Saturday, August 11, 2012

Windows - Speed Up Your Network and Internet Access

Windows: Speed Up Your, Speed Up Your Network and Internet Access

I have a dial up connection and it improve my speeds about 25% in surfing the internet. give it a try. Im IT , only do it if you feel comfortable with changing registry.

Increasing network browsing speed

Does your computer slow down when you browse your local area network and connect to other computers that are sharing data? One of the most common causes of this slowdown is a feature of Windows Explorer that looks for scheduled tasks on remote computers. This effort can take some time on some computers and can really slow down your browsing. The window with which you are browsing the network may appear to freeze momentarily, as the system is waiting for a response from the remote computer.


Windows XP: Speeding Disk Access

Although this problem is a complex one, the solution is very simple. Instead of having to wait for the remote scheduled tasks, which is useless information to anyone who is not a system administrator remotely configuring scheduled tasks, you can disable this feature.

In order to do this, you will have to change the System Registry and delete a reference to a key so that this feature will not be loaded. To do this, follow these steps:

1. Open up the Registry Editor by clicking the Start Menu and selecting Run. Then type regedit in the text box and click the OK button.

2. Once the Registry Editor has loaded, expand the HKEY_LOCAL_MACHINE key.

3. Next, expand Software and then Microsoft.

4. Locate Windows and expand that as well.

5. You will want to be editing the main system files, so expand CurrentVersion.

6. Because this feature is a feature of the Windows component known as Explorer, expand the Explorer key.

7. Next, you will want to modify the remote computer settings, so expand the RemoteComputer key and then expand the NameSpace key to show all of the features that are enabled when you browse to a remote computer.

8. In the NameSpace folder you will find two entries. One is "{2227A280-3AEA-1069-A2DE-08002B30309D}" which tells Explorer to show printers shared on the remote machine. The other, "{D6277990-4C6A-11CF-8D87-00AA0060F5BF}," tells Explorer to show remote scheduled tasks. This is the one that you should delete. This can be done by right-clicking the name of the key and selecting Delete.

Tip:
If you have no use for viewing remote shared printers and are really only interested in shared files, consider deleting the printers key, "{2227A280-3AEA-1069-A2DE-08002B30309D}", as well. This will also boost your browsing speed.

Once you have deleted the key, you just need to restart and the changes will be in effect. Now your network computer browsing will be without needless delays.

10 reasons why PCs crash U must Know

10 reasons why PCs crash U must Know

Fatal error: the system has become unstable or is busy," it says. "Enter to return to Windows or press Control-Alt-Delete to restart your computer. If you do this you will lose any unsaved information in all open applications."

You have just been struck by the Blue Screen of Death. Anyone who uses Mcft Windows will be familiar with this. What can you do? More importantly, how can you prevent it happening?


1 Hardware conflict

The number one reason why Windows crashes is hardware conflict. Each hardware device communicates to other devices through an interrupt request channel (IRQ). These are supposed to be unique for each device.

For example, a printer usually connects internally on IRQ 7. The keyboard usually uses IRQ 1 and the floppy disk drive IRQ 6. Each device will try to hog a single IRQ for itself.

If there are a lot of devices, or if they are not installed properly, two of them may end up sharing the same IRQ number. When the user tries to use both devices at the same time, a crash can happen. The way to check if your computer has a hardware conflict is through the following route:

* Start-Settings-Control Panel-System-Device Manager.

Often if a device has a problem a yellow '!' appears next to its description in the Device Manager. Highlight Computer (in the Device Manager) and press Properties to see the IRQ numbers used by your computer. If the IRQ number appears twice, two devices may be using it.

Sometimes a device might share an IRQ with something described as 'IRQ holder for PCI steering'. This can be ignored. The best way to fix this problem is to remove the problem device and reinstall it.

Sometimes you may have to find more recent drivers on the internet to make the device function properly. A good resource is www.driverguide.com. If the device is a soundcard, or a modem, it can often be fixed by moving it to a different slot on the motherboard (be careful about opening your computer, as you may void the warranty).

