Saturday, March 26

How You Can Stop Sweating Inside Your Armpits
How Can Be Stop Sweating Inside Your Armpits, Armpits, Sweating,

There is completely no doubt that one of the many issues folks face these days is perspiration. This is something which will put a real dent in your image wherever you go. This is why they go to great lengths just to avert the scenario. Even so because a great deal of us do not know the way to quit sweating armpits, we usually like to put on jackets, sweaters and loose dark clothing in a bid to hide the problem. Let us examine this issue in greater detail.

Mostly when we have a social encounter it leads to the exposure of our sweating issues. Also although we could be able to demonstrate the fact that we are outstanding athletes, we would not ever venture to take component in type of team sport. This is since other men and women would see us sweating. There are numerous issues to assist your quit sweating. One of such solutions is to buy some antiperspirants. You must go in for those that contain aluminum chloride in order to quit sweating easily. This is been proven to genuinely quit perspiration all round. For those who have a severe issue with their armpit, you are able to see a physician to provide you high percentages of the chemical.

How Can Be Stop Sweating Inside Your Armpits, Armpits, Sweating,

One other thing that would support to stop sweating in your armpit is to remove your armpit hair. This is actually essential as it would support to control the bacterial which is under your arms. It is the bacteria that leads to infections and odor which a great deal of folks adore to steer clear of. You should try as a lot as achievable to make use of the bathroom daily or even twice in a day. This would surely aid to make the armpits clean of any bacteria and odor.

How Can Be Stop Sweating Inside Your Armpits, Armpits, Sweating,

When most of these do not work you'll be able to see a physician who would suggest some medical procedures to follow. One of such is the Botox injections which however could prove really costly. You will find also prescription medications and an electrical sweat gland alteration which is medically called iontophoresis.

How Can Be Stop Sweating Inside Your Armpits, Armpits, Sweating,

Surely it's time to remove all that sweating by creating use of the remedies above. The truth that some folks love to wear thin shirts or tops indicates that there is the will need to eradicate this sweating difficulty as soon as possible so that you walk really confidently.

Friday, March 25

Wi-Fi Direct - a lot of competition for Bluetooth

If you want to transfer media from a laptop on a "smart" television, it is necessary to organize and set up a network of Wi-Fi, this requires the presence of a third force, namely the wireless router.But if both devices support the same protocol, then why complicate things?


That is why the idea of ​​standard Wi-Fi Direct, which provides data transmission in a very simple mode - as well as in the case of Bluetooth. In addition to data transmission, the protocol can solve a lot of related problems, for example, send documents to print, without the participation of the access point that is directly. But, of course, the vast opportunities open protocol for mobile devices, for example, for network games. The only drawback of Wi-Fi Direct is currently supported versions of Wi-Fi a, g and n. The official release of the standard has already taken place, the organization of Wi-Fi Alliance has already started issuing certificates.

How to Pay Down the Federal Deficit: Sell America's Icons, Assets and Gold?

image
For most Americans, it is unimaginable that the U.S. could put its iconic properties on the market. But as the nation struggles to balance its balance sheet, should the federal government take a look at selling some of its most valuable assets?

It wouldn't be the first time that a large nation has pondered taking such drastic steps in recent years. Just two years ago, the Greeks and the British probably never would have thought that some of their famed assets would hit the auction block.
But since then, Greece has been saddled with such onerous budget restrictions due to E.U. bailout guarantees that some have suggested that it sell some of its popular islands. A number of the country's politicians are attempting to block the transactions. One of the jokes about Greece -- which sadly now has some basis in reality -- is that it will have to sell the Parthenon. The Greeks don't find the joke very funny.

imageThe British have also begun the sale of assets, which could eventually include the Royal Mail.Asset sales by governments have a long history. A large percentage of the geographic area of the United States was acquired through the purchase of land from other governments. In the Louisiana Purchase, Napoleonic France, strapped for cash due to its wars in Europe, sold the United States land that is now part or all of 14 states for the 2010 equivalent of $219 million.
24/7 Wall St. has identified nine U.S. assets that could generate a total of $543 billion -- or about a third of the annual budget deficit for the government's current fiscal year. The list is by no means comprehensive, but shows that the U.S. has salable assets that, in some cases, are worth hundreds of billions of dollars.

Each of the nine assets on this list were compared to private companies or entities that already have established public valuations. For example, to put a value on the U.S. Postal Service, 24/7 Wall St. looked at FedEx (FDX) and United Parcel Service (UPS), and to estimate a sale price for the New York Federal Reserve building, they examined nearby Wall Street real estate. We looked at cash flow and revenue figures when comparable values were not available. We determined the size and dimensions of each asset using U.S. government data, which was taken from dozens of departments and agencies.

