Hacktrox

Created by HAcktrox...........

Hacktrox

Created by HAcktrox...........

Hacktrox

Created by HAcktrox...........

Hacktrox

Created by HAcktrox...........

Hacktrox

Created by HAcktrox...........

Saturday, 31 August 2013

List Of Google Dorks For SQL Injection

List Of Google Dorks For SQL Injection-:
I am providing some of  google dorks for  a SQL injection .this google dorks help to "how  hack a website " and other things.....

inurl:index.php?id=
inurl:trainers.php?id=
inurl:buy.php?category=
inurl:article.php?ID=
inurllay_old.php?id=
inurl:declaration_more.php?decl_id=
inurlageid=
inurl:games.php?id=
inurlage.php?file=
inurl:newsDetail.php?id=
inurl:gallery.php?id=d=



Fullform of computer related terms

Here are some interesting terms you may already know and a few you may not
Full form of computer related terms:
* HTTP - Hyper Text Transfer Protocol.
* HTTPS - Hyper Text Transfer Protocol
Secure.
* IP - Internet Protocol.
* URL - Uniform Resource Locator.
* USB - Universal Serial Bus.
* VIRUS - Vital Information Resource
Under Seized.
* 3G - 3rd Generation.
* GSM - Global System for Mobile
Communication.
* CDMA - Code Divison Multiple Access.
* UMTS - Universal Mobile
Telecommunication
System.
* SIM - Subscriber Identity Module.
* AVI = Audio Video Interleave
* RTS = Real Time Streaming
* SIS = Symbian OS Installer File
* AMR = Adaptive Multi-Rate Codec
* JAD = Java Application Descriptor
* JAR = Java Archive
* JAD = Java Application Descriptor
* 3GPP = 3rd Generation Partnership
Project
* 3GP = 3rd Generation Project
* MP3 = MPEG player lll
* MP4 = MPEG-4 video file
* AAC = Advanced Audio Coding
* GIF = Graphic Interchangeable
Format
* JPEG = Joint Photographic
ExpertGroup
* BMP = Bitmap
* SWF = Shock Wave Flash
* WMV = Windows Media Video
* WMA = Windows Media Audio
* WAV = Waveform Audio
* PNG = Portable Network Graphics
* DOC = Document (Microsoft
Corporation)
* PDF = Portable Document Format
* M3G = Mobile 3D Graphics
* M4A = MPEG-4 Audio File
* NTH = Nokia Theme (series 40)
* THM = Themes (Sony Ericsson)
* MMF = Synthetic Music Mobile
Application File
* NRT = Nokia Ringtone
* XMF = Extensible Music File
* WBMP = Wireless Bitmap Image
* DVX = DivX Video
* HTML = Hyper Text Markup Language
* WML = Wireless Markup Language
* CD - Compact Disk.
* DVD - Digital Versatile Disk.
* CRT - Cathode Ray Tube.
* DAT - Digital Audio Tape.
* DOS - Disk Operating System.
* GUI - Graphical User Interface.
* HTTP - Hyper Text Transfer Protocol.
* IP - Internet Protocol.
* ISP - Internet Service Provider.
* TCP - Transmission Control Protocol.
* UPS - UninterruptiblePower Supply.
* HSDPA - High Speed Downlink
Packet Access.
* EDGE - Enhanced Data Rate for GSM
[Global
System for Mobile
Communication] Evolution.
* VHF - Very High Frequency.
* UHF - Ultra High Frequency.
* GPRS - General Packet Radio Service.
* WAP - Wireless Application Protocol.
* TCP - Transmission Control Protocol .
* ARPANET - Advanced Research
Project Agency
Network.
* IBM - International Business
Machines.
* HP - Hewlett Packard.
* AM/FM - Amplitude/ Frequency
Modulation.
* WLAN - Wireless Local Area Network

Design and analysis of computer algorithm notes -

I am providing only one notes of (DAA)design and analysis of computer algorithm. .I will provide another notes of the DAA .But if you comment here then I will provided.
I have a simple notes for M.C.A then all user can easily to understand my Notes and I have all notes of each subject which are in a M.C.A. If you want 
this then comment here....