When working inside a computer you should switch it off, unplug the mains lead and touch an unpainted metal surface to discharge any static electricity.

To be fair to Mcft, the problem with IRQ numbers is not of its making. It is a legacy problem going back to the first PC designs using the IBM 8086 chip. Initially there were only eight IRQs. Today there are 16 IRQs in a PC. It is easy to run out of them. There are plans to increase the number of IRQs in future designs.

2 Bad Ram

Ram (random-access memory) problems might bring on the blue screen of death with a message saying Fatal Exception Error. A fatal error indicates a serious hardware problem. Sometimes it may mean a part is damaged and will need replacing.

But a fatal error caused by Ram might be caused by a mismatch of chips. For example, mixing 70-nanosecond (70ns) Ram with 60ns Ram will usually force the computer to run all the Ram at the slower speed. This will often crash the machine if the Ram is overworked.

One way around this problem is to enter the BIOS settings and increase the wait state of the Ram. This can make it more stable. Another way to troubleshoot a suspected Ram problem is to rearrange the Ram chips on the motherboard, or take some of them out. Then try to repeat the circumstances that caused the crash. When handling Ram try not to touch the gold connections, as they can be easily damaged.

Parity error messages also refer to Ram. Modern Ram chips are either parity (ECC) or non parity (non-ECC). It is best not to mix the two types, as this can be a cause of trouble.

EMM386 error messages refer to memory problems but may not be connected to bad Ram. This may be due to free memory problems often linked to old Dos-based programmes.

3 BIOS settings

Every motherboard is supplied with a range of chipset settings that are decided in the factory. A common way to access these settings is to press the F2 or delete button during the first few seconds of a boot-up.

Once inside the BIOS, great care should be taken. It is a good idea to write down on a piece of paper all the settings that appear on the screen. That way, if you change something and the computer becomes more unstable, you will know what settings to revert to.

A common BIOS error concerns the CAS latency. This refers to the Ram. Older EDO (extended data out) Ram has a CAS latency of 3. Newer SDRam has a CAS latency of 2. Setting the wrong figure can cause the Ram to lock up and freeze the computer's display.

Mcft Windows is better at allocating IRQ numbers than any BIOS. If possible set the IRQ numbers to Auto in the BIOS. This will allow Windows to allocate the IRQ numbers (make sure the BIOS setting for Plug and Play OS is switched to 'yes' to allow Windows to do this.).

4 Hard disk drives

After a few weeks, the information on a hard disk drive starts to become piecemeal or fragmented. It is a good idea to defragment the hard disk every week or so, to prevent the disk from causing a screen freeze. Go to

* Start-Programs-Accessories-System Tools-Disk Defragmenter

This will start the procedure. You will be unable to write data to the hard drive (to save it) while the disk is defragmenting, so it is a good idea to schedule the procedure for a period of inactivity using the Task Scheduler.

The Task Scheduler should be one of the small icons on the bottom right of the Windows opening page (the desktop).

Some lockups and screen freezes caused by hard disk problems can be solved by reducing the read-ahead optimisation. This can be adjusted by going to

* Start-Settings-Control Panel-System Icon-Performance-File System-Hard Disk.

Hard disks will slow down and crash if they are too full. Do some housekeeping on your hard drive every few months and free some space on it. Open the Windows folder on the C drive and find the Temporary Internet Files folder. Deleting the contents (not the folder) can free a lot of space.

Empty the Recycle Bin every week to free more space. Hard disk drives should be scanned every week for errors or bad sectors. Go to

* Start-Programs-Accessories-System Tools-ScanDisk

Otherwise assign the Task Scheduler to perform this operation at night when the computer is not in use.

5 Fatal OE exceptions and VXD errors

Fatal OE exception errors and VXD errors are often caused by video card problems.

