Smartphone Security

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg
Showing posts with label Address. Show all posts
Showing posts with label Address. Show all posts

Friday, 15 March 2013

-: Address Resolution Protocol (ARP) Attacks :-

Posted on 03:01 by Unknown

-: Address Resolution Protocol (ARP) Attacks :-
A successful ARP spoofing attack allows an attacker to perform a man-in-the-middle attack
What Does ARP Mean?
Address Resolution Protocol (ARP) is a stateless protocol, was designed to map Internet Protocol addresses (IP) to their associated Media Access Control (MAC) addresses. This being said, by mapping a 32 bit IP address to an associated 48 bit MAC address via attached Ethernet devices, a communication between local nodes can be made.

On a majority of operating systems, such as Linux, FreeBSD, and other UNIX based operating systems, and even including Windows, the "arp" program is present. This program can be used to display and/or modify ARP cache entries.

An example of the "arp" utility's output would look like the following:

Windows:
> arp -a
Interface: 192.168.1.100 .- 0x10003
Internet Address        Physical Address        Type
192.168.1.1          00-13-10-23-9a-53       dynamic

Linux:
$ arp -na
? (192.168.1.1) at 00:90:B1:DC:F8:C0 [ether] on eth0

FreeBSD:
$ arp -na
? (192.168.1.1) at 00:00:0c:3e:4d:49 on bge0


How ARP works?
Specifically for Internet Protocol Version 4 (IPv4), ARP maps IP addresses between the Network layer and Data Link layer of the Open System Interconnection (OSI) model.
For a more complete and thorough explanation of how address resolution works, and protocol specifics, please consult RFC 826.


ARP Protocol Flaws :-
ARP's main flaw is in its cache. Knowing that it is possible for ARP to update existing entries as well as add to the cache, this leads one to believe that forged replies can be made, which result in ARP cache poisoning attacks.


Terms & Definitions :-
ARP Cache Poisoning : Broadcasting forged ARP replies on a local network. In a sense, "fooling" nodes on the network. This can be done because ARP lacks authentication features, thus blindly accepting any request and reply that is received or sent.

MAC Address Flooding : An ARP cache poisoning attack that is mainly used in switched environments. By flooding a switch with fake MAC addresses, a switch is overloaded. Because of this, it broadcasts all network traffic to every connected node. This outcome is referred to as "broadcast mode" because, all traffic passing through the switch is broadcasted out like a Hub would do. This then can result in sniffing all network traffic.


The ARP Attacks :-
1] Connection Hijacking & Interception : Packet or connection hijacking and interception is the act in which any connected client can be victimized into getting their connection manipulated in a way that it is possible to take complete control over.

2] Connection Resetting : The name explains itself very well. When we are resetting a client's connection, we are cutting their connection to the system. This can be easily done using specially crafted code to do so. Luckily, we have wonderful software that was made to aid us in doing so.

3] Man In The Middle : One of the more prominent ways of attacking another user in order to hijack their traffic, is by means of a Man In The Middle (MITM) attack. Unlike the other attacks, a MITM is more a packet manipulation attack which in the end however does result in packet redirection to the attacker . all traffic will get sent to the attacker doing the MITM attack. This attack however is specific. As opposed to MAC Address Flooding or other attacks against a router/switch, the MITM attack is against a victim, and also can be done outside of a switched environment. Thus meaning, an attack can be executed against a person on the other side of the country.

4] Packet Sniffing : Sniffing on a Local Area Network (LAN) is quite easy if the network is segmented via a hub, rather than a switch. It is of course possible to sniff on a switched environment by performing a MAC flood attack. As a result of the MAC flood, the switch will act as a hub, and allow the entire network to be sniffed. This gives you a chance to use any sort of sniffing software available to you to use against the network, and gather packets.

5] Denial of Service : MAC Address Flooding can be considered a Denial of service attack. The main idea of the MAC flood, is to generate enough packet data to send toward a switch, attempting to make it panic. This will cause the switch to drop into broadcast mode and broadcast all packet data. This however did not result in a crash, or the service to be dropped, but to be overloaded.

