Brainfoldb4u's Blog

Just another WordPress.com weblog

Zues, IM threats

Posted by brainfoldb4u on January 25, 2010

A new threat to instant Messaging (IM) has been identified with a previously well known trojan called Zues attacking users of AOL Instant Messaging and stealing passwords.Zues is one of the best-selling Trojan kit on the black market today  and become the popular choice among cybercriminals because it’s easy to set up and control, and can be used for a variety of purposes. And, like popular commercial software, Zeus comes in a standard version (costing a minimum of $1000) and a professional version with extra features such as a large library of target templates.

So What is Zues is?

Zues network of affected computers

Zues also known as Zbot is an threat organised by army of attackers (known as Zeus builders) who pay thousands for the latest zues builder to make sure they distribute the most up-to-date undetectable bot builds. But they are also available for free in various black market and web sites such as file sharing web sites.

Zeus/Zbot samples are distributed every day in alarming rate. It’s kind of an attack  where multiple modifications of the bot are being produced in-the-wild, packed and encrypted on top with all sorts of packers, including modified, hacked, or private packer builds. Before being released, every newly generated and protected bot is uploaded into popular multi-AV scanner services to make sure it is not detected by any antivirus vendor. Hence, quite a bit of a problem in terms of its distribution scale.

latest generation Zues are capable of using the rootkit techniques to hide its presence on a customer machine.

The bot uses covert methods of injecting additional fields into online Internet banking websites, asking users to answer questions that the authentic website would not ask. The collected details are then silently delivered to remote websites, and added into remote databases. The databases are then sold to other criminal elements down the chain who specialize in withdrawing the funds. The money laundering groups anonymously hire physical people to withdraw money from their personal accounts – in the criminal world these people are called “drops”, and their accounts are called “drop accounts”.

Current Threat to Instant Messengers (IM)

People using the popular instant messaging platform receive an email message announcing an update and are then prompted to click through to download what appears to be a legitimate file, aimupdate_7.1.6.475.exe. However, the so-called update is actually the Zeus installer, which can then transfer itself onto the victim’s machine, whether or not the AIM user clicks on the link to download the executable file.

“It opens an IFRAME to a site that attempts to use vulnerable versions of Adobe Reader to push the Zeus keylogger down to the victim’s computer, then executes it within a few moments of the page loading. The fake web page to which victims are brought appears to be an AOL site, but a close look reveals inconsistencies to an authentic web page. Notably,

  • a true AIM installer has a digital signature from parent company AOL attached. This one does not contain that signature.
  • Further, the URL used for the download begins with a legitimate-seeming address, “update.aol.com”,
  • but that is followed by a six- to seven random-character word followed by .com.pl.

“The exploit opens, in an IFRAME, a page hosted on the IP address in the Vishclub network, which in turn loads a fairly large (15,628 byte) blob of obfuscated JavaScript,” according to the Webroot blog post. “The script invokes the browser to load Adobe Reader, then pushes a file called ‘pdf.pdf’ down to the Reader. That file is built to attack the Collab overflow exploit, the util.printf overflow exploit, and the getIcon exploit in order to force the operating system to download and execute files.”

Webroot Advices
Webroot advises that to avoid this particular exploit focused on AIM, users turn off Adobe Reader’s embedded JavaScript. “There’s almost no circumstance where JavaScript is required,” Brandt said. Turning it off will give web users an extra prompt should they encounter a site that calls for Java, at which point they can make a choice.

Brandt also said that he recommends web surfers use the Firefox browser with the NoScript plug-in extension.

Known facts about Zues:

  • The ZEUS Trojan will commonly use names like below so search your PCs for files with this names:
  1. NTOS.EXE,
  2. SDRA64.exe
  3. LD08.EXE,
  4. LD12.EXE,
  5. PP06.EXE,
  6. PP08.EXE,
  7. LDnn.EXE
  8. PPnn.EXE
  • Typical size for Zues be 40KBytes and 150Kbytes .
  • Additionally look for folder with the name WSNPOEM, this is also a common sign of infection for the ZEUS Trojan.
  • Finally, check the Registry looking for RUN keys referencing any of these names.
  • Do not assume because your antivirus or internet security suite does not show any signs of infection that your PC does not have the ZEUS Trojan infection.

Sample Zues infection diagram from Trend Micro

Ways to remove Trojan manually

I found this information on Spyware techie’s blog as manual removal method for techie computer users. Unknown Trojan manual removal may be difficult and time consuming to remove. There’s no guarantee that Unknown Trojan will be removed completely. So read the Unknown Trojan removal steps carefully and good luck.

Before you start: Close all programs and Internet browsers and back up your computer incase if something goes wrong.

  1. Uninstall Unknown Trojan Program
    Click on StartSettingsControl Panel > Double-click on Add/Remove Programs. Search for and uninstall Unknown Trojan if found.
  2. To stop Unknown Trojan processes
    Go to StartRun > type taskmgr. The click the Processes tab and you’ll see a list of running processes.
    Search and stop these Unknown Trojan processes:
    There are no processes.
    For each unwanted process, right-click on it and then select “End task”.
  3. To Unregister Unknown Trojan DLLs .To find how to delete DLL files click here
    Search and unregister these Unknown Trojan DLLs: There are no dll’s.

    To locate the Unknown Trojan DLL path, go to StartSearchAll Files or Folders. Type Unknown Trojan and in the Look in: select either My Computer or Local Hard Drives. Click the Search button.
    Once you have the Unknown Trojan DLL path, go to Start and then click on Run. In theRun command box, type cmd, and then click on OK.
    To locate the exact DLL path, type cd in order to change the current directory. To display the contents of the directory, use the dir command. To remove the DLL file typeregsvr32 /u FILENAME.dll (FILENAME is the name of the file that you want to unregister).

  4. To unregister Unknown Trojan registry keys To know about how to remover register keys click here
    Go to StartRun > type regedit > press OK.
    Edit the value (on the right pane) by right-clicking on it and selecting the Modify option. Select the Delete option.
    Search and delete these Unknown Trojan registry keys:
    There are no registry keys.
  5. If your homepage has been changed, go to StartControl PanelInternet Options> click on the General > click Use Default under Home Page. Add the your desired default homepage, then click Apply > click OK. Open a new web browser to check that you have your desired default homepage.
  6. Remove Unknown Trojan Directories.
    To find Unknown Trojan directories, go to StartMy ComputerLocal Disk (C:) >Program FilesShow the contents of this folder.
    Search and delete the following Unknown Trojan directories:
    There are no directories.

