from a lack of creativity.
    • Don’t test a CS curriculum, test the ability to create.
    • If you ever finish learning, then your career as a programmer is over. Go study law.
    In short
    Look for someone who truly understand the concepts, who can offer creative and alternative ideas, and who shows the ability to grow as a programmer. Then you will finally find a real programmer.
    Src: http://stevenbenner.com/2010/08/will-the-really-real-programmers-please-stand-up/


    The following is a list of 48 interesting programming books that were released in 2011. While technically some of them are only programming-related and not about coding per se, each one is sure to be of interest to some programmers.
    As some of you know, I run a service called Any New Books?, which emails you a list of new books that are related to the categories of your choice each week. For the most part I pulled this list from the weekly staff picks there throughout this past year, just in time for your Christmas shopping.
    The books are ordered by their current sale rank on Amazon (from the most popular to the least popular at the moment, with hardcovers first). I hope this page will help you discover a few titles you may have not have noticed yet
    Heres the Link : http://programmingzen.com/2011/12/16/interesting-programming-books-2011/?utm_source=twitterfeed&utm_medium=twitter&utm_campaign=Feed%3A+ZenAndTheArtOfRubyProgramming+%28Zen+and+the+Art+of+Programming%29&utm_content=FaceBook

    C++ Useful Books download links

    Schuam's C++ outlines


    C++ How to program 4e by Deitel

    Basic C++ Programming Excercises

    1. Check odd or even
    2. convert seconds to minutes
    3. convert seconds to hours
    4. convert seconds to minutes and hours
    5. convert minutes to seconds
    6. convert minutes to hours
    7. convert minutes to minutes and hours
    8. convert hours to minutes
    9. convert hours to seconds
    10. convert Fahrenheit to Celsius
    11. convert Fahrenheit to kelvin
    12. convert Celsius to Fahrenheit
    13. convert Celsius to kelvin
    14. convert kelvin to Celsius
    15. convert kelvin to Fahrenheit
    16. table of any number
    17. calculate HCF
    18. calculate LCM
    19. check perfect number
    20. reverse number
    21. display next prime number
    22. Program to add 2 numbers
    23. Find maximum of 2 numbers
    24. Find maximum of 3 numbers
    25. Find maximum of n numbers
    26. Swap 2 numbers
    27. Fibonacci series
    28. average of n numbers
    29. palindrome
    30. Calculate sum of digits
    31. Calculate reverse of a number
    32. Check a number prime or not
    33. Check a year leap year or not
    34. Check a character is vowel or not
    35. Check a character is digit or not
    36. Count number of vowels in a string
    37. Program to perform arithmetic operation
    38. Display list of 1 to 10 factorials
    39. Display list of 1 to 10 squares
    40. Program to add n integers
      41. Sum of 1 to 100 even number
    42. Sum of 1 to 100 odd numbers
    43. Sum of 1 to 100 numbers divisible by 4
    44. Sum of 1 to 25 numbers
      45. Average of 1 to 35 numbers

    Array Related-
    1. Reverse a array values
    2. Traversing
    3. Insert an element in array-
    a)      At the begin
    b)      At middle or any position except start or last
    c)       At the end
    d)      Insert an element in an array based on its position
    e)      Insert an element in an array based on its value
    4. Delete an element in array
    a)    At the begin
    b)      At middle or any position except start or last
    c)      At the end
    d)      Delete an element from an array based on its value
    e)      Delete an element from an array based on its position
    5. Searching an element in array
    a)      Linear Search
    b)      Binary Search
    6. Sorting elements
    a)      Bubble sort
    b)      Selection sort
    c)       Insertion sort
    d)      Quick sort
    e)      Merge sort
    f)       Radix sort
    g)      Tree sort
    h)      Heap sort
    7. Program to Swap First half with Last half of an Array
    8. Program to Count numbers greater than 5
    9. Program to Swap neighbor elements in an array
    10. Program to print array values through Pointers
    11. Program to find sum of an array using pointers
    12. Program to find maximum in an array

    String--
    1. Program to Concatenate Two Strings using strcat( )
    2. Program to Concatenate Two Strings without using strcat( )
    3. Program to Compare Two Strings using strcmp( )
    4. Program to Compare Two Strings without using strcmp( )
    5. Program to Copy String using strcpy( )
    6. Program to Copy String without using strcpy( )
    7. Program to Find Length of a String using strlen( )
    8. Program to Reverse a String using strrev( )
    9. Program to Reverse a String without using strrev( )
    10. Program to Input-Output Strings using Character Functions
    11. Program to Input-Output Strings using gets( ) and puts( )
    12. Program to Input-Output Strings using printf( ) and scanf( )
    13. Program to Find Length of a String Without using strlen( )
    14. Program to Find Whether a String is Palindrome or Not
    15. java charAt() mehod or extract a particular position character from String
    16. Program to Find Whether a String is Palindrome or Not without using String Functions

    File Handling
    1. Program to Copy Contents of One File to Another 
    2. Program to Print a File and Count Number of Characters
    3. Program to Print a File and Count Number of words
    4. Program to Print a File and Count Number of lines

    Matrix
      1. Sum of Individual Rows and Columns of a Matrix
      2. Program to find Sum of Diagonals in a Matrix
      3. Program to perform matrix Multiplication
      4. Program to perform transpose of a matrix
      5. Program to Display numbers divisible by 10 in a Matrix
      6. Program to find Sum of numbers divisible 2 or 3 in a Matrix
      7. Program to display Both Diagonal elements of a Matrix
           For Example:

    Matrix:        1   2   3
                           4   5   6
                           7   8   9

            Diagonal 1: 1   5   9
            Diagonal 2: 3   5   7

      8. Program to Display Lower triangle of a Matrix
           For Example:

    Input:       1   2   3             Output:    1
                    4   5   6                              4   5
                    7   8   9                              7   8    9
      9. Program to Display Upper triangle of a Matrix
           For Example:

    Input:       1   2   3             Output:    1   2    3
                    4   5   6                                 5    6
                    7   8   9                                       9
    10. Program to display Matrix with elements numbered with row < column else "0"
           For Example:

    Output:       1   0   0   0  
                      1    2   0   0                              
                      1    2   3   0
    1    2   3   4



    Structure
    1. Example on Structure
    2. Program to illustrate returning structure from function
    3. Program to pass entire Structure from an Array
    4. Program for passing individual structure members through Function
    5. Program to illustrate Array of Structure
    6. Program to illustrate Nested Structure
    7. Program to Implement Structure with Array
    8. Program to Implement Structure with Function
    9. Program to Implement Structure with Pointers


    Class
      1. Example on Class
      2. Friend Function Example
      3. Example 1 on Class
      4. Example 2 on Class

    Constructor and Destructor
      1. Constructor and Destructor Example

    Inheritance
      1. Inheritance with same Function name in Base and Derived Class
      2. Inheritance: Virtual Base Class Example

    File Handling
      1. File Handling: Copy entire contents of a file into another
      2. File Handling: Searching a telephone number from a file

    Stack and Queue
      1. Stack: Implemented using Array
      2. Queue: Implemented using Array
      3. Circular Queue: Implemented using Array

    Linked List
      1. Stack: Implemented using Linked List
      2. Queue: Implemented using Linked List
      3. Circular Queue: Implemented using Linked List