These can often be resolved easily by reducing the resolution of the video display. Go to

* Start-Settings-Control Panel-Display-Settings

Here you should slide the screen area bar to the left. Take a look at the colour settings on the left of that window. For most desktops, high colour 16-bit depth is adequate.

If the screen freezes or you experience system lockups it might be due to the video card. Make sure it does not have a hardware conflict. Go to

* Start-Settings-Control Panel-System-Device Manager

Here, select the + beside Display Adapter. A line of text describing your video card should appear. Select it (make it blue) and press properties. Then select Resources and select each line in the window. Look for a message that says No Conflicts.

If you have video card hardware conflict, you will see it here. Be careful at this point and make a note of everything you do in case you make things worse.

The way to resolve a hardware conflict is to uncheck the Use Automatic Settings box and hit the Change Settings button. You are searching for a setting that will display a No Conflicts message.

Another useful way to resolve video problems is to go to

* Start-Settings-Control Panel-System-Performance-Graphics

Here you should move the Hardware Acceleration slider to the left. As ever, the most common cause of problems relating to graphics cards is old or faulty drivers (a driver is a small piece of software used by a computer to communicate with a device).

Look up your video card's manufacturer on the internet and search for the most recent drivers for it.

6 Viruses

Often the first sign of a virus infection is instability. Some viruses erase the boot sector of a hard drive, making it impossible to start. This is why it is a good idea to create a Windows start-up disk. Go to

* Start-Settings-Control Panel-Add/Remove Programs

Here, look for the Start Up Disk tab. Virus protection requires constant vigilance.

A virus scanner requires a list of virus signatures in order to be able to identify viruses. These signatures are stored in a DAT file. DAT files should be updated weekly from the website of your antivirus software manufacturer.

An excellent antivirus programme is McAfee VirusScan by Network Associates ( www.nai.com). Another is Norton AntiVirus 2000, made by Symantec ( www.symantec.com).

7 Printers

The action of sending a document to print creates a bigger file, often called a postscript file.

Printers have only a small amount of memory, called a buffer. This can be easily overloaded. Printing a document also uses a considerable amount of CPU power. This will also slow down the computer's performance.

If the printer is trying to print unusual characters, these might not be recognised, and can crash the computer. Sometimes printers will not recover from a crash because of confusion in the buffer. A good way to clear the buffer is to unplug the printer for ten seconds. Booting up from a powerless state, also called a cold boot, will restore the printer's default settings and you may be able to carry on.

8 Software

A common cause of computer crash is faulty or badly-installed software. Often the problem can be cured by uninstalling the software and then reinstalling it. Use Norton Uninstall or Uninstall Shield to remove an application from your system properly. This will also remove references to the programme in the System Registry and leaves the way clear for a completely fresh copy.

The System Registry can be corrupted by old references to obsolete software that you thought was uninstalled. Use Reg Cleaner by Jouni Vuorio to clean up the System Registry and remove obsolete entries. It works on Windows 95, Windows 98, Windows 98 SE (Second Edition), Windows Millennium Edition (ME), NT4 and Windows 2000.

Read the instructions and use it carefully so you don't do permanent damage to the Registry. If the Registry is damaged you will have to reinstall your operating system. Reg Cleaner can be obtained from www.jv16.org

Often a Windows problem can be resolved by entering Safe Mode. This can be done during start-up. When you see the message "Starting Windows" press F4. This should take you into Safe Mode.

Safe Mode loads a minimum of drivers. It allows you to find and fix problems that prevent Windows from loading properly.

Sometimes installing Windows is difficult because of unsuitable BIOS settings. If you keep getting SUWIN error messages (Windows setup) during the Windows installation, then try entering the BIOS and disabling the CPU internal cache. Try to disable the Level 2 (L2) cache if that doesn't work.

Remember to restore all the BIOS settings back to their former settings following installation.

9 Overheating

Central processing units (CPUs) are usually equipped with fans to keep them cool. If the fan fails or if the CPU gets old it may start to overheat and generate a particular kind of error called a kernel error. This is a common problem in chips that have been overclocked to operate at higher speeds than they are supposed to.