It's worth noting, though: While these nine sales and licensing agreements might make a big dent in a single year's budget deficit, they wouldn't balance the budget, and the current federal debt -- the overall amount we owe -- is around $14 trillion. That $543 billion is just a drop in the bigger bucket -- we'd need to find many, many more assets to put on the auction block to significantly reduce the debt. But this is a huge country, and this list is just the tip of the iceberg.
image
1. New York Federal Reserve Building
 
Guesstimated price tag: $750 million
Location: Manhattan, New York
U.S. ownership: 87 years
Who should buy it: Donald Trump, SL Green, Tishman Speyer
Why it's valuable: Location


The Federal Reserve Bank of New York is located in a massive building that takes up an entire block in Manhattan's Financial District. Construction of the building was completed in 1924. It's 14 stories tall and features an additional five floors underground. If the bank relocated to less valuable real estate, the government could make a significant amount of money. A recent notice issued by the New York City Department of Finance estimated the building's value for the 2011 to 2012 tax year to be $88,594,000. While this may be the value for tax purposes, a review of comparable buildings in Manhattan revealed this wold likely be significantly less than its market price. On Madison Avenue, a similar building was sold for just under $1 billion. In all likelihood, considering its location and the historical significance of the building, the government could fetch closer to $750 million from a buyer like Donald Trump or SL Green.
2. Hoover Dam

Guesstimated price tag: $415 million
Location: Nevada/Arizona
U.S. ownership: 75 years
Who should buy it: Duke Power, Con Edison, Southern Company
Why it's valuable: Hydroelectric power


The Hoover Dam includes one of the largest hydroelectric installations in the country. If a company were to purchase the structure, it would most likely do so to privatize the dam and reap the benefits from the sale of the power it generates. According to the Department of the Interior, the average annual net generation for the Hoover Dam from 1947 through 2008 was about 4.2 billion kilowatt-hours. The Energy Information Administration calculates the average retail price of a single kilowatt-hour, as of 2010, at 9.88 cents. That means the energy produced by the dam each year is worth roughly $415 million. Of course, the operators of the power plant must deal with additional, necessary costs, such as flood control. Without the benefit of a profit and loss statement for the dam, one year's revenue is a reasonable -- though quite conservative -- valuation.
 
3. Randolph Air Force Base
 
Guesstimated price tag: $1 billion
Location: San Antonio, Texas
U.S. ownership: 81 years
Who should buy it: City of San Antonio
Why it's valuable: Could be converted to a commercial airport
 
 
There are many cases of former Air Force bases being converted into commercial airports, including the fields that are now Bangor International in Maine and Southern California Logistics in the Golden State. This usually happens only after a base has been closed, but there's no reason to believe the government wouldn't sell an operating base in an area where it could get a premium price for it. According to the Census Bureau, San Antonio is the fourth fastest-growing city in the U.S. The metropolis also happens to have a nation-high three Air Force bases within its city limits. Randolph AFB has two substantial runways capable of supporting all but the largest jetliners. Incorporating the costs the city of San Antonio would have to sustain to upgrade facilities and build a new terminal, Randolph could be sold for as much as $1 billion.
 
image
4. Naming Rights to the Grand Canyon

Guesstimated price tag: $1 billion
Location: Arizona
U.S. ownership: Became a national monument 103 years ago
Who should buy it: Large international brand
Why it's valuable: Brand recognition
 
It's very common for large venues, like stadiums and convention centers, to sell naming rights for tens of millions of dollars.
The new Citi Field in New York (formerly the Met's Shea Stadium) sold naming rights to Citigroup for $400 million. The U.S. government would likely get much more for a major national attraction like the Grand Canyon, which has more than twice as many visitors each year as Citi Field, and has the added branding value of being a major national landmark. This trend could spread to any of the hundreds of national monuments in the U.S., such as Mount Rushmore or the Washington Monument.
 
image
5. Yellowstone National Park
 
Guesstimated price tag: $5 billion
Location: Idaho, Montana, Wyoming
U.S. ownership: 139 years
Who should buy it: Plum Creek, Weyerhaeuser
Why it's valuable: Timber
 
Yellowstone, spread across parts of Wyoming, Idaho and Montana, is a popular destination for tourists trying to experience the best of the great outdoors. But if the federal government reaches a point where it is desperate for cash, it could try to sell the land to foresting and paper companies like Plum Creek or Weyerhaeuser for its timber value. Based on the current price per acre of Wyoming timberland, the 2.2 million acre park (more than twice the size of Rhode Island) could fetch approximately $5 billion from a major logging concern.

image
6. Interstate Highway System
 
Guesstimated price tag: $25 billion
Location: Across the U.S.
U.S. ownership: 55 years
Who would buy it: Carlyle, Blackstone, TPG Capital
Why it's valuable: Tolls, roadside businesses
 
According to the Federal Highway Administration, the Dwight D. Eisenhower U.S. Interstate Highway System is the largest in the world, spanning more than 45,000 miles. Today, the system is largely without toll roads, besides those present before the system was incorporated in 1956. While the government pays more than $5 billion each year maintaining the interstates, if an independent company purchased the system and set up tolls on half of the existing interstate roads, potential revenue for a single year would be close to $25 billion. But as with the Hoover Dam, these calculations have to be made without the benefit of a profit and loss statement, so the price tag of one year's revenues -- $25 billion -- is a quite conservative valuation.
 