Read More
Posted in Address, ARP, Attacks, Protocol, Resolution | No comments

Thursday, 17 January 2013

Address Resolution Protocol (ARP) Attacks

Posted on 07:57 by Unknown


-: Address Resolution Protocol (ARP) Attacks :-

What Does ARP Mean?
Address Resolution Protocol (ARP) is a stateless protocol, was designed to map Internet Protocol addresses (IP) to their associated Media Access Control (MAC) addresses. This being said, by mapping a 32 bit IP address to an associated 48 bit MAC address via attached Ethernet devices, a communication between local nodes can be made.

On a majority of operating systems, such as Linux, FreeBSD, and other UNIX based operating systems, and even including Windows, the "arp" program is present. This program can be used to display and/or modify ARP cache entries.

An example of the "arp" utility's output would look like the following:

Windows:
> arp -a
Interface: 192.168.1.100 .- 0x10003
Internet Address        Physical Address        Type
192.168.1.1          00-13-10-23-9a-53       dynamic

Linux:
$ arp -na
? (192.168.1.1) at 00:90:B1:DC:F8:C0 [ether] on eth0

FreeBSD:
$ arp -na
? (192.168.1.1) at 00:00:0c:3e:4d:49 on bge0


How ARP works?
Specifically for Internet Protocol Version 4 (IPv4), ARP maps IP addresses between the Network layer and Data Link layer of the Open System Interconnection (OSI) model.
For a more complete and thorough explanation of how address resolution works, and protocol specifics, please consult RFC 826.


ARP Protocol Flaws :-
ARP's main flaw is in its cache. Knowing that it is possible for ARP to update existing entries as well as add to the cache, this leads one to believe that forged replies can be made, which result in ARP cache poisoning attacks.


Terms & Definitions :-
ARP Cache Poisoning : Broadcasting forged ARP replies on a local network. In a sense, "fooling" nodes on the network. This can be done because ARP lacks authentication features, thus blindly accepting any request and reply that is received or sent.

MAC Address Flooding : An ARP cache poisoning attack that is mainly used in switched environments. By flooding a switch with fake MAC addresses, a switch is overloaded. Because of this, it broadcasts all network traffic to every connected node. This outcome is referred to as "broadcast mode" because, all traffic passing through the switch is broadcasted out like a Hub would do. This then can result in sniffing all network traffic.


The ARP Attacks :-
1] Connection Hijacking & Interception : Packet or connection hijacking and interception is the act in which any connected client can be victimized into getting their connection manipulated in a way that it is possible to take complete control over.

2] Connection Resetting : The name explains itself very well. When we are resetting a client's connection, we are cutting their connection to the system. This can be easily done using specially crafted code to do so. Luckily, we have wonderful software that was made to aid us in doing so.

3] Man In The Middle : One of the more prominent ways of attacking another user in order to hijack their traffic, is by means of a Man In The Middle (MITM) attack. Unlike the other attacks, a MITM is more a packet manipulation attack which in the end however does result in packet redirection to the attacker . all traffic will get sent to the attacker doing the MITM attack. This attack however is specific. As opposed to MAC Address Flooding or other attacks against a router/switch, the MITM attack is against a victim, and also can be done outside of a switched environment. Thus meaning, an attack can be executed against a person on the other side of the country.

4] Packet Sniffing : Sniffing on a Local Area Network (LAN) is quite easy if the network is segmented via a hub, rather than a switch. It is of course possible to sniff on a switched environment by performing a MAC flood attack. As a result of the MAC flood, the switch will act as a hub, and allow the entire network to be sniffed. This gives you a chance to use any sort of sniffing software available to you to use against the network, and gather packets.

5] Denial of Service : MAC Address Flooding can be considered a Denial of service attack. The main idea of the MAC flood, is to generate enough packet data to send toward a switch, attempting to make it panic. This will cause the switch to drop into broadcast mode and broadcast all packet data. This however did not result in a crash, or the service to be dropped, but to be overloaded.
Read More
Posted in Address, ARP, Attacks, Protocol, Resolution | No comments
Older Posts Home
Subscribe to: Posts (Atom)