One remedy is to get a bigger better fan and install it on top of the CPU. Specialist cooling fans/heatsinks are available from www.computernerd.com or www.coolit.com

CPU problems can often be fixed by disabling the CPU internal cache in the BIOS. This will make the machine run more slowly, but it should also be more stable.

10 Power supply problems

With all the new construction going on around the country the steady supply of electricity has become disrupted. A power surge or spike can crash a computer as easily as a power cut.

If this has become a nuisance for you then consider buying a uninterrupted power supply (UPS). This will give you a clean power supply when there is electricity, and it will give you a few minutes to perform a controlled shutdown in case of a power cut.

It is a good investment if your data are critical, because a power cut will cause any unsaved data to be lost.

how to download from mediafire site?

All Mediafire.com Downloads:

http://www.google.com/search?hl=en&lr=&as_qdr=all&q=+.*+site%3Amediafire.com

Apps Downloads on Mediafire.com:

http://www.google.com/search?hl=en&lr=&as_qdr=all&q=.cab+OR+.exe+OR+.rar+OR+.zip+site%3Amediafire.com&btnG=Search
Movies Download on Mediafire.com

http://www.google.com/search?hl=en&lr=&as_qdr=all&q=+.Avi+OR+.mpg+OR+.mpeg+site%3Amediafire.com&btnG=Search

1)www. mediafiresearch.net Like any other MediaFire search website this site has options to search files on MediaFire, Rapidhsare.com, Hotfile.com, Filesonic.com and many other popular file uploading sites. Also it has got the last 100 searches made on the website in the form of links, you might like some of them.

2)www.shufs.com This is a very decent search engine for MediaFire with options to search files on Megaupload, Rapidshare, Bodango, and Zshare as well.

3)www.uvrx.com/mediafire.html UVRX uses Google custom search engine in order to find files from MediaFire. Type the keywords and it will fetch you the best possible results using the Google Search algorithm.

4)www.searchshared.com/mediafire.com This MediaFire Search engine site has been shared over 1783 Facebook fans and by the looks of it seems quite popular.

5)www. jqd.org  JQD supports Rapidshare, Megaupload, MediaFire, SendSpace, Gigasize, ADrive, Zshare, Depositfiles, Netload, Bodango, Megashares, FileFactory and you can also use it to search for Torrents online. If you want to try a cool file uploading site then check out 4Shared.com, we are sure you will love it. Anyways do let us know if you frequently use Mediafire.com search for all your downloading needs. Also share it with your buddies so that they can make use of all these Mediafire Search websites!

Thursday, July 19, 2012

CCTNS - Crime and Criminal Tracking Network & Systems | P. Chidambaram




The Cabinet Committee on Economic Affairs extends the term of the Crime and Criminal Tracking Network & Systems (CCTNS) project in New Delhi.



CCTNS vs Amarjit Singh OR Rajasthan Police vs Tulip Telecom Ltd ? 

These days I am at Jaipur, working as Team Lead Change Management & Capacity Building for Rajasthan Police on Crime and Criminal Tracking Network & Systems ( CCTNS ) project. Tulip secured this three-year order worth Rs 48.88 crore from the Rajasthan government under the central government-funded Rajasthan State Crime and Criminal Tracking Network and Systems (CCTNS) project.


Crime & Criminals Tracking Network and Systems (CCTNS) project is a Mission Mode Project under the National e- Governance Plan (NeGP). This is an effort of the Government of India to modernize the police force giving top priority to citizen services, information gathering, and its dissemination among various police organizations and units across the country.

CCTNS aims at creating a comprehensive and integrated system for enhancing the efficiency and effective policing at all levels and especially at the Police Station level through adoption of principles of e-Governance, and creation of a nationwide networked infrastructure for evolution of IT-enabled state- of-the-art tracking system around"investigation of crime and detection of criminals" in real time, which is a critical requirement in the context of the present day internal security scenario.


