Inculcate Smartly

Inculcate Smartly

We are bringing for you the New Era of giving education, New style of teaching. THIS IS for the stud

Introduction to Google Glass 07/07/2018

Google Glass.......... Do you want to have one? Check it out...

https://www.youtube.com/watch?v=cAediAS9ADM

Introduction to Google Glass Learn how to get started with Glass and get the perfect fit. Interested in finding out more about Glass? Visit: http://google.com/glass Google+: http://googl...

How to Hide Hard Disk Partition in Computer ? Hard Drive ko hide kaise karte hai 05/07/2018

Check it............
https://www.youtube.com/watch?v=uApwayjfQ3g

How to Hide Hard Disk Partition in Computer ? Hard Drive ko hide kaise karte hai How to Hide|Unhide Hard Disk Partition in Computer, how to hide and show local disk drives in my computer and laptops, hard drive ko hide aur unhide kaise ka...

How can I hack the Wi-Fi using a rooted Android device? 16/04/2016

https://www.quora.com/How-can-I-hack-the-Wi-Fi-using-a-rooted-Android-device

How can I hack the Wi-Fi using a rooted Android device? Answer (1 of 4): The best app to for hacking wi-fi is H-Wi-fi this is a custom build app that can crack any Wi-fi Password. Any password protected wi-fi WPA2 with any version to follow. The method is really simple and easy to use. 1. Just download the app to hack wi-fi password and then launch i...

Introduction to Unified Access Services/Cellular Mobile Services | Access Services | Licensing |... 15/04/2015

Introduction to Unified Access Services/Cellular Mobile Services | Access Services | Licensing |... Telecom services have been recognized the world-over as an important tool for socio-economic development for a nation and hence telecom infrastructure is treated as a crucial factor to realize the socio-economic objectives in India. Accordingly, the Department of Telecom has been formulating develop…

Kano: A Computer Anyone Can Make | 9GAG.tv 30/09/2014

Kano: A Computer Anyone Can Make | 9GAG.tv Kano is a computer and coding kit for all ages, all over the world.

Degrees That Get Best Job Offers Before Graduation 15/09/2014

http://jobs.siliconindia.com/career-news/Degrees-That-Get-Best-Job-Offers-Before-Graduation-nid-172463.html

Degrees That Get Best Job Offers Before Graduation BANGALORE: In the world of cut-throat competition, some college degrees increase your chances of getting jobs over others, and in some cases even before your graduation.Let?s have a look at them as compiled by Yahoo.

Timeline photos 28/07/2014

2 points to be remember ever ....
1) you are the only one
2) you can achieve any imagination you created.

Timeline photos 10/04/2014

choose urs..

Security Industry Errata Page 10/02/2014

http://attrition.org/errata/

Security Industry Errata Page the Errata Project points out errors, lies, and charlatans in the security industry

Official Church of Scientology: Beliefs & Practices, Books, L. Ron Hubbard, What is Scientology?... 10/02/2014

http://www.scientology.org/

Official Church of Scientology: Beliefs & Practices, Books, L. Ron Hubbard, What is Scientology?... Learn more about the Scientology religion, its beliefs & practices, founder L. Ron Hubbard, Dianetics and his books, materials and lectures. Learn about David Miscavige, leader of the Scientology religion, his responsibility in spreading and properly applying Scientology and the worldwide social imp...

wired.com 10/02/2014

http://www.wired.com/

wired.com Get in-depth coverage of current and future trends in technology, and how they are shaping business, entertainment, communications, science, politics, and culture at Wired.com.

10/02/2014

http://roflcon.org/

Inculcate Smartly "Teaching With a Difference": Jewellery Designing: "A Career with Great... 20/01/2014

Check it Friends
Jewellery Designing: "A Career with Great Opportunities"
http://inculcatesmartly.blogspot.in/2012/06/jewellery-designing-career-with-great.html

Inculcate Smartly "Teaching With a Difference": Jewellery Designing: "A Career with Great... Im too pursuing my career in , your blog was quite helpful thnx :)

17/12/2013

creating your own search page :

1. go to goglogo.com
2.type your name
3.click "create search page"

Timeline photos 14/12/2013

all of sudden my google chrome closed... and when i opened it again its design was changed around 00: 56 AM

Timeline photos 28/11/2013
7 Most Exciting and Happening Jobs On The Planet 23/11/2013

http://jobs.siliconindia.com/career-news/7-Most-Exciting-and-Happening-Jobs-On-The-Planet--nid-157004.html

7 Most Exciting and Happening Jobs On The Planet 7 Most Exciting and Happening Jobs On The Planet - Bangalore: Most of us enjoy our work to the fullest at the beginning of our career. But as the learning curve gets

5 Jobs That Are Tailor Made For Multi-Taskers 13/11/2013

http://jobs.siliconindia.com/career-news/5-Jobs-That-Are-Tailor-Made-For-MultiTaskers-nid-156657.html

5 Jobs That Are Tailor Made For Multi-Taskers 5 Jobs That Are Tailor Made For Multi-Taskers - Bangalore: Do you have the knack to perform multiple tasks simultaneously without degrading productivity? Do you

10/11/2013

http://jobs.siliconindia.com/career-news/9-Evergreen-EmploymentSectors--nid-156326.html

9 Evergreen Employment-Sectors 9 Evergreen Employment-Sectors - Bangalore: Most of us dream of being associated with a sector that is least susceptible to financial meltdowns and

30/10/2013

How To Bypass A Firewall With SSH Tunneling

As we know that Firewall is a basic component for securing a network.The basic purpose of a firewall is to isolate one network from another. Firewalls are becoming available as appliances, meaning they are installed in to the network between two networks.The Hackers often bypass Antiviruses and Anti-spywares by some methods Like Crypting,Hexing, File-pumping etc,but it becomes very difficult for a Hacker to bypass a Firewall so this article will explain on what methods do Hackers use to bypass/Hack firewalls


Firewall is often called Hindrance(Obstacle) in Hacking,the following chart will show you the working of the firewall.