Popular Posts

  • N.T. Rama Rao
    N.T. Rama Rao Nandamuri Taraka Rama Rao, also known as NTR, was born in 1923 in a well-to-do family in Andhra Pradesh. He showed interest in...
  • Breaking the Wishbone for Luck
    Breaking the Wishbone for Luck The tradition of pulling apart the wishbone, or clavicle, may be as much as 2,500 years old. Ancient Etruscan...
  • Celebrities before and after Photoshop
    Celebrities before and after  Photoshop Here is an interesting look at celebrities photos before and after photoshop. These can give you a f...
  • Soldering Tips
    Soldering Tips Soldering is accomplished by quickly heating the metal parts to be joined, and then applying a flux and a solder to the matin...
  • 20 Ugliest Celebrities
    20 Ugliest Celebrities By nature or personal choice, they are rich and famous and yet... ugly as hell!Ugliness is confined to external appea...
  • Interesting Facts About Typewriters
    Interesting Facts About Typewriters One of the first typewriters to allow typists to see work in progress was invented in 1855 by Giuseppe R...
  • 100 YEARSOF INDIAN CINEMA
    100 YEARS OF INDIAN CINEMA About a century ago, in 1912, Dadasaheb Phalke completed the first Indian feature film, Raja Harischandra and rel...
  • The Mysterious Nazca Lines
    The Mysterious Nazca Lines 1. The Nazca were an ancient people that lived in Peru, in South America, about 2,000 years ago. The people are w...
  • Ten Tips to Smartphone Security
    Ten Tips to Smartphone Security Smartphones continue to grow in popularity and are now as powerful and functional as many computers. It is i...
  • The Longest Mustache In The World
    The Longest Mustache In The World Ram Singh Chauhan of India is the proud owner of the world's longest moustache,officially recorded by ...