    Right-click on the Unknown Trojan folder and select Delete.A message will appear saying ‘Are you sure you want to remove the folder Unknown Trojan and move all its contents to the Recycle Bin?’, click Yes.
    Another message will appear saying ‘Renaming, moving or deleting Unknown Trojan could make some programs not work. Are you sure you want to do this?’, click Yes.

  7. To remove Unknown Trojan icons on your Desktop, drag and drop them to the Recycle Bin.

Posted in Exploit, Hacking, Information Security, Passwords | Tagged: , , | Leave a Comment »

List of common windows error codes

Posted by brainfoldb4u on January 25, 2010

System error codes will appear in software programs and in various areas within the Windows operating system after certain errors occur. Unfortunately, sometimes you’ll only be shown the error code number but nothing about what the error code means! Knowing what a system error code means is necessary to troubleshoot the error.

Error #1  System error code 1 means “Incorrect function.” This error code may also display as “ERROR_INVALID_FUNCTION” or as the value 0x1.

Error #2 System cannot find specified file. This error code may also display as “ERROR_FILE_NOT_FOUND” or as the value 0x2.

Solution: You should reinstall NCP & DUN
Error #3  System error code 3 means “The system cannot find the path specified.” This error code may also display as “ERROR_PATH_NOT_FOUND” or as the value 0x3

Error #4  “The system cannot open the file.” This error code may also display as “ERROR_TOO_MANY_OPEN_FILES” or as the value 0x4

Error #5 Access Denied

Solution:
1. Ensure that you have entered the right username and password in the field labeled domain for NT/2k.
2. Check that the option accept any authentication including clear text is activated.

Error #5 Invalid Procedure Call
Solution: Dialup and Network components must be installed again

Error #6 Stack Overflow
Solution:
1. Try cold booting your computer.
2. If this does not work, the problem might come from your RAM or the Swap file.

Error #20 The system cannot find the specified device
Solution:
1. Ensure that the right modem has been selected.
2. If it does not respond, try to reinstall it.
3. You can also try to reinstall NCP/DUN/RAS.

Error #71 No more connections is allowed
Solution:
1. Someone else might have connected under your account.
2. If you have been ghosted on the server, your Internet Service Provider can bump the ghost program off.

Error # 100 System error code 100 means “Cannot create another system semaphore.” This error code may also display as “ERROR_TOO_MANY_SEMAPHORES” or as the value 0x64

Error Code 101 System error code 101 means “The exclusive semaphore is owned by another process.” This error code may also display as “ERROR_EXCL_SEM_ALREADY_OWNED” or as the value 0x65.

Error Code 102 System error code 102 means “The semaphore is set and cannot be closed.” This error code may also display as “ERROR_SEM_IS_SET” or as the value 0x66.

Error Code 103 System error code 103 means “The semaphore cannot be set again.” This error code may also display as “ERROR_TOO_MANY_SEM_REQUESTS” or as the value 0x67.

Error Code 104 System error code 104 means “Cannot request exclusive semaphores at interrupt time.” This error code may also display as “ERROR_INVALID_AT_INTERRUPT_TIME” or as the value 0x68.

Error Code 105 System error code 105 means “The previous ownership of this semaphore has ended.” This error code may also display as “ERROR_SEM_OWNER_DIED” or as the value 0x69.

Error Code 106 System error code 106 means “Insert the diskette for drive %1.” This error code may also display as “ERROR_SEM_USER_LIMIT” or as the value 0x6A.

Error Code 107 System error code 107 means “The program stopped because an alternate diskette was not inserted.” This error code may also display as “ERROR_DISK_CHANGE” or as the value 0x6B.

Error Code 108 System error code 108 means “The disk is in use or locked by another process.” This error code may also display as “ERROR_DRIVE_LOCKED” or as the value 0x6C.

Error Code 109 System error code 109 means “The pipe has been ended.” This error code may also display as “ERROR_BROKEN_PIPE” or as the value 0x6D.

Error #380 Invalid Proper Value
Solution:
1. Autodial should be pointed to the correct dialer.
2. Else, set up the dialer again.

Error #600 An operation is pending
Solution:
1. You should first try to reboot your computer.
2. Ensure that no other program is using your modem.
3. Else press Ctrl-Alt-Delete and if RNAAPP loads, contact a technician to fix this problem.
4. Make sure that your computer is Spyware free.

Error #601 The port handle is invalid
Solution:
1. Select the modem’s COM port and under the Diagnosis section, open more Info. You should reboot your computer if you are able to get Atl responses. Hence, remove the erroneous init string or enter ATZ as the init.
2. You can also reinstall your modem
3. Else press Ctrl-Alt-Delete and if RNAAPP loads, contact a technician to fix this problem.
4. Your Dialup Networking should be installed again together with its components
5. Your modem might not be working properly. You should then consult your computer manufacturer.

Error #602 The port is already open
Solution:
1. Try to reboot your computer
2. Ensure that no other program is using the modem
3. Else press Ctrl-Alt-Delete and if RNAAPP loads, contact a technician to fix this problem
4. Try uninstalling the AOL Adapters in the Network Control panel and reboot your computer. Install your Dialup Adapter again.
5. Remove the erroneous init string or enter ATZ as the init.
6. If you have Quicken 2000, deactivate the Quicken Download Manager.
7. You should maybe install your modem again.
8. Make sure that your computer is Spyware free.

Error #603 Callers buffer is too small
Solution:
1. Ensure that your port speed is not configured to a low speed
2. In your Port Settings, ensure that FIFO is not set to low.
3. Your Dialup Networking should perhaps be installed again together with its components
4. If you are still having problems, contact your computer manufacturer.

Error #604 Wrong information specified.
Solution:
1. Ensure that the are no outages within your area
2. Try to enter the username and password again
3. Set up the dialer again
4. Your Dialup Networking should be installed again together with its components
5. You can also try to reinstall your modem

Error #605 Cannot set port information.
Solution:
1. Ensure that the are no outages within your area
2. Try to enter the username and password again
3. Set up the dialer again
4. Your Dialup Networking should be installed again together with its components
5. You can also try to reinstall your modem

Error #606 The port is not connected.
Solution:
1. Select the modems COM port and under the Diagnosis section, open More Info. You should reboot your computer if you are able to get Ati responses. Hence, remove the erroneous init string or enter ATZ as the init.
2. You can also reinstall your modem
3. Else press Ctrl-Alt-Delete and if RNAAPP loads, contact a technician to fix this problem.
4. Your modem might not be working properly. You should then consult your computer manufacturer if the problem persists.