7. U.S. Postal Service
 
imageGuesstimated price tag: $40 billion
Location: Nationwide
U.S. ownership: 236 years
Who should buy it: UPS, FedEx
Why it's valuable: Parcel delivery infrastructure
(employees, vehicles, buildings)
 
The U.S. postal service, mired in debt and facing steady declines in mail volume, could nevertheless be a potentially valuable enterprise for one of the country's larger parcel companies. The acquiring company would likely assume the Postal Service's facilities, employees and fleet, strip down the unnecessary elements, and incorporate the remaining parts into its own operations. As implausible as a buyout like this seems, it could happen. The British government is currently considering the same thing for its own Royal Mail, with some reports suggesting a public stock offering of $14.4 billion. The U.S. Postal Service is several times larger than its U.K. equivalent, and even incorporating the $13 billion in debt that would be assumed by a buyer, operations could go for as much as $40 billion.
 
image
8. The Gulf of Mexico
 
Guesstimated price tag: $70 billion
Location: Gulf of Mexico
U.S. ownership: Lease agreement
Who should buy it: BP, Exxon, Texaco
Why it's valuable: Oil drilling
 
The U.S. currently leases massive blocks of territory in the Gulf of Mexico through auction to the biggest oil companies in the world. At the moment, the government has only leased roughly one-fifth of the nearly 160 million acres of drillable space in the gulf. With the demand for new sources of oil rising steadily, there's good reason to believe the government, if in a dire fiscal predicament, could initiate a fire sale on the remaining property for a reduced price. Currently, blocks (a square mile or more) are being leased for an average of $550 per acre. The government could sell, rather than lease, the remaining land at this price for more than $70 billion.
 
image
9. U.S. Gold Supply
 
Guesstimated price tag: $400 billion
Location: U.S. Bullion Depository, Fort Knox, Kentucky
U.S. ownership: Varies
Who should buy It: China, Germany, the International Monetary Fund
Why it's valuable: Precious commodity
 
The advantage of gold is that holdings are completely liquid because of the demand from other large nations, for commercial use, and for private products used by consumers. At least 15 countries and organizations hold gold reserves valued at more than $20 billion.
The U.S. currently possesses the greatest hoard of gold in the world, at nearly 9,000 metric tons. The value of this gold, according to the World Gold Council is close to $400 billion.

Thursday, March 24

10 Worlds tallest buildings

Tower Taipei,

image
Taipei 101 Tower Taipei, Taiwan, Year 2004,Stories 101,Meters509, Feet 1,670, Chief Architect C.Y. Lee & Partner 
image
Burj Khalifa (Burj Dubai, or Dubai Tower),Dubai, UAE, Year 2010, Stories 162,Meters 828, Feets 2,717 , Chief Architect Skidmore, Owings & Merrill
image
Shanghai World Financial Center, China, Year 2008, Stories 101, Meters 492, Feets 1,614, Chief ArchitectKohn Pedersen Fox
image
Historically Named: Sears Tower Current Name: Willis Tower Location: Chicago, Illinois, USA Architect: Bruce Graham, Skidmore, Owings and Merrill (SOM) Year: 1973 Height: 442 meters / 1,450 feet Stories: 110
image
The World Trade Center in New York City Before the Terrorist Attack. The World Trade Center, New York, New York Built 1970 - 1977 Minoru Yamaski & Associates, Architect, with Emery Roth and Sons
image
Location: New York City, New York, USA Architect: Shreve, Lamb and Harmon Year: 1931 Height: 381 meters / 1,250 feet Stories: 102
image
John Hancock Center, Chicago, Year 1969,Stories 100, Meters 344, Feets 1,127 Chief Architect Bruce Graham, SOM
image
Ryugyong Hotel, Pyongyang, N. Korea, Year 1995, Stories 105,Meters 300,Feets 984
image
The Trump International Hotel and Tower (Chicago), also known as Trump Tower Chicago and locally as the Trump Tower, is a 2008 completed, 92 floor, 415 m skyscraper in downtown Chicago, USA. Trump announced in 2001 that the skyscraper would become
image
Eureka Tower Melbourne, Victoria Country: Australia, 2006 91 297 975

Travel Guide UK: Way to get full information

When a person hears the idiom travel guide two main things come to their mind. The first things that appear are the sketch out of various destinations. Another thing that comes to our mind is the person who will guide about those places.  The first type of travel guide UK are catalogues, brochures, books or other reading material, which gives the travelers a very good idea about United Kingdom. It will often comprise with the facts like where is the hotels, restaurants and other accommodations that are used by people at the time of traveling.