The method which most Hackers use to bypass firewall is known as SSH tunneling.


What is SSH Tunneling?


Well according to wikipedia A Secure Shell (SSH) tunnel consists of an encrypted tunnel created through an SSH protocol connection. Users may set up SSH tunnels to tunnel unencrypted traffic over a network through an encrypted channel


Why do you want to Bypass firewall?


Most network administrators at work, university or school deny access to file sharing, instant messaging or social networks such as facebook or myspace with a firewall or proxy server. If you are constantly getting a message saying "Can't connect" or something similar, the service you are trying to connect to has probably been blocked by your network administrator.

SSH Tunneling Demonstration:

Now i will demonstrate you on How to Bypass/Hack firewall using SSH Tunneling

1.The first thing you need to do is to set up an account for SSH access,There are many paid and free SSH providers listed in DMOZ directory,e.g Superprotocol.com

2.Next you need to download PUTTY.Putty is an open source SSH client.


3.Once you have downloaded it execute it and you will be sent to the configuration page.

4.You will enter in the host name the server through which we can connect SSH access with,make sure SSH is selected using port 22.

5.Now goto Tunnels in SSH options,Here we will set up a Tunnel

6.Change Source port to 8080 and click Dynamic.


7.Once this is Done Click open.


8.Now login in with your information you provided in the SSH Provider

9.Now you have successfully established the tunnel.

10.Now Download WireShark and execute wireshark.

11.Now start Packet capture,it will be empty and now visit google.com from your browser you will see packets getting captured


12.Now we will configure Mozilla firefox to use SSH connection.

13.Go to the "Tools" menu and then "Options


14.Go to the "Advanced" button, the "Network" tab, and then click "Settings


15.In the connection settings enter "localhost" as the "Socks Host and your port number, such as "1080" into the "Port:" field


Now we will go back to wire shark you will see bunch of SSH connection,as you can see we no longer have information what was being sent from server to client

26/10/2013

list of social network site with ranking based on alexa ranking (Alexa Internet, Inc. is a California-based subsidiary company of Amazon.com which provides commercial web traffic data. Founded as an independent company in 1996, Alexa was acquired by Amazon in 1999. )

1. facebook.com rank-2 General: Photos, Videos, Blogs, Apps

2. twitter.com rank-8 :General. Micro-blogging, RSS, updates

3 linkedln.com rank-12 :Business and professional networking

4.sina weibo rank-28 :Social microblogging site in Mainland China

5. Tumbir rank-32: Microblogging platform and Social Networking Website

6. pinterest rank -38 : Online pinboard for organizing and sharing things you love

7 vkontaket rank-38 :General, including music upload, listening and search. Popular in Russia and former Soviet republics

8.flicker rank-48 : Photo sharing, commenting, photography related networking, worldwid

9.Odnoklassniki rank-65 : Connect with old classmates. Popular in Russia and former Soviet republics

05/09/2013

two brother neelay and ankur of patna made a social networkinfgsite..." jumpbook"... which will be better than facebook...according to neelay and ankur..which will be launched very soonn.....

**proud to be indian **

Timeline photos 15/08/2013

5,68,000 Villages
671 Districts,
29 States
6 Union Territory
1 National Territory
1618 Languages
29 Festivals
6400 Castes, 6 Ethnic Groups, 29 Major Festivals and 1 Country
38% of Doctors in USA are INDIANS
12% Scientists in USA are Indians
36% of NASA people comes from INDIA
34% of Microsoft employees from INDIA
28% of IBM employees from INDIA
17% of Intel employees from INDIA
13% of Xerox employees from INDIA

Happy Independence Day

We Salute our Nation \m/

Top 10 IT Certification Courses In Demand 28/07/2013

Top 10 IT Certification Courses In Demand
-------------------------------------------------
http://www.siliconindia.com/shownews/Top_10__IT_Certification_Courses_In_Demand-nid-94198-cid-1.html

Top 10 IT Certification Courses In Demand Top 10 IT Certification Courses In Demand - 1.The Microsoft Certified Technology Specialist (MCTS) An MCTS certification proves your ability to...

20/07/2013

Hide Recycle Bin to System Tray: Use it as Windows Tray Application

Posted: 08 Jan 2011 07:42 AM PST

If you prefer not to use the recycle bin icon on your desktop you can now choose to hide it and keep it as a tray application in your windows taskbar’s system tray.

MiniBin application was designed to be a trashbin for your system tray. It may come handy when you’re hiding the trashbin from your desktop or if you’re using a replacement shell that provides a system tray but no useable trashbin.

This little 43KB download can come handy if you want to hide the recycle bin from the desktop. The software does not need an installation. To make it start with Windows, you can include it in your startup folder.

# Download MiniBin : Link

With a mouse right-click you will be able to empty your Recycle Bin. A small red recycle icon symbolizes that there are files in your Recycle Bin and double-click on this icon, you can empty its contents. If there is a green icon, your Trash is empty.

Telephone