                                                     DOWNLOAD FILE
                                                 https://shared.com/dxvbgxnmtu


                                       

Sunday, 25 August 2013

WHAT IS ENTITY ?

WHAT IS ENTITY-: An entity may be object with physical existence or it may be object with conceptual existence .Each Entity has an Attributes.for example - Employee is an entity and the name ,id ,address  etc are the attribute of the employee  .that means entity can be connected their attributes.

Saturday, 24 August 2013

DATABASE LANGUAGES -

DATABASE LANGUAGES -Database system provide a Data Definition language to specify the database schema and Data Manipulation Language to express the database query and updates.The data Definition and the data manipulation language are not two separated language ,Instead they simply form parts of a database languages such as widely used in SQL language .


Data Manipulation Language -Data Manipulation language are language that enables user to access the data and manipulate the data as organized by appropriate model.the type of access are -;

1 Retrieval of information stored in the database .
2 Insertion the new information into the database .
3 Deletion of information from the database .
4 Manipulation of information stored in the database.

There are two types of Data Manipulation language -;

1 Procedural DML -; require a user to specify what data are needed .how to get those data .

2 Declarative DML -: require a user to specify what data are needed without specifying hoe to get those data .


Data Definition Language-; We specify database schema by the set of definition expressed by a special language called Data Definition Language .The DDL is used to specify additional property of the data .
We also specify the storage structure and access method by database system by a set of statement in special type of DDL called a Data storage and Data definition Language . These statement define the implementation detail of the database schema ,which are usually hidden from the users.
The data value stored in the database  must be satisfy certain consistency constraints  

DATA INDEPENDENCE

DATA INDEPENDENCE -: Data independence is define to as capacity to change the schema at one level of the database without having to change schema at next level of the database. It can be classified into two ways-;
1-logical independence
2-physical independence


Logical data independence-:Logical independence is define  as capacity to change  the logical schema without having to change external schema or application program .we may changes the conceptual schema to expand the database to change constraints or reduce the database .Only view information and mapping need be changed in DBMS that supported

Physical data independence -:physical data independence is define as capacity to change the internal schema without having to change conceptual schema .therefore external schema need to be changed
as well.

DATABASE USERS AND DATABASE ADMINISTRATOR

                          DATABASE USERS AND DATABASE ADMINISTRATOR

The primary goal of the database is to retrieve information from and store a new information into the database .people who work with the  database that can be categorized as database users and database administrator.

                                              DATABASE USERS -:
There are four types of database users -;
1-Naive user-
2-Application programmer -
3-Sophisticated user-
4-Specialized user-

Naive users-; Naive user is unsophisticated user ,who interact with the system by invoking on of the application program that have been written previously .for example - clerk of the university .who need to add new instructor  in the department (a) .invoke program "new_hire" .Program ask the clerk for the name of the instructor and his id ,department and salary .The typically user interface for the naive user is form interface .the user fill the information on the appropriate field in the form .

 Application programmers -: Application programmer is a computer professional .who write the application program .Application programmer can choose from many tools to developed for the user interface .Rapid application development tools are the tools that enables the application programmer create form and report with minimal programming effort.


Sophisticated users -:Sophisticated users are the user ,who interact with the system without writing a program.they form their request either using a database query languages or by using  a tools such as data analysis software .

Specialized users-: Specialized users can be work on specialized database program .that do not fit into the traditionally data processing  frame work .


                                      DATABASE ADMINISTRATOR-
One of the main reason for using DBMS has central control for both data and the program that access those data .A person who has such central control over the System that is called Database Administrator .The function of Dba include -;

Schema definition-; The dba creates a original database schema by executing a set of data definition  statement in DDL.

Storage structure and access method definition -;it is responsibility of dba for  creating a structure of the database .

Schema and physical organisation modification-: The dba carries out changes to the schema and physical organisation to reflect the changing need of the organisation .