Error #607 The event is invalid.
Solution:
1. If this problem arises while dialing up to the internet, verify that the settings of the event log have been correctly set.
2. Try rebooting your system and ensure that the dialer/network settings have been correctly configured
3. Else, install RAS/DUN again.

Error #608 The device does not exist.
Solution:
1. Check that the right modem is set in the dialer
2. Ensure that you are using the right modem drivers by checking the modem diagnostics. If its not the case, set up the correct drivers.
3. Remove and install the dialer again
4. Your modem might not be working properly; try to install it again.
5. You should then consult your computer manufacturer if the problem persists.

Error #609 The device type does not exist.
Solution:
1. Check that the right modem is selected in the dialer
2. Ensure that you are using the right modem drivers by checking the modem diagnostics. If its not the case, set up the correct drivers.
3. Your modem might not be working properly; try to install it again.
4. You should then consult your computer manufacturer if the problem persists.

Error #610 The buffer is invalid.
Solution:
1. Ensure that your port speed is set to low in the modem properties.
2. In your Port Settings, check that FIFO is not set to low.
3. Remove and install the dialer again.
4. Else, install RAS/DUN again.
5. You should then consult your computer manufacturer if the problem persists.

Error #611 The route is not available.
Solution:
1. Try to reboot your computer
2. Ensure that you set the right configurations for the dialer and network settings.
3. Else, install the network components again.
4. If you are using a LAN connection, consult your system administrator.

Error #612 The route is not allocated.
Solution:
1. Reboot your computer
2. Ensure that you set the right configurations for the dialer and network settings.

Error #613 Invalid compression specified.
Solution:
1. Try to reboot your computer
2. Else, add &K3 to the extra settings.
3. If this still does not solve the problem, add &K0.
4. You can also try to reinstall the modem.

Error #614 Out of buffers.
Solution:
1. Ensure that our port speed is not too low.
2. Try to install your modem again.

Error #615 The port was not found.
Solution: Try to install your modem drivers.

Error #616 An asynchronous request is pending.
Solution:
1. Reboot your computer.
2. Try to install your modem drivers again.

Error #617 The port or device is already disconnecting
Solution:
1. Wait until your modem disconnects properly.
2. If this operation is taking too long, reboot your computer.

Error #618 The port is not open.
Solution:
1. Reboot your computer
2. Ensure that no other program is making use of the modem.

Error #619 The port is disconnected.
Solution:
1. Reboot your computer
2. Ensure that no other program is making use of the modem.
Error #621 Cannot open the phone book file.
Solution: Install Blue Frog connection software again.

Error #622 Cannot load the phone book file.
Solution: Install Blue Frog connection software again

Error #623 Cannot find the book entry.
Solution: Install Blue Frog connection software again

Error #626 Cannot load a string
Solution:
1. Try to reboot your system.
2. Install Blue Frog connection software again

Error #627 Cannot find key
Solution: Install Blue Frog connection software again

Error #628 The port was disconnected
Solution:
1. Install Blue Frog connection software again
2. Try to install your modem drivers again.

Error #629   The port was disconnected by the remote machine.
Solution:
1. Install Blue Frog connection software again
2. Try to enter an alternate Access Number
3. Try to install your modem drivers again.

Error #630 The port was disconnected due to hardware failure.
Solution:
1. Install Blue Frog connection software again
2. Try to reinstall your modem drivers.
3. Try to use an alternate modem.
4. Else, replace your current modem with a new one.

Error #631 The port was disconnected by the user.
Solution:
1. Ensure that the right Access Number is being dialed.
2. Try to reboot your computer.

Error #632 The structure size is incorrect.
Solution:
1. Try to reboot your computer
2. Install Blue Frog connection software again

Error #633 The port is already in use or is not configured for Remote Access dialout.
Solution:
Try to reboot your computer
Else try to reinstall your modem drivers.

Error #634 Cannot register your computer on the remote network
Solution:
Try to check your network settings and modify your computer name.
Install the network control panel again.

Error #635 Unknown Error
Solution:
1. Try to reboot your computer
2. Install Blue Frog connection software again
3. Else try to reinstall your modem drivers.

Error #636 The wrong device is attached to the port
Solution: Check in your settings if you have chosen the right modem.

Error #637 The string could not be converted
Solution:
Try to reboot your computer
Install Blue Frog connection software again

Error #638 The request has timed out.
Solution:
Try to reboot your computer
Install Blue Frog connection software again

Error #645 Internal authentication error.
Solution:
1. Try to reboot your computer
2. Install Blue Frog connection software again
3. Else try to reinstall your modem drivers.

Error #650 The Remote Access server is not responding.
Solution:
Check that your connection and network settings have correctly been configured.
Ensure that the modem has been correctly set up and look for updated drivers.
Set FIFO buffers to a lower speed and ensure that you have unchecked the option Only connect at this speed.

Error #676 The line is busy
Solution: Ensure that your Access Number is still active and is correctly dialed.

Error #678   There is no answer.
Solution:
1. First of all check that your phone lines are correctly plugged in.
2. Ensure that the Access Number is correct
3. Else, try another Access number
4. If you are trying to make use of your connection in a bad weather, this might be the source of the problem. Wait until it calms down and try again.
5. Else, install your modem drivers again.
6. If the problem persists, you might need to contact your ISP.

Error #680 There is no dial tone.
Solution:
First of all check that your phone lines are correctly plugged in.
The phone lines might be damaged. Replace them and try again.
Else, install your modem drivers again.
If the problem persists, you might need to contact your ISP or a technician.

Error #691 Access denied because username and/or password is invalid on the domain.
Solution:
1. Ensure that you have entered the right username and password.
2. Make sure that your account is active and turned on.
3. You might also try to enter another Access Number.
4. If the problem persists, you might need to contact your ISP.

Error #692 Hardware failure in port or attached device.
Solution:
Browse for and remove any Blue Frog init strings.
Install Blue Frog connection software again
Else, install your modem drivers again.

Error #718 PP Timeout
Solution:
1. Try to reboot your computer
2. Ensure that you have entered the right username and password
3. You might try another Access Number
4. Install Blue Frog connection software again
5. Else, install your modem drivers again.

