Archive for November, 2010

Terminology in Hacking

November 14, 2010 Leave a comment

Here’s the few terminology used/ called in hacking sphere.

Hacking run
essentially, a hacking run is a hacking session that lasts longer than normal working times, i.e. a hacking run that lasts for in excess of eight to ten hours.

White Hat
considered one of nice guys, a white hat hacker is one who hacks and the informs the owner of the hacking

Black Hat
in contrast, the black hat hacker is considered a criminal and uses his/her skills to break the law

Gray Hat
as one would imagine, a gray hat hacker sometimes is good, and sometimes is criminal; a combination of the white and black hat

Script Kiddie
a demeaning term, used for those who hack but do so by following directions and not creating anything of their own

Trojan horse
deceptive programs that pretend they do one thing, only to enter the computer system and do another; however, they need not be bad for the computer

a self-replicating program that inserts itself into executable codes or documents

also a self-replicating program, but a worm breeds itself in computer systems.


Categories: Hacker

Robotics – Takes control of future

November 14, 2010 Leave a comment

Yes, Its indeed… As humans are becoming very Costly/ Lazy/ Paranoid/ Phobia/ … What so ever.

Microsoft have also took its stand on this sector.

They have come up with MSRDS (Microsoft Robotics Development Studio)


Ever since I have presented a paper on Neural networks and Fuzzy logic in my graduation, I had liking towards this Robotics.

I have started learning this Robotics studio development and the Visual Programming language 2008 R3. This is real exiting.

Here’s the few samples

1. Don’t expect coffee on Sunday’s

Usually I don’t get coffee on holidays in my home, yes, Its an holiday for my mom too. In the usual Sunday morning I woke up my mom and was asking for a cup of coffee. She didn’t respond. Then bored of asking her, I made up a VPL program and asked my robot to ask for a coffee instead of me. Here’s the code.

Then also she didn’t respond, I have increased the looping count to 100 and the rest of the things you can imagine what could have happened.

Order Coffee


2. Move your, Lego NXT Tribot (left, right, fwd, bwd)

Now serious one, I have a huge set of simulation environment set up with my computer along with the package. Yes, of course this simulation environments runs based on Physics engine. And also your computer must be smart(Fast) enough to run those simulation environments.

Lego robot is a simple educational robo from Mindstorms. You can program it through MSRDS. For test purpose, here’s the code which can be driven from your computer in the simulation environments provided.

This code below, will move the robo left, right, forward and backwards.

Lego Robo

If you have the robo, and the respective joystick, here’s the same code which runs with joystick.


You can see the simulation environment snapshot here…

Lego Simulation


Will be posting more cool robotics stuff, hang on and subscribe to the RSS feed.


Categories: Robotics

HTTP errors in IIS 7.0

November 4, 2010 Leave a comment

Have you installed fresh IIS 7.0 into the server??

Yes, probably you could face this error at first time…


HTTP Error 404.17 – Not Found

The requested content appears to be script and will not be served by the static file handler.




This is because installation was not registered correctly. Try the following steps to register it.

run %windir%\Microsoft.NET\Framework\v4.0.21006\aspnet_regiis.exe –i

And the next possible error very often at first time is


HTTP Error 404.17 – Not Found

The requested content appears to be script and will not be served by the static file handler.



This is because you have not enabled the permission for ISAPI and CGI restrictions

Just do the following steps and this will help

# Install the feature that handles this request. For example, if you get this error for an .ASPX page, you may have to install ASP.NET via IIS setup.
# Verify that the Web service extension requested is enabled on the server.

   1. Open the IIS Manager and navigate to the server level.
   2. In the Features view, double-click ISAPI and CGI Restrictions to verify that the Web service extension is set to Allowed.
   3. If the extension is not in the list, click Add in the Actions pane.
   4. In the Add ISAPI and CGI Restrictions dialog box, type the path of the .dll or .exe file in the ISAPI or CGI Path box, or click Browse to navigate to the location of the file.
   5. In the Description box, type a brief description of the restriction.
   6. (Optional) Check "Allow extension path to execute" to allow the restriction to run automatically. If you do not check this option, the restriction status is Not Allowed, which is the default. You can allow the restriction later by selecting it and clicking Allow on the Actions pane.
   7. Click OK.


Explore IIS with freedom..


Categories: SQL and .NET Blog

What happens in IIS?

November 4, 2010 Leave a comment


Wanna know in depth on how request and response are processed: go to this link..


IIS (Internet Information Server) is one of the most powerful web servers from Microsoft that is used to host your ASP.NET Web application. IIS has it’s own ASP.NET Process Engine  to handle the ASP.NET request. So, when a request comes from client to server, IIS takes that request and  process it and send response back to clients.


When client request for some information from a web server, request first reaches to HTTP.SYS of IIS. HTTP.SYS then send the request to respective  Application Pool. Application Pool then forward the request to worker process to load the ISAPI Extension which will create an HTTPRuntime Object to Process the request via HTTPModule and HTTPHanlder. After that the ASP.NET Page LifeCycle events starts.


Worker process(w3wp.exe) runs the web application in the web server.

Application pool is the container of the worker process.




HTTP.SYS is Responsible for pass the request to particular Application pool. Whenever we creates a new Application Pool, the ID of the Application Pool is being generated and it’s registered with the HTTP.SYS. So whenever HTTP.SYS Received the request from any web application, it checks for the Application Pool and based on the application pool it send the request.

Now the control request from the remote user moves from http.sys to the application pool and then to the worker process as discussed.



This is just the basic understanding and the birds eye view of the request processing in IIS.


Categories: SQL and .NET Blog