Granting of  authorization  for data access-: By granting there are different types of authorization .dba can be regulate which part of the database various users can access.

The dba can be  create update and delete file from the database .
It is responsibility for the security and protection of the database from the an authorized users.



3 LEVEL OF DATABASE SYSTEM ARCHITECTURE

                          3 LEVEL OF DATABASE SYSTEM ARCHITECTURE -:
The major purpose  of database system is to provide the user with abstract view of data .that is ,system hides certain thing like how the data is stored and maintained,but on the other hand the data must be retrieve efficiently in order for system is to be useful . Since database end users are not be computer trained ,the complexity hidden from them in order to simplify their interaction with the systems through the three level of Architecture .
The three level of Architecture is known as three schema architecture .The purpose of three level of architecture is to separate the user application and the physical database .The purpose of the separation .,different users needed different view of same data .It can be classified into three level-:
 1-view level
2-conceptual and logical level
3-internal and physical level

Internal and physical level -:It is a lowest level of abstraction that describe the how the data are actually stored . Internal level refer to as Physical level .It can be working within a DBMS and operating system .Internal schema written in DDL statement .

Conceptual level- The next higher level of abstraction describe the what data are needed .what are the relationship among the those data .Conceptual level thus describe the entire of the database in the term of small number of relatively simple structure .Although implement of simple structure at the logical level involves complex  physical level structure ,the user of the logical level does not need to aware the complexity .it refer to as physical data in-dependency.

view level -:The highest level of abstraction describe only part of the entire database .Even though the logical level uses the simple structure ,complexity remain  because the variety of information stored in large database .many user of the database does not need to access all information ,instead of they need to access only part of the database .The system may provide many view of the database..

DATABASE SYSTENM VS FILE SYSTEM

                               DATA BASE SYSTEM VS FILE SYSTEM-:
 Database system arose in response to early method of computerized management of commercial of data .for example -: In university organisation ,keeping information abut the instructor,student ,department and offering course .Once way to kept the information on the computer is store it ,in operating system files . The user able to manipulate the data using a various application program.
The typically file processing system is supported by the an operating system .The system store the permanent  record in the various file and it need to extract the data from and add to it .keeping the organisation information in the file processing system has the number of disadvantages -:

1-redundancy of the data -
2-Difficult to access the data -
3-Isolation of the data -
4-Security problem-
5-Integrity problem-
6-Atomicity problem-

What is DBMS ?

What is Dbms -: Dbms(Data base Management System) is a collection of a related data or set of program to access those data .The collection of data refer to as database.The primary goal of the
database is to retrieve and store the database information .and the both convenient and efficient
manner.Database are design to  manage large bodies of a information. It is general purpose software
that facilitates to construct ,manipulate and showing the database among the various user and application .Defining the database involves the specifying the data types ,data structure and constraints of data that can be store in the database .The data definition and data description are also store in the the database in the form of data catalog and data dictionary .Some function can be perform on the database are-:

1-Data can be added to the database.
2-Inserting the data into the existing file.
3-retrieving the data from the existing file.
4.Deleting the data from the existing file .
5.Manipulating the data through the use of the function is query and update

Nokia Lumia 625 %%%%

Nokia  Lumia 625-:Nokia Lumia 625 is smart phone .there are various features in this phone ...
                           Features are -: 4.7 ips lcd screen , 5mp camera - camera of this phone is to good
                           clearity of the picture is nice ,which processor is used in Nokia lumia 625 thats              
                           name is Qualcomm Snapdragon.Internal storage memory of this phone is 8GB    
                           and Nokia Lumia 625 include a 1.2GHz dual-core processor alongside  512MB RAM. The price of this Phone is under the 20000 thousand.My opinion is tha it ... this is the smartest phone of this month.....there are various feature ..which compete the various phone under this category.







Friday, 16 August 2013

Lava mobile

lava mobile-:Believe it or not – get the latest lava 3G phone with 4.2 Android jellybean  and 32 GB expandable  memory, 3.5 inch beautiful display . Starting price of smart lava phone will be  4500.






mumbai mtnl website has been hacked

mumbai mtnl website has been hacked -: mumbai mtnl website has been hacked by the Pakistan hacker
                                                           http://mtnlmumbai.in/ .