Monday, July 16, 2012

CCTNS vs Amarjit Singh OR Rajasthan Police vs Tulip Telecom Ltd ?

CCTNS vs Amarjit Singh OR Rajasthan Police vs Tulip Telecom Ltd ? 

These days I am at Jaipur, working as Team Lead Change Management & Capacity Building for Rajasthan Police onCrime and Criminal Tracking Network & Systems ( CCTNS ) project. Tulip secured this three-year order worth Rs 48.88 crore from the Rajasthan government under the central government-funded Rajasthan State Crime and Criminal Tracking Network and Systems (CCTNS) project.


Crime & Criminals Tracking Network and Systems (CCTNS) project is a Mission Mode Project under the National e- Governance Plan (NeGP). This is an effort of the Government of India to modernize the police force giving top priority to citizen services, information gathering, and its dissemination among various police organizations and units across the country.

CCTNS aims at creating a comprehensive and integrated system for enhancing the efficiency and effective policing at all levels and especially at the Police Station level through adoption of principles of e-Governance, and creation of a nationwide networked infrastructure for evolution of IT-enabled state- of-the-art tracking system around "investigation of crime and detection of criminals" in real time, which is a critical requirement in the context of the present day internal security scenario.

About CCTNS

Crime and Criminal Tracking Network & Systems (CCTNS) is a plan scheme conceived in the light of experience of a non-plan scheme namely - Common Integrated Police Application (CIPA). CCTNS is a Mission Mode Project under the National e-Governance Pan of Govt of India. CCTNS aims at creating a comprehensive and integrated system for enhancing the efficiency and effectiveness of policing through adopting of principle of e-Governance and creation of a nationwide networking infrastructure for evolution of IT-enabled-state-of-the-art tracking system around 'Investigation of crime and detection of criminals'. An allocation of Rs. 2000 crores has been made for CCTNS Project. Cabinet Committee on Economic Affairs (CCEA) has approved the project on 19.06.2009. Expression of Interest (EOS) has been invited from the Software developers by 17.08.2009. We are in the process of finalizing an MoU between NCRB on behalf of Government of India and the Software Developing Agency.

Objectives of 'CCTNS'

The objectives of the Scheme can broadly be listed as follows:
1. Make the Police functioning citizen friendly and more transparent by automating the functioning of Police Stations.
2. Improve delivery of citizen-centric services through effective usage of ICT.
3. Provide the Investigating Officers of the Civil Police with tools, technology and information to facilitate investigation of crime and detection of criminals.
4. Improve Police functioning in various other areas such as Law and Order, Traffic Management etc.
5. Facilitate Interaction and sharing of Information among Police Stations, Districts, State/UT headquarters and other Police Agencies.
6. Assist senior Police Officers in better management of Police Force
7. Keep track of the progress of Cases, including in Courts
8. Reduce manual and redundant Records keeping

Under the CCTNS Project, approx. 14,000 Police Stations throughout the country has been proposed to be automated beside 6000 higher offices in police hierarchy e.g. Circles, Sub-Divisions, Districts, Range, Zones, Police Headquarters, SCRBx including scientific and technical organizations having databases required for providing assistance and information for investigation and other purposes e.g. Finger Print Bureaux, Forensic Labs etc. by 2012.
CCTNS- Important Guidelines / Templates/ Information on CCTNS from MHA / NCRB

 



CCTNS – Important Guidelines

CCTNS - Monitoring Formats
1.
2.
3.
4.
5.

CCTNS – Useful information for SPMC
1. PIM template
2. Model Request For Proposal (RFP) for Selection of System Integrator (SI) at the States
3. Functional Requirements Specification (FRS) for the Core Application Software (CAS):            01 Registration Module            02 Investigation Module            03 Prosecution Module            04 Search Module            05 Citizen interface Module            06 Navigation Module            07 Configuration Module
CCTNS – Training related Information
        a. EOI for CCTNS          b. EOI for CCTNS in Hindi        c. Corrigendum


CCTNS in Media



1.
2.
3.
4.
5.
6.
7.
8.
9.
10.