Error #721 Remote PPP peer is not responding.
Solution: For Windows 2000/XP/Vista operating systems, ensure that the security setting for the dialer reads Allow unsecured Password

Error #734 The PPP link control protocol terminated.
Solution: For Windows 2000/XP/Vista operating systems, ensure that the security setting for the dialer reads Allow unsecured Password

Error #777 The connection attempt failed because the modem on the remote computer is out of order.
Solution:
1. Install Blue Frog connection software again
2. Try an alternate modem
3. Install your modem drivers again
4. Else, install a new modem

Error #778   It was not possible to verify the identity of the server.
Solution:
1. Ensure that you are dialing the correct phone number
2. Verify the connection and Network settings
3. ensure that you do not have any outrage on the phone number
4. Ensure that you have correctly installed your modem and check for updated drivers.
5. Set FIFO buffers to a lower speed and ensure that you have unchecked the option Only connect at this speed.

Error #779 To dial out using this connection, you must use a smart card.
Solution:
1. Ensure that all auth is allowed in your connection settings in the Security section.
2. Verify that you have correctly set the other dialer settings.
3. Else, create the dialer again.
4. You might need to use the Smart Card Reader as initially setup by the Network Administrator.

Error #780 An attempted function is not valid for this connection.
Solution: Ensure that the dialer, not the one set up for LAN use though, has been properly installed and has the right settings.

Error #781 The encryption attempt failed because no valid certificate was found.
Solution: You have to get a valid certificate by registering to the website here

Error #782 Network Address Translation (NAT) is currently installed as a routing protocol, and must be removed before enabling Internet Connection Sharing

Error #783 Internet Connection Sharing cannot be enabled. The LAN connection selected as the private network is either not present, or is disconnected from the network. Please ensure that the LAN adapter is connected before enabling Internet Connection Sharing.

Error #784 You cannot dial using this connection at logon time, because it is configured to use a user name different than the one on the smart card. If you want to use it at logon time, you must configure it to use the user name on the smart card.

Error #785 You cannot dial using this connection at logon time, because it is not configured to use a smart card. If you want to use it at logon time, you must edit the properties of this connection so that it uses a smart card.

Error #786   The L2TP connection attempt failed because there is no valid machine certificate on your computer for security authentication.

Error #787 The L2TP connection attempt failed because the security layer could not authenticate the remote computer.

Error #788 The L2TP connection attempt failed because the security layer could not negotiate compatible parameters with the remote computer.

Error #789 The L2TP connection attempt failed because the security layer encountered a processing error during initial negotiations with the remote computer.

Error #790 The L2TP connection attempt failed because certificate validation on the remote computer failed.

Error #791 The L2TP connection attempt failed because security policy for the connection was not found.

Error #792 The L2TP connection attempt failed because security negotiation timed out.

Error #793 The L2TP connection attempt failed because an error occurred while negotiating security.

Error #794 The Framed Protocol RADIUS attribute for this user is not PPP.

Error #795
The Tunnel Type RADIUS attribute for this user is not correct.

Error #796 The Service Type RADIUS attribute for this user is neither Framed nor Callback Framed

Error #797 A connection to the remote computer could not be established because the modem was not found or was busy.

Error #798 A certificate could not be found that can be used with this Extensible Authentication Protocol.

Error #799 Internet Connection Sharing (ICS) cannot be enabled due to an IP address conflict on the network. ICS requires the host be configured to use 192.168.0.1. Please ensure that no other client on the network is configured to use 192.168.0.1

Error #800 Unable to establish the VPN connection. The VPN server may be un-reachable, or security parameters may not be configured properly for this connection
Solution:
1. Check your ADSL line as it is probably not synched.
2. Verify that your Security Options are correctly set in your connection options.
3. Either your Network Card or your modem might not work properly. Contact a technician if the problem persists.

Error #994 means “Access to the extended attribute was denied.” This error code may also display as “ERROR_EA_ACCESS_DENIED” or as the value 0x3E2
Error #995 means “The I/O operation has been aborted because of either a thread exit or an application request.” This error code may also display as “ERROR_OPERATION_ABORTED” or as the value 0x3E3.

Error #996  means “Overlapped I/O event is not in a signaled state.” This error code may also display as “ERROR_IO_INCOMPLETE” or as the value 0x3E4.


Error #997  means “Overlapped I/O operation is in progress.” This error code may also display as “ERROR_IO_PENDING” or as the value 0x3E5

Error #998  means “Invalid access to memory location.” This error code may also display as “ERROR_NOACCESS” or as the value 0x3E6.

Error #999  System error code 999 means “Error performing inpage operation.” This error code may also display as “ERROR_SWAPERROR” or as the value 0x3E7.

Error #1382 Maximum length exceeded.

Error #1793 Error Message: Account expired.

Error #2250 Network connection does not exist.

The following sections describe error messages that you may receive when you run the Setup procedure and how to resolve some of the behaviors.