 
It will help the visitors in the matter of giving information about the numerous places of UK including their ratings and even rates. UK guides can also be very helpful and useful for the individuals who need or like to go UK but do not have prior knowledge. On the other hand, it is also a great scout for all those visitors who want to go United Kingdom but have no idea how to manage once they arrived. This guide is also perfect for listing the attractions and websites that are made available in that location. 

The travelers can take the details about the travel guide through online as well. It is a fantastic source of information when you are planning for the trip. It will also include some kind of map that helps the individuals in searching the particular location. Moreover, you can also very easily find the best hotels, restaurants, places to visit or many other things. In such a guide, full details like phone numbers, full address, websites address, etc have been given correctly. 

To know more about travel guide UK, just log on to online and get the information easily. Thus, while traveling within United Kingdom, a travel guide with maps of number of UK towns and cities will be a prized possession for the travelers.

How to Closing Open Holes of Computer when you are connected to internet

With the spread of Hackers and Hacking incidents, the time has come, when not only system administrators of servers of big companies, but also people who connect to the Internet by dialing up into their ISP, have to worry about securing their system. It really does not make much difference whether you have a static IP or a dynamic one, if your system is connected to the Internet, then there is every chance of it being attacked.

This manual is aimed at discussing methods of system security analysis and will shed light on as to how to secure your standalone (also a system connected to a LAN) system.

Open Ports: A Threat to Security?

In the Netstat Tutorial we had discussed how the netstat -a command showed the list of open ports on your system. Well, anyhow, before I move on, I would like to quickly recap the important part. So here goes, straight from the netstat tutorial:

Now, the ??a? option is used to display all open connections on the local machine. It also returns the remote system to which we are connected to, the port numbers of the remote system we are connected to (and the local machine) and also the type and state of connection we have with the remote system.

For Example,

C:\windows>netstat -a

Active Connections


 Proto  Local Address          Foreign Address              State
 TCP    ankit:1031             dwarf.box.sk:ftp                       ESTABLISHED
 TCP    ankit:1036             dwarf.box.sk:ftp-data                 TIME_WAIT
 TCP    ankit:1043             banners.egroups.com:80    FIN_WAIT_2
 TCP    ankit:1045             mail2.mtnl.net.in:pop3       TIME_WAIT
 TCP    ankit:1052             zztop.boxnetwork.net:80   ESTABLISHED
 TCP    ankit:1053             mail2.mtnl.net.in:pop3       TIME_WAIT
 UDP    ankit:1025             *:*
 UDP    ankit:nbdatagram       *:*


Now, let us take a single line from the above output and see what it stands for:

Proto  Local Address          Foreign Address              State
TCP    ankit:1031                dwarf.box.sk:ftp              ESTABLISHED

Now, the above can be arranged as below:

Protocol: TCP (This can be Transmission Control Protocol or TCP, User Datagram Protocol or UDP or sometimes even, IP or Internet Protocol.)

Local System Name: ankit (This is the name of the local system that you set during the Windows setup.)

Local Port opened and being used by this connection: 1031 

Remote System: dwarf.box.sk (This is the non-numerical form of the system to which we are connected.)

Remote Port: ftp (This is the port number of the remote system dwarf.box.sk to which we are connected.)

State of Connection: ESTABLISHED

?Netstat? with the ??a? argument is normally used, to get a list of open ports on your own system i.e. on the local system. This can be particularly useful to check and see whether your system has a Trojan installed or not. Yes, most good Antiviral software are able to detect the presence of Trojans, but, we are hackers, and need to software to tell us, whether we are infected or not. Besides, it is more fun to do something manually than to simply click on the ?Scan? button and let some software do it.

The following is a list of Trojans and the port numbers which they use, if you Netstat yourself and find any of the following open, then you can be pretty sure, that you are infected.



Port 12345(TCP)                   Netbus
Port 31337(UDP)                 Back Orifice

For complete list, refer to the Tutorial on Trojans at: hackingtruths.box.sk/trojans.txt
----

Now, the above tutorial resulted in a number of people raising questions like: If the 'netstat -a' command shows open ports on my system, does this mean that anyone can connect to them? Or, How can I close these open ports? How do I know if an open port is a threat to my system's security of not? Well, the answer to all these question would be clear, once you read the below paragraph:

Now, the thing to understand here is that, Port numbers are divided into three ranges:

The Well Known Ports are those from 0 through 1023. This range or ports is bound to the services running on them. By this what I mean is that each port usually has a specific service running on it. You see there is an internationally accepted Port Numbers to Services rule, (refer RFC 1700 Here) which specifies as to on what port number a particular service runs. For Example, By Default or normally FTP runs on Port 21. So if you find that Port 21 is open on a particular system, then it usually means that that particular system uses the FTP Protocol to transfer files. However, please note that some smart system administrators delibrately i.e. to fool lamers run fake services on popular ports. For Example, a system might be running a fake FTP daemon on Port 21. Although you get the same interface like the FTP daemon banner, response numbers etc, however, it actually might be a software logging your prescence and sometimes even tracing you!!!