IT BASIC COURSE FOR CCTNS IN HINDI



Friday, May 18, 2012

Why Kindle App Decided to Go for Fresh New Look, New High Resolution Graphics for New iPad


Introduction

Recently, the new iPad was launched. Apple has high hopes from their latest device and the sales indicate that their expectations will be fulfilled. There has been much hype and hoopla surrounding the new features that have been incorporated into the new iPad. The most prominent feature is the new high resolution retina display. It provides outstanding picture clarity and makes the iPad the ideal device for reading a book on. In keeping with the upgraded display, the Kindle app has been modified as well. It is has adopted a fresh new look complete with high resolution graphics. Amazon’s move to make the Kindle app suitable to the new iPad has caught the attention of everyone including industry insiders, market experts and broadband plans providers. They are musing over why they went to the trouble of upgrading their app.

The Background

Around the time of the new iPad’s launch, Amazon also launched a new version of its Kindle Fire. As you know, the Kindle is a reading tablet. People can download, read and store their books on the Kindle. However, the Kindle Fire was initially crushed by the strong sales of the new iPad. Because their gadget didn’t work out, Amazon wasted no time in putting out an app for the iPad. While this is a strong reason for their decision, there are some other reasons why Kindle app decided to go for a fresh new look and new high resolution graphics for new iPad.

Why the Kindle App Was Upgraded

Compatibility

As mentioned above, the new iPad comes with a superior display that provides clearer images. Apple itself has worked on the iBooks app to improve it for the new iPad. Hence, it is no surprise that Amazon followed suit with the Kindle app. It was obvious that unless they make an effort to improve the existing app, there was no way people are going to download it.


User Friendliness

This point ties in with the previous one. People have an alternative eBook reading app with iBooks. The Kindle is considered to be better than that because of the number of books on offer. However, iBooks is much more user friendly for the owners of the new iPad. It has been upgraded and modified to suit the new device. The older version of the iBooks app has been discarded in favor of the new one.

Competition

The iBooks app is not the only competition for the Kindle app. There are various other reading apps available for free to the iPad users. If they are not satisfied with any one, they can switch to another one. That being said, the other e-reading apps (Nook and Kobo) have not yet been upgraded. It is expected that the makers will adapt them to become suitable for the new iPad in the near future. Till then, the users have to make do with iBooks or the Kindle app.

No Links for Buying Books

One thing the Kindle app sorely misses is a direct link to the Amazon store so that people can purchase the books directly. As they were unable to find a way to make this work, they had to target another area, which they did. By enhancing the quality of their app, they have ensured that the users won’t be turned off by not having a direct link through to the Amazon website. As for users who want access, they can bookmark the link to the Amazon store in the Safari browser.

A Touch of Kindle Fire

Amazon has shrewdly included some features in the app that make it work as if the user was reading on a Kindle Fire. The dwindling demand for their gadget has affected the sales badly. By providing the iPad users some experience of what they gain by buying the Kindle Fire, they might be able to convince a few to buy their gadget. It is a subtle yet smart move on part of Amazon to somehow boost the sales of the Kindle Fire.

Conclusion

Industry experts and broadband plans providers know the Kindle Fire stands no chance in comparison to the new iPad. The only option left to Amazon was to enhance the Kindle app which they have done. You can download the new look Kindle app with high resolution graphics to get access to their library which has over a million eBooks for your reading pleasure.

Friday, May 4, 2012

Exclusive Interview of Rahul Tyagi: Author of “Hacking Crux 2

Exclusive Interview of Rahul Tyagi: Author of “Hacking Crux 2 

Source: Softpedia 

Rahul Tyagi, a respected ethical hacker from India, is about to release his latest work, a book called “Hacking Crux 2.” This is meant as a guide to anyone who wants to learn about hacking and defending themselves and others against cybercriminal plots. 