  • SU0010 Setup has detected a Boot Manager partition on your computer. If you set up Windows, you will not be able to use Boot Manager. For more information, quit Setup, and read SETUP.TXT on Setup Disk 1 or the Windows CD-ROM.
  • SU0011 Setup has detected a password-protected partition on your hard disk. To set up Windows 95 (or Windows 98), you first need to remove the password protection. For more information, see SETUP.TXT on Setup Disk 1 or the Windows CD-ROM.
  • SU0012 Setup detected an OS/2 or Windows NT file system partition on your hard disk. Files on this partition will not be available when you use Windows 95 (or Windows 98). For more information, see SETUP.TXT on Setup Disk 1 or the Windows CD-ROM.
  • SU0013 Setup could not create files on your startup drive and cannot set up Windows. If you have HPFS or Windows NT file system, you must create an MS-DOS boot partition. If you have LANtastic server or SuperStor compression, disable it before running Setup. See SETUP.TXT on Setup Disk 1 or the Windows CD-ROM.
  • SU0014 Setup has found a hardware device on your computer that is not responding. To try this device again, click Continue.
  • SU0015 Setup detected a Windows NT file system partition on your hard disk. Files on this partition will not be available when you use Windows 95 (or Windows 98).
  • SU0016  Setup has detected OS/2 files on your computer. If you set up Windows 95 (or Windows 98), you may not be able to use OS/2. For more information, quit Setup and read SETUP.TXT on Setup Disk 1 or the Windows CD-ROM.
  • SU0018 Setup could not create files on your startup drive and cannot set up Windows.
    There may be too many files in the root directory of your startup drive, or your startup drive letter may have been remapped by network or compression software. For more information, see SETUP.TXT on Setup Disk 1 or the Windows CD-ROM.
  • SU0019 Setup has found commands in your AUTOEXEC.BAT or CONFIG.SYS files that are not compatible with Windows.
  • SU0129 Setup was unable to determine your computer’s hardware configuration. Setup cannot continue and will now close.
  • SU0130 Please make sure that your User name, Beta ID, and Password are correct.
  • SU0133 Setup was unable to determine your system configuration by using full detection. Would you like to try again using minimal detection?
  • SU0135 Setup was unable to properly identify all your hardware. To confirm your hardware settings, click Change Computer Settings.
  • SU0136 Setup was unable to initialize Windows Help. Help may not be available during Windows Setup.
  • SU0139 The directory you specified contains a version of Windows with a different character set. Setup cannot upgrade this version. Please choose a different directory.
  • SU0141 Setup could not copy files needed for your startup disk. You can still continue with Setup without creating the startup disk. Click OK to continue.
  • SU0142 Setup did not find enough free directory entries in the root of the following drives. Please delete some files or directories to make enough room. Setup needs at least more free entries on drive.
  • SU0147 Setup did not find enough free directory entries in the root of your startup drive. Please delete some files or directories to make enough room, and then run Setup again. Setup needs at least X more free entries on this drive. Where “X” is a replaceable parameter.
  • SU0151 Setup could not verify that your computer has the minimum amount of memory (RAM) required to run Windows 95 (or Windows 98). Do you want to continue with Setup?
  • SU0152 Your computer has X bytes of memory (RAM). Windows 95 (or Windows 98) requires a minimum of X bytes. You must install more memory before setting up Windows 95 (or Windows 98).
  • SU0153 Drive X, the host drive for the compressed X drive, must have at least X bytes free to set up Windows. Free some disk space, and then run Setup again.
  • SU0156 Setup has found Pen Extensions 1.0 installed on your computer. If you proceed with Setup, these will be removed. To continue with Setup, click OK. To quit Setup, click Cancel.
  • SU0159 The directory X you specified contains a Windows NT installation. Setup cannot install Windows in this directory. Please choose a different directory.
  • SU0160 The directory X which is needed to install Windows into already contains a Windows installation. Please choose a different installation directory.
  • SU0161 The directory X which is needed to install Windows into already contains a Windows installation. Setup will choose a directory for you, which you can change later.
  • SU0162 The directory X contains a Windows NT installation. Setup cannot install into this directory. Setup will choose a directory for you, which you can change later.
  • SU0163 The directory X you specified contains an MS-DOS installation. Please choose a different directory.
  • SU0164 Setup cannot upgrade the version of Windows in %1, because you are running Windows from a different directory. Please choose a different directory.
  • SU0165 The specified path contains an invalid character (for example, \344, \374, \366, \350, \343, \346). Please specify a valid path.
  • SU0167 The specified directory contains a directory named ‘desktop’ that you must move or rename before Setup can continue. For more information, see SETUP.TXT on Setup Disk 1 or the Windows CD-ROM.
  • SU0168 Your computer already has an operating system installed, which cannot be upgraded by this version of Setup. Please obtain the Windows 95 (or Windows 98) Upgrade.
  • SU0325 Windows Millennium setup cannot continue.
    This issue can be caused by a corrupted .cab file that has been copied to the hard disk. This corruption can be caused by a virus or by failing hardware, but is most likely to be caused by a scratched, dirty, or damaged CD-ROM.
  • SU0335 Setup could not determine your hardware settings. There may be a missing or damaged Setup file or there may not be enough memory to continue. Free some memory and then run Setup again.
  • SU0343 Setup could not create X. Make sure you specified a valid drive letter and directory name. Also make sure the directory name does not conflict with existing files on your drive.
  • SU0344 The Windows directory X you have specified does not currently exist. Please verify that the path is correct.
  • SU0346 Setup cannot upgrade Windows. The directory X does not contain a valid Windows installation. Please specify another directory.
  • SU0347 Setup cannot upgrade Windows <version number> in <directory name>. You must have version 3.0 of Windows or later in order to upgrade. Specify another directory in the New Directory box.
  • SU0349 A mismatched SETUPX.DLL is loaded. Setup cannot continue. Quit all Windows and MS-DOS-based programs, and then try again. Or quit Windows and then run Setup from MS-DOS.
  • SU0350 Setup was unable to display the Nondisclosure Agreement. Setup will now close.
  • SU0358 Setup detected one or more MS-DOS-based programs running on your computer. Close your MS-DOS programs, and then click OK to continue. Or, click Cancel to quit Setup.
  • SU0360 Setup could not create X. Type a drive letter and directory name to specify where you want to set up Windows 95 (or Windows 98). An example of a valid entry is C:\WINDOWS.
  • SU0361 A Windows registry file was found. If Windows 95 (or Windows 98) is installed in another directory, continuing with Setup will disable it. Do you want to continue?
  • SU0362 It is not recommended that Setup continue without the proper amount of disk space free. If you continue, Setup may run out of disk space and not complete successfully.

For list of windows update error codes Click here

Posted in Windows | Tagged: | Leave a Comment »

How to update Google Chrome

Posted by brainfoldb4u on January 23, 2010

Google Chrome is becoming increasingly popular mostly because of its light weightiness and simple design, its being very simple that some of its cool features went hidden. How do i update Google chrome is one among those question frequently asked by users.  A bit of research reveals how this works in Chrome: the update subsystem is displayed as part of the About Google Chrome window, including an indication that there’s a new version.

Steps to get there is click the settings button on top right hand corner of your browser.

Clicking the “About Google Chrome” button will take you to a windows like below picture looking for updates

If you do got an update, you will notice the windows shows a update as below picture.

Upon installing the updates, window will turn into”Your browser is up to date”

Now your browser is up to date. As per Security predictions for 2010, Google Chrome will be the browser after IE and Firefox that attacker may target. So we may receive updates from Google to help us stay protected.

Posted in Cool Techniques, Google | Tagged: | Leave a Comment »

Google Chrome Forensic

Posted by brainfoldb4u on January 22, 2010

This post is actually posted in SANS computer forensic lab by Kristinn under Browser Forensics, Computer Forensics. This is pretty useful information about Google Chrome so i am linking it in here..

Google Chrome stores the browser history in a SQLite database, not unlike Firefox.  Yet the structure of the database file is quite different.

Chrome stores its files in the following locations:

  • Linux: /home/$USER/.config/google-chrome/
  • Linux: /home/$USER/.config/chromium/
  • Windows Vista (and Win 7): C:Users[USERNAME]AppDataLocalGoogleChrome
  • Windows XP: C:Documents and Settings[USERNAME]Local SettingsApplication DataGoogleChrome

There are two different versions of Google Chrome for Linux, the official packets distributed by Google, which stores its data in the google-chrome directory and the Linux distributions version Chromium.