Categories

  • 10
  • 100
  • 101
  • 111
  • 12
  • 132
  • 148
  • 15
  • 16
  • 17
  • 17.RULES.TO.LIVE.BY.
  • 18
  • 19
  • 20
  • 2013
  • 21
  • 22
  • 25
  • 26
  • 3
  • 30
  • 35
  • 4
  • 47
  • 5
  • 50
  • 51
  • 56
  • 64th
  • 67
  • 67th
  • 7
  • 8
  • 9
  • a
  • ABORTION
  • about
  • achilles
  • Acidity
  • Acne
  • Actor
  • Actress
  • ADDICTION
  • Address
  • ADHD
  • Admin
  • Adopts
  • Ads
  • After
  • AGING
  • Aid
  • AK
  • ALCOHOL
  • alcoholism
  • alert
  • All
  • All About Albert Einstein
  • Allen
  • Almonds
  • Amazing
  • AMAZING FACTS ABOUT TATTOOS
  • Amazingly
  • American
  • Anatomy
  • and
  • Android
  • anger
  • Animal
  • animals
  • Annual
  • Anonymity
  • ANOTHER
  • Ant
  • ANTI
  • Antivirus
  • antivrus
  • Anxiety
  • any
  • Appetizing
  • Apple
  • Apple’s
  • applications
  • April
  • Archicebus
  • Armadillos
  • Around
  • ARP
  • arrow
  • Art
  • Articles
  • Artist
  • Arugula
  • Aspirin
  • Assign
  • Astronomical
  • Atlas
  • Attacks
  • Attitude
  • automatic
  • Awesome
  • Baatara
  • Back
  • Badger
  • Baking
  • ball
  • balls
  • BandWidth
  • Banner
  • Baroque
  • Basic
  • BASIL
  • Bat
  • Bathroom
  • Battery
  • Be
  • Bear
  • Beard
  • Beatles
  • beautifu
  • Beautiful
  • BEAUTY
  • Bee
  • Beep
  • Before
  • BELLY
  • Ben
  • Benefits
  • BERMUDA
  • BEST
  • Better
  • Big
  • biggest
  • Bill
  • BIOS
  • Birth
  • Bizarre
  • Black
  • Blog
  • Blood
  • blowing
  • Blue Hole
  • Body
  • Bodypainting
  • Bollywood
  • Bone
  • Boots
  • Bowling
  • Boys
  • BRAIN
  • BREAkfAsT
  • Breaking
  • BREATHING
  • Bridge
  • BROWN
  • Browser
  • Browsing
  • Bub
  • Buddhism
  • Build
  • Bundy
  • BURNING
  • Business
  • Bypass
  • Cabbage
  • Cactus
  • Cafe
  • Cake
  • Calculations
  • CALM
  • Camera
  • Can
  • Canada
  • Car Care Tips II
  • CARACAL
  • Carambola
  • Care
  • Careful
  • Caribbean
  • Castle
  • Cat
  • Cats
  • Cave
  • CD
  • celebrates
  • Celebrations
  • celebrities
  • Celebrity
  • Celebs
  • cell
  • CEREAL
  • Changes
  • Chapa
  • Chariot
  • check
  • CHILDREN’S DAY
  • China
  • Chinese
  • Chock
  • CHOCOLATE
  • Cholesterol
  • Christian
  • Chuck
  • Cider
  • CINEMA
  • CIRCLES
  • Circlism
  • Circus
  • City
  • ClickJacking
  • Clock
  • Clocks
  • Clown
  • Coca
  • cockroaches
  • Coconut
  • Code
  • Codes
  • Coffee
  • Cola
  • Colosseum
  • Command
  • Commandments
  • Committed
  • Common
  • Communication
  • Companies
  • Competition
  • completely
  • Computer
  • Computer.Pranks.50.in.1.AIO
  • Congress
  • Conjunctivitis
  • CONTACT
  • Conversation
  • Convert
  • Cookie
  • Cookies
  • Cool
  • Coping
  • Cosmetic
  • Cow
  • CRAVINGS
  • Crazy
  • Cream
  • Creative
  • Creatures
  • Crimes
  • Crocodile
  • Cross-sections of bullets
  • Crow
  • Cruz
  • ctr+c
  • ctr+v
  • Customize
  • Dairy
  • dam
  • DAMAGING
  • Dandruff
  • DARK
  • Day
  • Death
  • Deformities
  • Depression
  • Desk
  • desktop
  • Destructive
  • Devices
  • Devils
  • Diamond
  • Die
  • Diet
  • Different
  • Digital
  • dimples
  • DINING
  • Disable
  • Disciplines
  • Disease
  • disk
  • Disorder
  • Disorders
  • Display
  • Diwali
  • DNA
  • DNA Facts
  • DNS
  • do
  • Doctors
  • DOES
  • dog
  • Dogs
  • DONTS
  • Doong
  • Doppelgangers
  • Drag
  • Dragon
  • Drawbridge
  • Drawings
  • Dreams
  • Drinks
  • Drive
  • Drives
  • Dunns
  • Each
  • Early
  • Earthquake
  • EARTHWORM
  • easier
  • Easter
  • EASY
  • Echidna
  • Eckman
  • Ecstasy
  • Effective
  • Eggs
  • EIFFEL
  • EJACULATION
  • Elata
  • ELEGANT
  • Elephant
  • Eliminate
  • EMAIL
  • English
  • Enlightenment
  • Entire
  • Environment
  • Error
  • Espiritu Santo
  • Ethics
  • etiquette
  • Everyday
  • Everyone
  • Evil
  • evolution
  • Exam
  • Examination
  • Examples
  • Exercise
  • Exotic
  • Explained
  • express
  • Extrafine
  • EYE
  • Eyecare
  • Eyeglasses
  • EYES
  • Facebook