Because the book looks very promising, we have decided to interview the author to find out more about his work and his new creation. Besides discussing his contributions to the IT security industry, Tyagi also shared his insight regarding the fact that many Indian ethical hackers are called fakes. 

Softpedia: Please introduce yourself for our readers.

Rahul Tyagi: My name is Rahul Tyagi and I am 24 years old. I am a person for whom work is more important than anything in the world. I was born in a middle class family in Gurdaspur, a small city in Punjab. My father is an accountant and my mother is a housewife. I love to interact with new people and share knowledge.

At the age of 17 my father brought the first PC to my home for his accounting work. I remember spending hours on my father's computer, getting in trouble for messing things up. It occurred to me that the only way you really learn about something is by breaking it, then fixing it. 

I am Lapi-Worm kinda person who works 24/7 on a laptop for many days without sleep. My mind always thinks of something, my mind never stays free. Because one thing I learnt in my life: a free mind is the house of Ghost. I admire Steve Jobs and I want to contribute to the cyber society just like him. 

Softpedia: What qualifies you as an ethical hacker? Tell us about your previous experience and studies.

Rahul Tyagi: Well, first I will try to explain the meaning and responsibility of an ethical hacker. According to me, an ethical hacker is a computer geek, who obviously thinks more out of the box than other computer lovers. The main responsibility of an ethical hacker is to protect people from the cyber space attacks. 

Protection can be at corporate level by securing their servers, by patching the web vulnerabilities or maybe securing a common man’s Gmail account by adding two-step verification on his/her account. 

I think I have trained more than 10,000 people from all around the world physically and online in the last 7 years, and today if they are using their computers and internet freely without any problems then I think my work is done. 

I did my pre schooling from my hometown. I have obtained a bachelor’s degree in Computer Applications at the Punjab Technical University. After my three year graduation I got admitted to India’s largest university, the Lovely Professional University (LPU) for my masters, i.e, Master in Computer Applications (MCA), and that was my life’s best decision. 

At LPU I learned a lot because there I found the best infrastructure required for penetration testing. I hacked into LPU’s University Management System twice and found much vulnerability in the network, but instead of doing harm I reported the vulnerability to the authorities there. 

In my 5th semester of masters I got placed in TCIL-IT Chandigarh as their brand ambassador and that was something big for me. Later I was selected as Vice-President of Cyber Security and Anti-Hacking Org India. Last, but not least, I am working as the Technical Head at the News Paper Association of India. 

For the past two years I have been associated with DEF CON India meets and I was one of the leading speakers in DEF CON Chennai, where I presented my paper named “Busting Windows in Backtrack 5” and DEF CON Rajasthan, where I presented my paper called “The Endless Fight with Global Cyber Crime”. 

This month you can see my article in one of the reputable security magazines named Pen Test. 

Softpedia: Tell us a little bit about your new book “Hacking Crux 2”. What IT security topics does it cover?

Rahul Tyagi: Hacking Crux 2 is a book which is like a mirror of me. Everything that I learned in the past I’ve put into this book. I had many issues with the content of the book, but after 8 months of “blood burn effort” from my part and my publisher, Mr. Dev, I am happy to present Hacking Crux 2. 

Initially I wanted to publish it in January, but after that I decided to make it more knowledgeable and I tried to cover every aspect related to computer security in it. We tried to make this a lively book, having 90% screenshots for the readers so that it will be easy for them to implement testing by just watching the pictures, rather than reading theory.