The database file that contains the browsing history is stored under the Default folder as “History” and can be examined using any SQLlite browser there is (such as sqlite3).  The available tables are:

  • downloads
  • presentation
  • urls
  • keyword_search_terms
  • segment_usage
  • visits
  • meta
  • segments

The most relevant tables for browsing history are the “urls” table that contains all the visited URLs, the “visits” table that contains among other information about the type of visit and the timestamps and finally the “downloads” table that contains a list of downloaded files.

If we examine the urls table for instance by using sqlite3 we can see:

sqlite> .schema urls
CREATE TABLE urls(id INTEGER PRIMARY KEY,url LONGVARCHAR,title LONGVARCHAR,visit_count INTEGER DEFAULT 0 NOT NULL,
typed_count INTEGER DEFAULT 0 NOT NULL,last_visit_time INTEGER NOT NULL,hidden INTEGER DEFAULT 0 NOT NULL,
favicon_id INTEGER DEFAULT 0 NOT NULL);
CREATE INDEX urls_favicon_id_INDEX ON urls (favicon_id);
CREATE INDEX urls_url_index ON urls (url);

And the visits table

sqlite> .schema visits
CREATE TABLE visits(id INTEGER PRIMARY KEY,url INTEGER NOT NULL,visit_time INTEGER NOT NULL,from_visit INTEGER,transition INTEGER DEFAULT 0 NOT NULL,segment_id INTEGER,is_indexed BOOLEAN);
CREATE INDEX visits_from_index ON visits (from_visit);
CREATE INDEX visits_time_index ON visits (visit_time);
CREATE INDEX visits_url_index ON visits (url);

So we can construct a SQL statement to get some information about user browser habit.

SELECT urls.url, urls.title, urls.visit_count, urls.typed_count, urls.last_visit_time, urls.hidden, visits.visit_time, visits.from_visit, visits.transition
FROM urls, visits
WHERE
 urls.id = visits.url

This SQL statement extracts all the URLs the user visited alongside the visit count, type and timestamps.

If we examine the timestamp information from the visits table we can see they are not constructed in an Epoch format.  The timestamp in the visit table is formatted as the number of microseconds since midnight UTC of 1 January 1601, which other have noticed as well, such as firefoxforensics.

If we take a look at the schema of the downloads table (.schema downloads) we see

CREATE TABLE downloads (id INTEGER PRIMARY KEY,full_path LONGVARCHAR NOT NULL,url LONGVARCHAR NOT NULL,
start_time INTEGER NOT NULL,received_bytes INTEGER NOT NULL,total_bytes INTEGER NOT NULL,state

And examine the timestamp there (the start_time) we can see that it is stored in Epoch format.

There is one more interesting thing to mention in the “visits” table.  It is the row “transition”.  This value describes how the URL was loaded in the browser.  For full documentation see the source code of page_transition_types or in a shorter version the core parameters are the following:

  • LINK. User go to the page by clicking a link.
  • TYPED. User typed the URL in the URL bar.
  • AUTO_BOOKMARK. User got to this page through a suggestion in the UI, for example,through the destinations page
  • AUTO_SUBFRAME. Any content that is automatically loaded in a non-toplevel frame. User might not realize this is a separate frame so he might not know he browsed there.
  • MANUAL_SUBFRAME. For subframe navigations that are explicitly requested by the user and generate new navigation entries in the back/forward list.
  • GENERATED. User got to this page by typing in the URL bar and selecting an entry that did not look like a URL.
  • START_PAGE. The user’s start page or home page or URL passed along the command line (Chrome started with this URL from the command line)
  • FORM_SUBMIT. The user filled out values in a form and submitted it.
  • RELOAD.  The user reloaded the page, whether by hitting reload, enter in the URL bar or by restoring a session.
  • KEYWORD. The url was generated from a replaceable keyword other than the default search provider
  • KEYWORD_GENERATED. Corresponds to a visit generated for a keyword.

The transition variable contains more information than just the core parameters.  It also stores so called qualifiers such as whether or not this was a client or server redirect and if this a beginning or an end of a navigation chain.

When reading the transition from the database and extracting just the core parameter the variable CORE_MASK has to be used to AND with the value found inside the database.

CORE_MASK = 0xFF,

I’ve created an input module to log2timeline to make things a little bit easier by automating this.  At this time the input module is only available in the nightly builds, but it will be released in version 0.41 of the framework.

An example usage of the script is the following:

log2timeline -f chrome -z local History
0|[Chrome] User: kristinng URL visited: http://tools.google.com/chrome/intl/en/welcome.html (Get started with Google Chrome) [count: 1] Host: tools.google.com type: [START_PAGE - The start page of the browser] (URL not typed directly)|0|0|0|0|0|1261044829|1261044829|1261044829|1261044829

0|[Chrome] User: kristinng URL visited: http://isc.sans.org/ (SANS Internet Storm Center; Cooperative Network Security Community - Internet Security) [count: 1] Host: isc.sans.org type: [TYPED - User typed the URL in the URL bar] (directly typed)|0|0|0|0|0|1261044989|1261044989|1261044989|1261044989..
The script reads the user name from the directory path the history file was found and then reads the database structure from the History file and prints out the information in a human readable form (this output is in mactime format).  To convert the information found here in CSV using mactime

log2timeline -f chrome -z local History > bodyfile
mactime -b bodyfile -d > body.csv

And the same lines in the CSV file are then:
Thu Dec 17 2009 10:13:49,0,macb,0,0,0,0,[Chrome] User: kristinng URL visited: http://tools.google.com/chrome/intl/en/welcome.html (Get started with Google Chrome) [count: 1] Host: tools.google.com type: [START_PAGE - The start page of the browser] (URL not typed directly)
Thu Dec 17 2009 10:16:29,0,macb,0,0,0,0,[Chrome] User: kristinng URL visited: http://isc.sans.org/ (SANS Internet Storm Center; Cooperative Network Security Community - Internet Security) [count: 1] Host: isc.sans.org type: [TYPED - User typed the URL in the URL bar] (directly typed)
Original information is published in this link

Posted in Auditing, Browser Security, Hacking | Tagged: , | Leave a Comment »

Online power point presentation tool: Preezo

Posted by brainfoldb4u on January 22, 2010

Where you ever in a situation,you had no Microsoft power point installed and you are restricted to download any additional softwares or plugins but you still wanted to prepare some power point slides? Here is an easy solution called “Preezo” all you needed is an active internet connection and a reasonably popular web browser.