  • Faces
  • facts
  • Facts.About.Riboflavin.Vitamin. B.2.
  • fake
  • Falling
  • Falls
  • Fame
  • Family
  • Famous
  • Fascinating
  • Fast
  • Fat
  • favourite
  • FESTINA
  • Festival
  • FEVER
  • Fiji
  • FILES
  • film
  • find
  • Firewalls
  • First
  • Fish
  • Fit
  • Flash
  • Flax
  • FLOW
  • Fly
  • Flying
  • Foil
  • font
  • Food
  • FOODS
  • Fools
  • for
  • FORCIBLY
  • Forever
  • FOUL
  • Foxy
  • France
  • Free
  • Fried
  • Friends
  • Friendship
  • Frogs
  • from
  • Fruit
  • Ful
  • Fun
  • Fungus
  • funny
  • Fushun
  • Fussen Germay
  • Gacy
  • Gadjets
  • Garage
  • Garden
  • GARLIC
  • Gates
  • Gateshead Millennium Bridge
  • Gelatin
  • Genetic
  • Genetics
  • getting
  • Giraffe
  • girl
  • Girls
  • Glass
  • Glass Gem PopCorn
  • Globes
  • Glycerine
  • GOATS
  • God
  • Gold
  • golden
  • Golf
  • Gomateshwara
  • Good
  • Google
  • Gorge
  • GOUT
  • Grand
  • Gravies
  • Great
  • Green
  • GREYING
  • Grooming
  • Grouse.
  • GRRRREAT
  • Guide
  • Guinness World Records 1
  • Gun
  • Gunnison
  • Guns
  • guys
  • Habits
  • Hachiko
  • Hack
  • Hackers
  • Hagia
  • Hair
  • HAIRFALL
  • Half
  • Hall
  • Halloween
  • Happiness
  • Happy
  • HEADED
  • Health
  • Healthier
  • healthy
  • HEAT
  • Heine
  • help
  • Herbs
  • Hidden
  • Hide
  • High
  • Highly
  • Hijacker
  • HINDUISM
  • Hints
  • History
  • Holy
  • HOME
  • Hometown
  • Honey
  • Hookah
  • Hooker
  • Horse
  • Hot
  • Household
  • How
  • Howler
  • Human
  • Humans
  • HYPERTENSION
  • I
  • I.Q
  • Ice
  • icons
  • identify
  • II
  • Illustrations
  • IMPOTENCE
  • improve
  • in
  • Increase
  • Independence
  • India
  • INDIAN
  • Indias
  • Infamous
  • Infected
  • Installing
  • Int.
  • interesting
  • Internet
  • Introduction
  • iPhone
  • IRON
  • Is
  • Island
  • Jack
  • jackfruit
  • Jamaica
  • January
  • Japan
  • Jesús
  • John
  • jokes
  • Jr
  • Juice Fasting
  • Junk
  • Just
  • Kapok
  • keep
  • keeping
  • Keira
  • Key Loggers
  • Keyboard
  • Kidney
  • Kids
  • Kilimanjaro
  • Killer
  • killing
  • kinds
  • Kissing
  • Kitchen
  • kitten
  • Klementinum
  • Knife
  • Knightley
  • Know
  • Koalas
  • KONARK
  • l of
  • Lake
  • LANGUAGE
  • Lanka
  • Lantern
  • LAPTOP
  • laptops
  • Largest
  • Latitude
  • Laundry
  • Lavaredo
  • LEANING
  • Learning
  • Leg
  • Lego
  • LENTE
  • Lessons
  • Libra
  • Library
  • life
  • Light
  • lightening
  • Lights
  • likes
  • Lil
  • Lincoln
  • Lines
  • Linux
  • lion
  • Lips
  • LITTLE
  • LIVING
  • Lofoten
  • log
  • Longest
  • Longitude
  • LOOP
  • Loss
  • Lost
  • Louise
  • Love
  • low
  • Lowering
  • Luck
  • Mac
  • machine
  • Macropinna Microstoma
  • Made
  • Mafia
  • MAGNESIUM
  • Magnets
  • Maintain
  • make
  • makeup
  • MAKING
  • Malacara
  • Malware
  • manage
  • Manatee
  • Mango
  • Manual
  • Many
  • Marilyn
  • MARKS
  • Mathematics
  • MEAN
  • MEANING
  • Meats
  • Medicinal
  • Megatrends
  • Memory
  • Men
  • Mental
  • Mercury
  • message
  • Metal
  • Micro
  • Might
  • Milk
  • mind
  • Mobile
  • MOLES
  • Monkey
  • monolithic
  • Monroe
  • Mont
  • MoRaIne LaKe -20 dollar view
  • Moral
  • Moringa
  • MORNING
  • Most
  • Moth
  • Mothers
  • Mount
  • MS
  • MSWindows
  • Mug
  • Multiple
  • Mustache
  • my
  • MYOPIA
  • Mystery
  • Mystical
  • N
  • Nail
  • names
  • Natural
  • Nazca
  • Neodymium
  • Network
  • Neuschwanstein
  • Never
  • New
  • Nights
  • Nike Spoof and Copycat Logos
  • Noodles
  • Norris
  • Norway
  • Not
  • November
  • NTFS
  • Nutrition
  • Nutritional
  • NZ
  • O
  • OATsTAnDing
  • occasions
  • Ocelot
  • Of
  • office
  • Okapi
  • Oldest
  • OMG
  • on
  • Onion
  • online
  • OOo
  • OPOSSUMS
  • Optimum
  • Orange
  • Orchid
  • Oresund
  • Organic
  • organisms
  • organization
  • Original
  • os
  • out
  • Own
  • Oxymoron
  • Pagoda
  • Painting
  • paintings
  • Palace
  • Paper
  • Parents