The Registered Ports are those from 1024 through 49151. This range of port numbers is not bound to any specific service. Actually, Networking utlites like your Browser, Email Client, FTP software opens a random port within this range and starts a communication with the remote server. A port number within this range is the reason why you are able to surf the net or check your email etc.

If you find that when you give the netstat -a command, then a number of ports within this range are open, then you should probably not worry. These ports are simply opened so that you can get your software applications to do what you want them to do. These ports are opened temporarily by various applications to perform tasks. They act as a buffer transfering packets (data) received to the application and vis-a-versa. Once you close the application, then you find that these ports are closed automatically. For Example, when you type www.hotmail.com in your browser, then your browser randomly chooses a Registered Port and uses it as a buffer to communicate with the various remote servers involved.

The Dynamic and/or Private Ports are those from 49152 through 65535. This range is rarely used, and is mostly used by trojans, however some application do tend to use such high range port numbers. For Example,Sun starts their RPC ports at 32768.
So this basically brings us to what to do if you find that Netstat gives you a couple of open ports on your system:

1. Check the Trojan Port List and check if the open port matches with any of the popular ones. If it does then get a trojan Removal and remove the trojan.

2. If it doesn't or if the Trojan Remover says: No trojan found, then see if the open port lies in the registered Ports range. If yes, then you have nothing to worry, so forget about it.

***********************
HACKING TRUTH: A common technique employed by a number of system administrators, is remapping ports. For example, normally the default port for HTTP is 80. However, the system administrator could also remap it to Port 8080. Now, if that is the case, then the homepage hosted at that server would be at:

http://domain.com:8080 instead of
http://domain.com:80

The idea behind Port Remapping is that instead of running a service on a well known port, where it can easily be exploited, it would be better to run it on a not so well known port, as the hacker, would find it more difficult to find that service. He would have to port scan high range of numbers to discover port remapping.


The ports used for remapping are usually pretty easy to remember. They are choosen keeping in mind the default port number at which the service being remapped should be running. For Example, POP by default runs on Port 110. However, if you were to remap it, you would choose any of the following: 1010, 11000, 1111 etc etc

Some sysadmins also like to choose Port numbers in the following manner: 1234,2345,3456,4567 and so on... Yet another reason as to why Port Remapping is done, is that on a Unix System to be able to listen to a port under 1024, you must have root previledges.
************************


Firewalls

Use of Firewalls is no longer confined to servers or websites or commerical companies. Even if you simply dial up into your ISP or use PPP (Point to Point Protocol) to surf the net, you simply cannot do without a firewall. So what exactly is a firewall?

Well, in non-geek language, a firewall is basically a shield which protects your system from the untrusted non-reliable systems connected to the Internet. It is a software which listens to all ports on your system for any attempts to open a connection and when it detects such an attempt, then it reacts according to the predefined set of rules. So basically, a firewall is something that protects the network(or systen) from the Internet. It is derived from the concept of firewalls used in vehicles which is a barrier made of fire resistant material protecting the vehicle in case of fire.

Now, for a better 'according to the bible' defination of a firewall: A firewall is best described as a software or hardware or both Hardware and Software packet filter that allows only selected packets to pass through from the Internet to your private internal network. A firewall is a system or a group of systems which guard a trusted network( The Internal Private Network from the untrusted network (The Internet.)

NOTE: This was a very brief desciption of what a firewall is, I would not be going into the details of their working in this manual.

Anyway,the term 'Firewalls', (which were generally used by companies for commerical purposes) has evolved into a new term called 'Personal Firewalls'. Now this term is basically used to refer to firewalls installed on a standalone system which may or may not be networked i.e. It usually connects to an ISP. Or in other words a personal firewall is a firewall used for personal use.

Now that you have a basic desciption as to what a firewall is, let us move on to why exactly you need to install a Firewall? Or, how can not installing a firewall pose a threat to the security of your system?

You see, when you are connected to the Internet, then you have millions of other untrusted systems connected to it as well. If somehow someone found out your IP address, then they could do probably anything to your system. They could exploit any vulnerability existing in your system, damage your data, and even use your system to hack into other computers.

Finding out someone'e IP Address is not very difficult. Anybody can find out your IP, through various Chat Services, Instant Messengers (ICQ, MSN, AOL etc), through a common ISP and numerous other ways. Infact finding out the IP Address of a specific person is not always the priority of some hackers.

What I mean to say by that is that there are a number of Scripts and utilities available which scan all IP addresses between a certain range for predefined common vulnerabilities. For Example, Systems with File Sharing Enabled or a system running an OS which is vulnerable to the Ping of Death attack etc etc As soon as a vulnerable system is found, then they use the IP to carry out the attacks.

