Saturday, 13 July 2013

VB.Net To C# Converter

Are you ready to convert your VB code to C#? All versions of Visual Basic.Net are supported: 2003, 2005, 2008, 2010, 2012 as well as all project types (Win Forms, Web, Class Library, Compact Framework, Silverlight, etc.).
There is support for the latest VB.Net language features, including VB2012 await/async support, VB2010 enhancements like Implicit Line Continuation and Multiline Lambdas, and VB2008 features such as LINQ and inline XML.
Version 3.04 features multiple conversion accuracy improvements and an improved installation experience, especially on Windows 8.



Key Features
Support for the latest Visual Studio features - The latest VB.Net / C# features are supported, including Await/Async, Implicit Line Continuation, Multiline Lambdas, Nullable Optional Parameters, LINQ, XML, WPF, Lambda expressions, and extension methods.
Support for All Project Types - Win Forms, Web, Class Library, Compact Framework, Console, etc.
High Accuracy - This release was stress tested on thousands of sample programs. Tested were hundreds of Microsoft sample projects (Visual Studio SDK samples, DirectX SDK projects, Windows 7 SDK samples, etc.), in house and customer projects, third party control samples (Infragistics, ComponentOne, Telerik, etc.), and open source projects from SourceForge and CodePlex.
Ease of Use - While the conversion logic itself is complex, using the converter isn't. You are guided through each step of the process with easy, clear instructions.
Customization - Not every project is the same. With dozens of conversion options to choose from, you are in control of the conversion process.
Convert Single Projects or Groups of Projects - You can create lists of programs and convert them with one click. There's also a command line version included.
Comprehensive Reporting - There are reports showing potential trouble spots in your code, interesting things which happened during the conversion process, and any C# compiler errors which need to be fixed.

Accuracy improvements:
Fixed issue of program crashing when variable is named "from" in Visual Studio 2008 or above.
Corrected problem of converting a generic definition defined "As Structure".
Fixed issue of not opening projects with compiler errors when the locale has a decimal separator which isn't a period.
Now correctly converts operator definitions named "IsTrue" and "IsFalse".
Fixed error converting Widening Operators.
Corrected issue of converting operators which return generic types.
Fixed problem of converting parenthesis around a variable which is indexed, like (varName)(0).
CS1729 compiler errors are now automatically corrected.
Temporary variables are now created correctly for ref arguments for a type declared from a generic type.
Fixed problem of displaying a XML error message when viewing some project conversions.
Improved visual experience on Windows XP.
Improved installation experience:
The installation program is now code signed, for greater security and an improved installation experience.
Improved installation on Windows 8. Doesn't ask to download multiple versions of the .net framework upon install.
Improved installation on Windows XP 64 bit. Will download correct version of .Net Framework 2.0 if missing.
A program restart is now not required to detect that a new .Net framework version has been installed.
Displays .Net Framework 4.5 download link if missing and is required for a conversion.
Fixed issue of the .Net Framework 4.5 being incorrectly displayed in about box.

Download :- https://hotfile.com/dl/233860260/081dc9b/VB.Net.to.C.Converter.3.04.rar.html

Friday, 12 July 2013

Password Cracking Methods

For Educational Purpose Only

1. Dictionary attack :

"This uses a simple file containing words that can, surprise surprise, be found in a dictionary. In other words, if you will excuse the pun, this attack uses exactly the kind of words that many people use as their password..."

2. Brute force attack :

"This method is similar to the dictionary attack but with the added bonus, for the hacker, of being able to detect non-dictionary words by working through all possible alpha-numeric combinations from aaa1 to zzz10..."

3. Rainbow table attack :

"A rainbow table is a list of pre-computed hashes - the numerical value of an encrypted password, used by most systems today - and that’s the hashes of all possible password combinations for any given hashing algorithm mind. The time it takes to crack a password using a rainbow table is reduced to the time it takes to look it up in the list..."

4. Phishing :

"There's an easy way to hack: ask the user for his or her password. A phishing email leads the unsuspecting reader to a faked online banking, payment or other site in order to login and put right some terrible problem with their security..."

5. Social engineering :

"A favourite of the social engineer is to telephone an office posing as an IT security tech guy and simply ask for the network access password. You’d be amazed how often this works..."

6. Malware :

"A key logger or screen scraper can be installed by malware which records everything you type or takes screen shots during a login process, and then forwards a copy of this file to hacker central..."

7. Offline cracking :

"Often the target in question has been compromised via an hack on a third party, which then provides access to the system servers and those all-important user password hash files. The password cracker can then take as long as they need to try and crack the code without alerting the target system or individual user..."

8. Shoulder surfing :

"The service personnel ‘uniform’ provides a kind of free pass to wander around unhindered, and make note of passwords being entered by genuine members of staff. It also provides an excellent opportunity to eyeball all those post-it notes stuck to the front of LCD screens with logins scribbled upon them..."

9. Spidering :

"Savvy hackers have realised that many corporate passwords are made up of words that are connected to the business itself. Studying corporate literature, website sales material and even the websites of competitors and listed customers can provide the ammunition to build a custom word list to use in a brute force attack..."

10. Guess :

"The password crackers best friend, of course, is the predictability of the user. Unless a truly random password has been created using software dedicated to the task, a user generated ‘random’ password is unlikely to be anything of the sort..."