HOW TO MAKE A WIFI HOTSPOT WITHOUT ANY SOFTWARE

HOW TO MAKE A WIFI HOTSPOT WITHOUT ANY SOFTWARE-: this process can be done by the cmd command . there are simple procedure for crating a wifi-hotspot without any software .

1-firstly goto start and type cmd . black screen will be open on your system ..
2- then type this command
netsh wlan set hostednetwork mode=allow ssid=www.hacktrox.blogspot.com=password
3-if you want run hotspot on your system then type this command
  
netsh wlan start hostednetwork
4- if you want to know wether a hotspot on or off then type this command
 


netsh wlan show hostednetwork
5- if you want to stop hotspot then type this command

netsh wlan stop hostednetwork

enjoyy.................all users 

Thursday, 8 August 2013

Future mobile

Future Mobile-: Future mobile look like this .In the future the mobiles are totally transparent  that means   the body of future mobiles are glasses..  metal and plastic are not be used up coming future mobile .






NOKIA ASHA 305

NOKIA ASHA 305 -:Whatsup Application for Nokia Asha 305 . how to install these application on your mobile (Nokia Asha 305 ) . there are very simple procedure that can be install of these application  . you need another application to install whatsup on your mobile . if you want these procedure for downloading the whatsup application on your mobile . post Here i will give you .......................................................



FBI Virus

FBI virus -:this virus is very powerfull virus .It destroy everything in the computer , when it enter in the computer .This virus work on a batch file ...




BREACH decodes HTTPS encrypted data in 30 seconds

BREACH decodes HTTPS encrypted data in 30 seconds


A new hacking technique dubbed BREACH can extract login tokens, session ID numbers and other sensitive information from SSL/TLS encrypted web traffic in just 30 seconds.
BREACH (Browser Reconnaissance and Exfiltration via Adaptive Compression of Hypertext) is very targeted and don’t decrypt the entire channel. BREACH manipulates data compression to pry out doses of information from HTTPS protected data, including email addresses, security tokens, and other plain text strings.
The technique was demonstrated at the Black Hat security conference in Las Vegas by Gluck along with researchers Neal Harris and Angelo Prado, which allows hackers to decodes encrypted data that online banks and e-commerce sites from an HTTPS channel.


Wednesday, 7 August 2013

LG G2

LG G2-:LG G2  has been leaked ahead of its official announced .this mobile is very good then other mobile .there are various feature in this mobile . here the feature are shown below -:
5.2-inch full-HD screen
Snapdragon 800 2.3 GHz quad-core CPU
2GB RAM, 16 GB ROM
13MP camera with LED flash and OIS
2,610 mAh battery
the main features is 2.3ghz quard-core C.P.U

Friday, 2 August 2013

Moto X

Moto x-:Let’s talk about the hardware inside.
Inside the Moto X is a computing system that
Motorola has branded the X8 Mobile
Computing system with 8 “cores.” Motorola
was careful to make the distinction that X8 is
not a system on chip, for that there’s a 1.7

GHz Qualcomm Snapdragon S4 Pro
(MSM8960Pro) with dual core Krait 300 CPUs
and Adreno 320 graphics. Motorola counts the
2 CPU cores, 4 Adreno 320 GPU cores (yes,
there are 4 cores in Adreno 320, which
Motorola made public), and then adds two
more to the fray – a NLP (Natural Language
Processing) core, and Contextual Computing
core. These add up to a total of 8 “cores” for
those keeping count. I’m putting cores in
quotes here since it’s meaningless to count
heterogeneous, completely different cores like
they’re something you can sum up and say
more of means better. Nevertheless, Motorola
makes the case that the X8 is an octacore
system.

Apple I Phone 6

I Phone 6 coming soon-:Apple Iphone 6 coming soon in September. their are various feature in this phone .