Web app Preezo is a stripped-down version of PowerPoint right inside your web browser. Create, edit, collaborate on and permalink slideshows at Preezo, which isn’t as featureful as PowerPoint proper but has all the essential tools you need to create a full-on presentation minus desktop software. Preezo is ajax based online presentation creator replaces Microsoft power point application and share it over the web without any software or plug-in to install. If you like to spice up your slide shows with a little movement then check out their Slide Transitions feature. Not only can you make your slides wipe, push and fade, but you can also set your slides to advance automatically after a specified amount of time. They have a diagramming features as well that can help you to create rectangles, ellipses, triangles, lines and more.



They have a large collection of transition effects. For example, Box In, Box Out, Cover Down, Cover Left, Cover Right, Cover Up, Cover Left-Down, Cover Left-Up, Cover Right-Down, Cover Right-Up, Cut, Cut Through Black, Fade Smoothly, Fade Through Black, Push Down, Push Left, Push Right, Push Up, Push Left-Down, Push Left-Up, Push Right-Down, Push Right-Up, Random, Split Horizontal In, Split Horizontal Out, Split Vertical In, Split Vertical Out, Uncover Down, Uncover Left, Uncover Right, Uncover Up, Uncover Left-Down, Uncover Left-Up, Uncover Right-Down, Uncover Right-Up, Wipe Down, Wipe Left, Wipe Right, Wipe Up, Wipe Left-Down, Wipe Left-Up, Wipe Right-Down, Wipe Right-Up.

Key Features

– You can create professional quality presentations using an ultra-fast Ajax user interface.

– Access your presentations from any computer with an Internet connection and a modern browser. And there’s no need for dedicated hosting to use Preezo.

– Reuse images or the content of entire slides from easy to use galleries.

– Save time and reduce headache by collaborating on a centralized web document.

– Distribute presentations to clients and colleages without having to email huge PowerPoint files.

Posted in Free but useful tools, Information Security, Open Source | Tagged: , | Leave a Comment »

Email Encryption: Lockbin

Posted by brainfoldb4u on January 21, 2010

IF you want to send an email with critical contents and needed to safeguard it from prying eyes, Lockbin would help you by using a closed system that will take any message and send it to someone in a highly secure manner. Sender needs to share a secret password to recipient while the recipient needs to remember the password to read the message.  You dont have to install any additional software, everything is done online, you just needed to be online to read the message. In the case of Gmail, and a handful of other popular Web-mail providers, your e-mail could be in a dozen different servers (albeit encrypted), or even be analyzed to try to sell you contextual ads.

In a few words, Lockbin is a free service for sending private email messages. People use it to send things like credit card information or confidential information. Secure Socket Layer is used as a secure way of sending emails from Network sniffers but there is no guarantee the recipient is taking the same precaution.

Developers claims about its safety as:

Nothing is perfect, and neither is this, but it is certainly safer than sending sensitive data directly through email. The largest threats to this method would be

1) capturing the sender or recipient’s password by spoofing the Lockbin website, or

2) a screen capture virus that images the decrypted message on the recipient’s computer.

Neither attacks are likely, but are possible in theory.

How it works:

Lockbin’s cryptographic algorithm uses a Secret Word to encrypt messages. You invent the Secret Word and deliver it to the recipient using a phone, text message, instant message, smoke signals, homing pigeon, or as a last resort… another email.

When the encrypted message is received, it is destroyed from Lockbin’s database, and decrypted in the recipient’s browser, provided that they entered the Secret Word correctly. Uncollected messages are destroyed after six months.

Posted in Cool Techniques, Free but useful tools, Open Source | Tagged: | Leave a Comment »

Draw Anywhere

Posted by brainfoldb4u on January 21, 2010

DrawAnywhere is an online diagramming website, where you can draw, change and share flowcharts and other diagrams, with the look & feel of a desktop application. It runs on any browser with Flash 9 installed. There is no need to download and install any custom software. It runs entirely on the web, and thus it is an always-on-access-anywhere solution. It meets all your diagramming needs without installing, maintaining and purchasing expensive software. Draw Anywhere offers the business user an online, always on, and everywhere accessible project and plan organization, scheduling, and presentation tool. Store and Organize your research and information, accessible anywhere with an Internet connection. Share your diagrams with others or by embed into an existing webpage or blog. You can create diagrams for you needs. Draw any flowchart or process diagrams or just a webpage layout. With the look and feel of any desktop application you will find it easy to use, yet versatile.

Create a free account and share diagrams with others. It runs in your web browser, and there is no need to download any more software to use it.

DrawAnywhere’s Main features

  • Draw Flowcharts, Process diagrams, Organizational charts etc.
  • Login from anywhere and modify your drawing.
  • Share your diagram with others.
  • Export your diagram as image file (jpg, png etc) or a pdf file.
  • No software to download and install.
  • You just need a web browser with Flash player.

Draw any where different accounts

I find this useful for drawing web diagrams on the go.. If you got any tools that serves the same purpose with more capabilities please do let me know..

Posted in Cool Techniques, Free but useful tools, Open Source | Tagged: | Leave a Comment »

Twitter Apps

Posted by brainfoldb4u on January 21, 2010

Twitter..a.k.a SMS of the Internet, since its start in 2006 has gained its popularity and used by millions of people world-wide.  According to a statistics there were 18 million unique twitter users (until end of 2009) and lists is growing significantly. It is simple, yet powerful way to communicate with your followers. Being a free Social networking and micro-blogging service tweeter enables users to send and receive text-based posts of up to 40 characters which will be displayed on author’s  profile page and also displays the message to authors followers page. Other than just tweeting an update, we could use twitter effectively. It has lot of third-party applications (126 windows alone) categorized under 26 categories and the list is growing much. The list includes many creative and cool applications that can be very useful and productive in our working environment and here are my list of best top 10 tweeter applications.

Twitterfeed

Twitter Feed is a simple module that displays a configurable number of updates (Tweets) based on the Twitter Search API.  The result is a powerful part that enables you to have a great deal of control over which updates are posted to your website.  Want to filter out certain hash tags?  No problem.  Want to only display items with links?  It’s an option.  Want to apply a custom CSS styling to the rendered links? Tweet updates are rendered is CSS-friendly DIV tags and can be easily styled to fit the look and feel of your website. Getting started is very simple, sign up and add the services that you need RSS consolidated and thats it..