The most common scanners look for systems with RAT's or Remote Administration Tools installed. They send a packet to common Trojan ports and display whether the victim's system has that Trojan installed or not. The 'Scan Range of IP Addresses' that these programs accept are quite wide and one can easily find a vulnerable system in the matter of minutes or even seconds.

Trojan Horses like Back Orifice provide remote access to your system and can set up a password sniffer. The combination of a back door and a sniffer is a dangerous one: The back door provides future remote access, while the sniffer may reveal important information about you like your other Passwords, Bank Details, Credit Card Numbers, Social Security Number etc If your home system is connected to a local LAN and the attacker manages to install a backdoor on it, then you probably have given the attacker the same access level to your internal network, as you have. This wouls also mean that you will have created a back door into your network that bypasses any firewall that may be guarding the front door.

You may argue with me that as you are using a dial up link to your ISP via PPP, the attacker would be able to access your machine only when you are online. Well, yes that is true, however, not completely true. Yes, it does make access to your system when you reconnect, difficult, as you have a dynamic Internet Protocol Address. But, although this provides a faint hope of protection, routine scanning of the range of IP's in which your IP lies, will more often than not reveal your current Dynamic IP and the back door will provide access to your system.

*******************
HACKING TRUTH: Microsoft Says: War Dialer programs automatically scan for modems by trying every phone number within an exchange. If the modem can only be used for dial-out connections, a War Dialer won't discover it. However, PPP changes the equation, as it provides bidirectional transportmaking any connected system visible to scanners?and attackers.
*******************

So how do I protect myself from such Scans and unsolicitated attacks? Well, this is where Personal Firewalls come in. They just like their name suggests, protect you from unsolicitated connection probes, scans, attacks.

They listen to all ports for any connection requests received (from both legitimate and fake hosts) and sent (by applications like Browser, Email Client etc.) As soon as such an instance is recorded, it pops up a warning asking you what to do or whether to allow the connection to initiate or not. This warning message also contains the IP which is trying to initiate the connection and also the Port Number to which it is trying to connect i.e. the Port to which the packet was sent. It also protects your system from Port Scans, DOS Attacks, Vulnerability attacks etc. So basically it acts as a shield or a buffer which does not allow your system to communicate with the untrusted systems directly.

Most Personal Firewalls have extensive logging facilities which allows you to track down the attackers. Some popular firewalls are:

1.BlackICE Defender : An IDS for PC's. It's available at http://www.networkice.com.

2. ZoneAlarm: The easiest to setup and manage firewall. Get it for free at: www.zonelabs.com

Once you have installed a firewall on your system, you will often get a number of Warnings which might seem to be as if someone is trying to break into your system, however, they are actually bogus messages, which are caused by either your OS itself or due to the process called Allocation of Dynamic IP's. For a details description of these two, read on.


Many people complain that as soon as they dial into their ISP, their firewall says that such and such IP is probing Port X. What causes them?
Well, this is quite common. The cause is that somebody hung up just before you dialed in and your ISP assigned you the same IP address. You are now seeing the remains of communication with the previous person. This is most common when the person to which the IP was assigned earlier was using ICQ or chat programs, was connected to a Game Server or simply turned off his modem before his communication with remote servers was complete.

You might even get a message like: Such and Such IP is trying to initaite a Netbios Session on Port X. This again is extrememly common. The following is an explanation as to why it happens, which I picked up a couple of days ago: NetBIOS requests to UDP port 137 are the most common item you will see in your firewall reject logs. This comes about from a feature in Microsoft's Windows: when a program resolves an IP address into a name, it may send a NetBIOS query to IP address. This is part of the background radiation of the Internet, and is nothing to be concerned about.

What Causes them? On virtually all systems (UNIX, Macintosh, Windows), programs call the function 'gethostbyaddr()' with the desired address. This function will then do the appropriate lookup, and return the name. This function is part of the sockets API. The key thing to remember about gethostbyaddr() is that it is virtual. It doesn't specify how it resolves an address into a name. In practice, it will use all available mechanisms. If we look at UNIX, Windows, and Macintosh systems, we see the following techniques:

DNS in-addr.arpa PTR queries sent to the DNS server
NetBIOS NodeStatus queries sent to the IP address
lookups in the /etc/hosts file
AppleTalk over IP name query sent to the IP address
RPC query sent to the UNIX NIS server
NetBIOS lookup sent to the WINS server

Windows systems do the /etc/hosts, DNS, WINS, and NodeStatus techniques. In more excruciating detail, Microsoft has a generic system component called a naming service. All the protocol stacks in the system (NetBIOS, TCP/IP, Novel IPX, AppleTalk, Banyan, etc.) register the kinds of name resolutions they can perform. Some RPC products will likewise register an NIS naming service. When a program requests to resolve an address, this address gets passed onto the generic naming service. Windows will try each registered name resolution subsystem sequentially until it gets an answer.