  • Parrot
  • Part
  • Partition
  • password
  • Passwords
  • Pattaya
  • Patty
  • PCSX2
  • peace
  • peaks
  • Peel
  • Pegasus
  • Penelope
  • People
  • PERFECT
  • Performance
  • Phoenix
  • Phone
  • Photographers
  • Photos
  • Photoshop
  • Piano
  • Pie
  • Piercing
  • Pigs
  • Pilot
  • Pirates
  • PISA
  • Pistachio
  • Pomeranian
  • Pop
  • Popular
  • Portraits
  • POSITIVE
  • Positive Thinking
  • Potala
  • Prague
  • Pranks
  • Precepts
  • PREGNANCY
  • PREMATURE
  • Presidents
  • Pressure
  • prevent
  • PRICKLY
  • primate
  • Programs
  • Promote
  • Prompt
  • protect
  • Protocol
  • Psychotria
  • Puzzle
  • Quack
  • Queens
  • QUETZAL
  • Quick
  • Quotes
  • Raccoon
  • rajnikanth
  • Rama
  • Rambo
  • Rao
  • Rat
  • Rayong
  • Read
  • Real
  • Reasons
  • Recipes
  • recording
  • recover
  • REDUCE
  • Registry
  • REMEDIES
  • Remove
  • Reporting
  • Reptile
  • Republic Day
  • Resolution
  • restart
  • restrict
  • Rewire
  • RICE
  • Ring
  • Risks
  • River
  • Roboy
  • Rock
  • Rolex
  • Rolls
  • ROM
  • Roman
  • Room
  • Roraima
  • ROSE
  • Royce
  • Rugby
  • Rules
  • RulesThumb
  • Rupee
  • Safari
  • Safety
  • Sage
  • Salt
  • Samsung
  • Sanctuary
  • saving
  • Saying
  • Scan
  • Schimmel
  • SCORPIO
  • screen
  • Scribbles
  • Sculpture
  • Sculptures
  • Sea
  • Seasonings
  • Secret
  • Secrets
  • Secure
  • Security
  • Seed
  • SEMINAL
  • Serial
  • Sewing
  • SEX
  • SEXUAL DEBILITY
  • Shocking
  • Shoes
  • Short
  • shortcut
  • shortcuts
  • SHORTSIGHTEDNESS
  • Shot
  • Shots
  • Should
  • Shutdown
  • Shwedagon
  • SICKNESS
  • Sign
  • SIMPLE
  • Simply
  • Six
  • Skills
  • skin
  • SkinType
  • Slauerhoffbrug
  • Sleep
  • slim
  • Small
  • Smallest
  • Smartphone
  • smartphone photos
  • Smoothie
  • Snow
  • Soap
  • Soccer
  • Social
  • Soldering
  • Solutions
  • Solved
  • Some
  • Son
  • Sophia
  • Sorvagsvatn
  • Soybean
  • space
  • Speed
  • SPERMATORRHEA
  • Spider
  • Spirit
  • Split
  • spot
  • SPRAINS
  • Sprouts
  • Squirrel
  • Sri
  • Star
  • Start
  • StartIsBack
  • States
  • Statue
  • stay
  • Steampunk
  • STEPS
  • stick
  • StMichel
  • Stones
  • Story
  • Stress
  • Structure
  • studying
  • Success
  • Sucking
  • Sucks
  • Sugar
  • Sun
  • Super
  • Surgery
  • Swami
  • Sweaters
  • switch
  • System
  • System Tray
  • T
  • Taina
  • TAKE
  • taking
  • Tale
  • Talents
  • Talk
  • Tallest
  • Tattoo
  • Tattooed
  • Tattoos
  • Teachers
  • Techies
  • Technics
  • Ted
  • Television
  • Ten
  • Terminator
  • TERMITE
  • Terms
  • TEST
  • Text
  • Thai
  • Thailand
  • Than
  • Thanksgiving
  • that
  • The
  • their
  • Things
  • think
  • this
  • three
  • Thumbsucking
  • Tiger
  • Tilting
  • Time
  • Tips
  • TISSUE
  • To
  • to Do
  • Toads
  • Tobacco
  • Tollywood
  • Tooth
  • Toothache
  • Top
  • Top 14 Tips To Improve Your Sleep
  • Top 4 Substitutions Tips
  • Top Digital Cameras In India
  • Topics
  • Toting
  • TOWER
  • Toy
  • TRAIN
  • Treat
  • Tree
  • Trees
  • Trevor Williams
  • Triangle
  • Trio
  • Trivia
  • Trojan
  • Truth
  • Tulsi
  • Tweaks
  • Twenty
  • Types
  • Typewriters
  • UAC
  • Ubuntu
  • Ugliest
  • UNDER
  • United
  • Unlikely
  • UNsuccessful
  • Untranslatable
  • Up
  • Upgrading
  • Uptime
  • US
  • USB
  • Useless
  • Uses
  • using
  • Value
  • Vanuatu
  • Varanasi
  • Vardzia
  • Vegetables
  • Venus
  • Version
  • very
  • Via
  • Victoria
  • video
  • Vinegar
  • viruses
  • Vivekananda
  • Vivi
  • voice
  • vs
  • Waist
  • Water
  • Waterfall
  • way
  • Wayne
  • Ways
  • WEAKNESS
  • web
  • Weight
  • Wet
  • What
  • Which
  • while
  • Why
  • Wilderness
  • Win
  • Window
  • Windows
  • Windows 8
  • WINKING
  • Wisdom
  • Wishbone
  • with
  • without
  • Women
  • Wooden
  • Words
  • World
  • World!
  • worlds
  • WOW
  • X
  • XP
  • Year
  • Years
  • You
  • Young
  • your
  • YUCK
  • Zambia
  • Zebra