Readtwit

Readtwit filters your twitter feed to links only, resolves link destinations and publishes the content as an RSS feed. You can then use any feed reading software / service to read twitter posted content along with the rest of your feeds. Duplicate links in the same time-frame are grouped together. No more retweets overwhelming your link browsing activity.

readtwit

readtwit

Twhirl

It is a better desktop application to keep updated with your twitter. It has various functions than enable you to use twitter effectively. Wonder why Twitteroo is the official software for Windows Twittering. Some of twhirl’s features:

  • runs on both Windows (2000/XP/Vista/Win7) and Mac OSX
  • connects to multiple Twitterlaconi.caFriendfeed and Seesmic Video accounts
  • displays notifications for new messages
  • shorten long URLs (using digg.combit.lysnurltwurl or is.gd)
  • cross-post your updates to Jaiku and many other sites likeFacebookMySpaceLinkedIn and more via Ping.fm
  • post images to yfrog
  • search tweets using Twitter Search and TweetScan, and follow topics in near-real time with saved searches
  • automatically find tweets mentioning your @username
  • record a video on Seesmic Video, and share it on Twitter immediately
  • get your Seesmic Video updates in real-time using XMPP
  • English spell checking

GroupTweet

GroupTweet turns a standard Twitter account into a group communication hub where members can post updates to everyone in the group using direct messages. When the group account receives a direct message from a group member, GroupTweet converts it into a tweet that all followers can see.

Group Tweet

Qwitter:

If you want to know that when and why someone stops following you on twitter then Qwitter is a best tool for you. Qwitter e-mails you when someone stops following you on Twitter.

qwitter

Future Tweets

FutureTweets.com is a free service that lets you schedule your Twitter messages. Send it at a specific time in the future or send a reoccurring Tweet daily, weekly, monthly or yearly! You’ll never forget the birthdays of your beloved Twitter friends again! Just schedule a nice Tweet on their birthday!

Tweet Alarm

Tweet Alarm is a simple system.  Once  you sign up, you can create your alerts.  Note that I have set alerts for Social Media and Social Networking.  At the bottom of the page you can decide on the frequency that you want to see the emails Daily, Weekly, Twice per day and as often as you find tweets.

Click to Tweet

Click to tweet is the unique app till now that converts your whole text in single URL. You only have to share the URL to your friend. After clicking on the URL, It can spend the text in the Twitter box that converted by ClicktoTweet. You don’t need to copy all the text to each of your friends for tweet. Simply convert into the single URL and share with your friends. Once sharing your link, whoever clicks on the link will have the message automatically added to their Twitter status box, then they simply click to tweet!

Monitter

Monitter is web app that let you check words/hashtags on Twitter in real-time. What’s special about Monitter is the simple interface which is divided into columns and you can increase or decrease the number of columns as the number of words you are monitoring.

If you want to know more about twitter, its applications and third-party application. Click here
To look at the different categories of twitter. click here
Twitter fan wiki. click here
Top 100 twitter users as per twitterholic.. click here

Posted in Cool Techniques, Free but useful tools, Open Source | Tagged: | Leave a Comment »

Free ways to resize your image

Posted by brainfoldb4u on January 20, 2010

Free ways to cut and resize your image:

When we shop for digital cams, we mostly go for the one with high mega pixels to get good high quality images but when it comes to sharing not many web sites lets us to share the image with same size as original.  For non technical users who have almost no graphics knowledge the question like  How do i resize my image? How do i make image smaller? and how do i crop this pics for an avatar? needed some ways to be shown. Below are few free tools that i found online can be of worth notice.

Resize Image online:

Resize your is a simple image resizing tool available online. Follow the simple three steps to cut and resize your image without downloading any files.

  • Upload your image
  • Use the button and arrow to set size
  • Resize and donload your image

Shrink Pictures

Shrink Pictures tools that are no more difficult than posting in a Forum and now anyone can Resize Images and Digital Pictures. This link also has an dedicated section for resizing an Avatar which is very commonly used in social networking sites and online forums.

To resize your images it is as simple as 1, 2, 3, 4, 5!

  1. Browse your computer and select your image/photo to resize
  2. Select the new size for your picture – use a preset or choose a custom size
  3. Optionally, add an effect to your image
  4. Select output image/picture quality Lower quality means a smaller file
  5. Click “Resize” and wait for the processed images to be displayed

Resize2mail

Resize 2 mail is another online resize website utility developed for digital camera owners, webmasters, people travelling or anybody who quickly wants to resize a digital image for email or publishing on a web site. It needs the same three steps as above..

Pixnate

Pixenate makes photo-centric websites more useful by embedding simple photo-editing directly in your website. Pixenate increases repeat visits to your website and makes photo-centric websites stickier. Your users may already use your website for uploading, storing, sharing or printing photos. Adding Pixenate to your website allows your users to edit those photos too. Whether it’s social networking, photo merchandising or online classifieds, people want to show their photos in the best possible light. Pixenate helps non-experts get the most out of their photos by providing powerful but simple-to-use photo-editing tools. Pixenate is particularly well suited for photo-merchandising websites and offers powerful tools for cropping and overlaying photos on to product templates such as cards, calendars and mugs.

pixneteQuick Thumbnail

The fastest way to resize your pictures and images. Choose an image file, select some resize options, and hit Resize it. Your image will be uploaded to the server, resized and then your resized image(s) will be provided in a single convenient view. The power comes from the simultaneous generation of different sizes and the ability to enlarge your images too. With your final picture be sure to check out Whats Its Color, a fun little online application

rsizr

rsizr is a Flash application that lets you resize JPG, PNG, and GIF images on your computer. With rsizr, in addition to normal image rescaling and cropping, you can also resize images using a new image resizing algorithm called seam carving (a method of image retargeting) that tries to keep intact areas in your image that are richer in detail.

rsizrCutMyPic

Another useful online app for resizing your image from Japan.

cutmypicHope you enjoyed this collection. There are many other online editing tools available but i find these tools easy and quick. They are not listed in any particular order. IF you got any other online tool that serves the purpose, feel free to share it with me..

Posted in Free but useful tools, Open Source | Tagged: | Leave a Comment »

Cool ad Wilkinson Quadro

Posted by brainfoldb4u on January 19, 2010

Check out this cool innovative add from Wilkinson Quadro.

Its really awesome way for men to compete with babies>>>>>

Posted in Cool Techniques | Tagged: | Leave a Comment »