(Side note: User's sometimes complained that accessing Windows servers is slow. This is caused by installing unneeded protocol stacks that must timeout first before the real protocol stack is queried for the server name.).

The order in which it performs these resolution steps for IP addresses can be configured under the Windows registry key

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\ServiceProvider.

Breaking Through Firewalls

Although Firewalls are meant to provide your complete protection from Port Scan probes etc there are several holes existing in popular firewalls, waiting to be exploited. In this issue, I will discuss a hole in ZoneAlarm Version 2.1.10 to 2.0.26, which allows the attacker to port scan the target system (Although normally it should stop such scans.)

If one uses port 67 as the source port of a TCP or UDP scan, ZoneAlarm will let the packet through and will not notify the user. This means, that one can TCP or UDP port scan a ZoneAlarm protected computer as if there were no firewall there IF one uses port 67 as the source port on the packets.

Exploit:
UDP Scan:
You can use NMap to port scan the host with the following command line:

nmap -g67 -P0 -p130-140 -sU 192.168.128.88

(Notice the -g67 which specifies source port).

TCP Scan:
You can use NMap to port scan the host with the following command line:

nmap -g67 -P0 -p130-140 -sS 192.168.128.88

(Notice the -g67 which specifies source port).

12 ways to get rid of Telemarketers



1. If they want to loan you money,
tell them you just filed for bankruptcy and
you could sure use some money.


Ask, "How long can I keep it?
Do I have to ever pay it back,
or is it like the other money I borrowed before my bankruptcy?"

2. If you get one of those pushy people who won't shut up,
just listen to their sales pitch.


When they try to close the sale,
tell them that you'll need to go get your credit card.
Then, just set the phone down and go do laundry,
shopping or whatever.


See how long that commission based scum waits
for you to get your credit card.

3. If they start out with, "How are you today?"
say, "Why do you want to know?"
Or you can say, "I'm so glad you asked,
because no one seems to care these days and
I have all these problems,
my sciatica is acting up,
my eyelashes are sore,
my dog just died...."


When they try to get back to the sales process,
just continue on with telling about your problems.

4. If the person says he's Joe Doe from the ABC Company,
ask him to spell his name,
then ask him to spell the company name,
then ask where it is located.


Continue asking personal questions or
questions about the company for as long as necessary.

5. This one works better if you are male:
Telemarketer: "Hi, my name is Julie and I'm with Dodger & Peck Services....
You: "Hang on a second."
(few seconds pause)
"Okay, (in a really husky voice) "what are you wearing?"

6. Crying out, in well-simulated tones of pleasure and surprise,
"Julie!! Is this really you?
I can't believe it! Julie, how have you BEEN?"
Hopefully, this will give Julie a few brief moments of terror
as she tries to figure out where the heck she could know you from.



7. Say, "No," over and over.
Be sure to vary the sound of each no,
and keep an even tempo even as they're trying to speak.
This is the most fun if you can keep going until they hang up.

8. If MCI calls trying to get you to sign up with their Family and Friends plan,
reply, in as sinister a voice as you can muster,
"I don't have any friends...would you be my friend?"

9. If they clean rugs: "Can you get blood out, you can?
Well, how about goat blood or HUMAN blood -
chicken blood too?"

10. Let the person go through their spiel, providing minimal but necessary feedback in the form of an occasional "Uh-huh, really, or, "That's fascinating."


Finally, when they ask you to buy, ask them to marry you. They get all flustered, but just tell them you couldn't give your credit card number to someone who's a complete stranger.

11. Tell them you work for the same company they work for.
Example: Telemarketer: "This is Bill from Widget & Associates."
You: "Widget & Associates!! Hey I work for them too.
Where are you calling from?"




Telemarketer: "Uh, Dallas, Texas."
You: "Great, they have a group there too?
How's business/the weather?
Too bad the company has a policy against selling to employees! Oh well, see ya."

12. Tell the Telemarketer you are busy and
if they will give you their phone number you will call them back.


If they say they are not allowed to give out their number,
then ask them for their home number and
tell them you will call them at home
(this is usually the most effective method of getting rid of Telemarketers).


If the person says,
"Well, I don't really want to get a call at home,"
say, "Yeah! Now you know how I feel." (smiling, of course...)
How Can Be React To Negative Emotions

Have you ever watched a dog about to be punished? Tail between
its legs, head bowed, in a crouching position?

People who are faced with a threatening situation tend  to hunch
their shoulders, bend their backs and bow their heads, as if steadying
themselves for the expected storm.

These postures are caled corporal responses to emotion. Of
course such responses vary from person to person, depending on the
emotions they are experiencing. But when dealing with similar
emotions, people’s corporal responses are often the same.

Take a moment to observe the people around you, for example
someone who is angry. If the person tries to contain his or her anger,
you wil see his jaw immediately contract, his body tighten up and his
face grow rigid and change color.