Here are the chapters of the book:

1. Introduction to Ethical Hacking
2. Information Gathering
3. Advance Google Hacking
4. Trojan and Backdoors
5. Binder and Crypters
6. Website Hacking Techniques 
7. Spamming Techniques
8. Email Hacking and Countermeasures 
9. Advance System Hacking 
10. Steganography Terrorist’s Way
11. Basics of Python for Coders
12. Virus and Worms
13. Proxy Servers ad VPN
14. Exploit Launching with Perl
15. Advance Mobile Hacking 
16. Wireless Attacks
17. Penetration Testing With Backtrack 5 R1 

We have a total of 17 chapters covering every possible ethical hacking module. The main highlighted topics of the book are Binder and Crypters, Advance System Hacking, Email Hacking and Countermeasures, Exploit Launching in Perl, Advance Mobile Hacking , Penetration Testing With Backtrack 5, and, last but not least, my favorite, Basics of Python. 

This is the first book on ethical hacking ever published in India having so many chapters at such a small price, i.e. INR150 , under 5 USD. 

I tried to make this book as informative as possible so that after reading this book no one will need to join any expensive ethical hacking courses. If you believe my words, then Hacking Crux 2 contains all you ever need and wish to know about the so-called “Ethical Hacking”. 

Softpedia: When will the book be released and where will it be available?

Rahul Tyagi: We are trying to publish it worldwide through eBay, Amazon, Flipkart, Snapdeal to our international readers before May 15. Indian readers can get this book from any nearby bookstore starting with the last week of May or the first week of June. Also, online purchasing options like Flipkart and Snapdeal will be available. 

And if someone is facing any problems then they can send an order to hackingcrux2@gmail.com. 

Softpedia: In the past period many Indian ethical hackers have been named fakes and mere marketing stunts. On the other hand, we have white hats, such as Himanshu Sharma, who try to wash away this stained reputation gained by many Indian security experts. What makes you different from the fakes? What do you hope to achieve with this book and with your work?

Rahul Tyagi: If you talk about Himanshu, then yes, he is like my younger brother. Even though he is younger than me, I still respect his talent from the bottom of my heart. 

Now, let’s talk about some fake hackers. According to me, there are some reasons why people call some Indian ethical hackers fake.

The first reason is that many ethical hackers claim to be great in their work, but if you talk about statistics, then they are ZERO. You can take a look at attrition.org. 

They exposed many ethical hackers who were just fooling people with ethical hacking courses, but in reality the things they teach are just internet filtering techniques and tricks, which, from my point of view, are not going to help any person get a reputed job in any company. 

That’s why those who have done the ethical hacking certification from these kinds of hackers later abuse them and say that they were fake hackers, who cheated them.

The second reason is that people from the cyber world these days are becoming smarter day by day. They are bored with traditional hacking tricks, hacking websites with SQL Injection, NETBUS, Proxy servers and other “noobish” things, which today anyone can do even at the age of 10. So if you are repeating the same and same thing from 2000 to 2012, then obviously you deserve the tag of fake hacker.

As far as I am concerned, it’s not that I don’t have critics, but today almost all white hat and black hat communities know me, respect me and motivate me. I have many friends from both black and white hat communities who from time to time help me upgrade myself. 

This is why I was the first white hat ethical hacking trainer who spoke at DEF CON meets in India. My paper is there in Exploit-DB and Packetstorm Security and if you compare this fact with the ethical hackers tagged as fakes, they don’t submit any papers and they never dare to enter into conferences like DEF CON and NULLCON.

The only thing that makes me different from other ethical hackers is that I do not forget my past, from where I rose. Even though I have 38k followers on Twitter and 5k friends on Facebook , I reply to every possible query they ask me. 

I also believe in contributing with new stuff to cyber space, hence a few months back, I released a full Python language-learning course on YouTube and it was the first ever basic Python video lectures series made by an Indian ethical hacker. 

With all this I don’t think anyone can say I am a fake hacker. If anyone wants to say that, I ask him/her to compare my contribution with the ones of other fake ethical hackers and, they will get their answer automatically.

Finally, I hope my new book Hacking Crux 2 will help you to learn all the hidden areas of ethical hacking, especially ones that are never revealed by any ethical hacker, ever. I promise that if you trust me and buy this book you will thank me for sure.

You can contact me on: FacebookTwitter or by e-mail.