Blog Archive

  • ▼  2013 (478)
    • ▼  November (35)
      • Breaking the Wishbone for Luck
      • Thanksgiving Day 28-11-2013
      • A Reptile of Many Talents
      • Some Amazing Facts
      • Fun facts about Pomeranian dogs
      • Uses of Neodymium Magnets
      • Common Computer Terms
      • Fungus facts
      • EARTHWORM FACTS
      • Amazing Facts About Cats!
      • Animal fun facts
      • Chuck Norris Jokes
      • World Television Day - November 21
      • Story of a Famous dog in Japan - Hachiko
      • Different kinds of Malware
      • SPEED UP WEB BROWSING WITH GOOGLE DNS
      • Son Doong - the world’s largest cave
      • Lofoten Island, Norway
      • Installing Ubuntu from a USB memory stick
      • CHILDREN’S DAY
      • How to protect your USB from getting infected
      • Glass Gem PopCorn
      • Slauerhoffbrug ‘Flying’ Drawbridge
      • Mount Kilimanjaro: 25 fun facts
      • Fun facts About Micro-Organisms
      • AMAZING FACTS ABOUT COFFEE
      • Ten Tips to Smartphone Security
      • Mobile Phone Tips
      • Soldering Tips
      • ‘Diwali’ -the Festival of Lights
      • 10 tips to spot a fake Rolex
      • Parrot Facts
      • Amazing Facts About Human Body
      • Amazing Bone Facts
      • Fun facts about the Presidents of the United States
    • ►  October (49)
    • ►  September (58)
    • ►  August (75)
    • ►  July (42)
    • ►  June (32)
    • ►  May (27)
    • ►  April (8)
    • ►  March (56)
    • ►  February (28)
    • ►  January (68)
  • ►  2012 (22)
    • ►  December (22)
Powered by Blogger.

About Me

Unknown
View my complete profile