Overly intense emotions - and especialy negative emotions -
become a source of stress, and eventualy of disease. Like stress,
emotions can throw your body out of balance. Chinese medicine is

very clear in establishing the link between emotions and the body -
each organ is associated with a specific emotion.

By treating the organs which correspond to the negative emotions
you tend to experience, you can lessen the impact of these emotions
and live in greater harmony.

Do You Generaly Have Good Posture?

Posture - the way your body is balanced - is another important
indication of whether your system is in harmony or not.

We all tend to neglect the way we are in contact with the ground.
Even the shoes we wear can be harmful: heels that are too high, shoes
that are too pointy and prevent the toes from spreading, or sandals that
fit badly, all prevent us from spreading our weight evenly, forcing our
body to compensate by adopting unhealthy postures. This, in turn,
creates muscular tension, especialy in the thighs, lower back,
shoulders and nape of the neck.



Here are a few techniques for preventing backaches:

- Try not to stay in the same position for too long. Remember:
life is movement!

- Do not remain bent over for too long, so as not to strain the
lower back muscles.

- If you have to remain standing for long periods (at work, waiting in
line, etc.) try to keep one foot on a small step. This wil keep
your hips aligned properly and help keep your back straight.

- When you feel your back geting tired, squat with your back up

against a wall, making sure to relax your shoulders and arms.

Summary


- Learn to recognize states of stress. and to relax.
- Be aware of your emotions - all intense emotions are accompanied
by an imbalance in your organism.
- Watch your posture.
The Best Life Diet
 Overview of Bob Greene's Best Life Diet
According to Bob Greene, the key to weight loss success is a strong emotional base. Honesty, responsibility, commitment, and inner strength are, he says, the four cornerstones of emotional foundation. Honesty means being honest about past weaknesses and past failures for present and future success to occur. Responsibility means taking responsibility for your past actions, vowing to change, and owning up to past failures. Commitment, the third cornerstone, means really keeping to commitments; and inner strength means having the strength to make healthy choices and sticking to them.

The Best Life Diet encourages the individual to make gradual changes and depending on your current fitness level and gender, the diet, which progresses through three phases, encourages calorie intakes ranging from 1,500-2,500 per day, along with exercise.
What you can eat on the Best Life Diet?

While there is a calorie range for this diet, individuals do not necessarily have to calorie count, but rather pay attention to portion sizes. The list of foods allowed on this diet is vast and varied and include fresh fruits and vegetables, breads and cereals, lean meats and protein, oils such as olive oil, low fat to nonfat dairy products, and most spices and seasonings. Basically all healthy foods are allowed in normal not "America's average" portion size, which is typically two- three times the normal serving size. Weekly menus will guide in preparing your meals.


What you can't eat on Bob Greene's diet?


 
Unhealthy foods are all but eliminated (gradually), including:
    * Foods containing trans fats
    * Fried foods
    * High-fat dairy
    * Regular pasta
    * Soft drinks
    * White bread.


In the initial phase, alcohol is eliminated, but it can be added back later. Additionally, individuals are required to stop eating at least two hours before bed.
Eating options on The Best Life Diet

Best Life dieters are encouraged to eat plenty of fruits and vegetables, whole grains and cereals, lean meats, fiber-rich foods, and low-fat to nonfat dairy foods. All foods, with the exception of fruits and vegetables, should be eaten in moderation. Weekly menus are provided to help guide your daily meal plans.


The Best Life Diet - any exercise recommendations?
Depending on your current exercise routine or lack of, you may remain at the same level or add exercise if you are sedentary. Keep in mind that the Surgeon General recommends that Americans accumulate at least 30-60 minutes of moderate physical activity most days of the week. Greater amounts of physical activity may be necessary for the prevention of weight gain, for weight loss, or for sustaining weight loss.


Bob Greene and Oprah Winfrey: creating a winning diet
Bob Greene helped Oprah Winfrey shed 90 pounds back in 1995, and since then he has published several books on the subject of weight-loss including the wildly popular The Best Life Diet. Oprah Winfrey wrote the foreword and to date, the book has sold more than 1.6 million copies. Potential followers can purchase the book or follow the diet online for a fee. Millions worldwide have followed (or are currently following) The Best Life Diet.
Post Weight Maintenance Plans

The three phases of The Best Life Diet are as follows:

    * Phase One focuses on changing old eating habits and increasing activity levels.
    * Phase Two increases physical activity and promotes healthier eating.
    * Phase Three is maintenance.

Phase Three basically covers the guidelines you should follow for the rest of your life--so it's not really a diet. Even more unhealthy foods are eliminated in Phase Three and it introduces Bob Greene's "anything goes" calories which are similar to the "discretionary calories" found in the U.S. government's 2005 Dietary Guidelines.

The "anything goes" calories will allow you to enjoy your favorite foods in small portions, but this can only be done in this final lifetime phase of the diet--when you are at your peak level of activity and your diet is at its healthiest ever.
Subscribe to RSS Feed Follow me on Twitter!