133tTECH Search

Employment Opportunities


Hi all..Below is the list of the vacancies available in my company, Hewlett-Packard (HP) Damansara, Kuala Lumpur, Malaysia.

1) IT Specialist – HPUX
2) IT Specialist – TIVOLI
3) Operations Support Specialist – Japanese Speaker
4) Area Sales Manager – Based In East Malaysia
5) Network Engineer
6) AS400 Operator
7) SAN and Tape Specialist
8) ASP Programmer – Fresh Graduates Preferred
9) Tape Librarian

Contact me if interested!!


Naruto Shippuden episode 94 english sub


Since I now already start my full time job at HP Damansara, Kuala Lumpur, I don't have a lot of time to post a long article but have the latest Naruto Shippuden episode 94 video with english sub to share for you all here. Have a nice day!

Video is below...happy watching!


Using Google to find a definition for a keyword and an abbreviation


Sometimes it’s hard to find a definition for a keyword but if you know how to use this trick, you can solve this problem. Don’t worry I’m here for you to share this simple trick.

Here is the command:
define:keyword/abbreviation here

note:define is case sensitive that’s mean you need to use a lowercase

Here is the example:


Huh, this is just a simple trick! Hope you’ll like it. Anything you want to share? Glad if you do that!


Force to show hidden files using regedit


Why to do this?

Because I’ve experienced with the situation my computer cannot show the hidden files even I already enabled the option. When I tried to enable it using folder option it not happen but what happen is the option back to the original (not show hidden files). This is happened because my computer was affected by viruses that the antivirus cannot detect it (You know, antivirus nowadays!!). Did you experience kind of situation too?

So, how to force show hidden files using regedit?

  1. As usual open regedit by go to start -> run -> type regedit-> and enter.
  2. Then go to HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
  3. After that you need to find and set Hidden and ShowSuperHidden to 0 (zero)
  4. Close and restart the pc if needed!

If anyone found out this trick is not working, please don’t hesitate to tell me!


Top 10 security tools


Among of these tools aren't widely known but these are the most used by IT Security Person. Not just because among of them are free but these tools also very powerful. These tools are used for scanning vulnerability, threat detection and prevention, analyzing, exploit, sniffing, password recovery, and so on. Check out the list below:

  1. Nessus
  2. Even Nessus not anymore freeware and now it is fee licensed but it still the most popular and powerful vulnerability scanner that can be run on UNIX and windows featuring high speed discovery, configuration auditing, asset profiling, sensitive data discovery and vulnerability analysis of your security posture.

  3. Wireshark
  4. Wireshark, before known as ethereal that already built-in in Linux is a open source network protocol analyzer for Unix and Windows. It allows you to examine data from a live network or from a capture file on disk. You can interactively browse the capture data, probing down only into the level of packet detail that you need. It has several powerful features, such as a rich display filter language and the ability to view the reconstructed stream of a TCP session. It also supports hundreds of protocols and media types.

  5. Snort
  6. Snort is an open source network intrusion prevention and detection system utilizing a rule-driven language, which combines the benefits of signature, protocol and anomaly based inspection methods and a network intrusion detection and preventions system that can detects thousands of worms, vulnerability exploit attempts, port scans and other suspicious behaviour.

  7. Netcat
  8. Netcat is a featured networking utility which reads and writes data across network connections, using the TCP/IP protocol. It is designed to be a reliable "back-end" tool that can be used directly or easily driven by other programs and scripts. At the same time, it is a feature-rich network debugging and exploration tool, since it can create almost any kind of connection you would need and has several interesting built-in capabilities. Featuring tunnelling mode which allows special tunnelling such as UDP to TCP, with the possibility of specifying all network parameters (source port/interface, listening port/interface, and the remote host allowed to connect to the tunnel.

  9. Metasploit Framework
  10. Metasploit Framework is an advanced open-source platform for developing, testing, and using exploit code. The extensible model through which payloads, encoders, no-op generators, and exploits can be integrated has made it possible to use the Metasploit Framework as an outlet for cutting-edge exploitation research. It ships with hundreds of exploits, as you can see in their online exploit building demo and it makes writing your own exploits easier. This is one of my favourite exploit tools.

  11. Hping2
  12. Hping is a command-line oriented TCP/IP packet assembler/analyzer but offers far more control over the probes sent. This handy little utility assembles and sends custom ICMP, UDP, or TCP packets and then displays any replies. It also has a handy traceroute mode and supports IP fragmentation. This tool is particularly useful when trying to traceroute/ping/probe hosts behind a firewall that blocks attempts using the standard utilities. This often allows you to map out firewall rulesets. It is also great for learning more about TCP/IP and experimenting with IP protocols.

  13. Kismet
  14. Kismet is a layer2 wireless network detector, sniffer, and intrusion detection system. Kismet will work with any wireless card which supports raw monitoring (rfmon) mode, and can sniff 802.11b, 802.11a, and 802.11g traffic. It identifies networks by passively sniffing (as opposed to more active tools such as NetStumbler), and can even decloak hidden (non-beaconing) networks if they are in use. It can automatically detect network IP blocks by sniffing TCP, UDP, ARP, and DHCP packets, log traffic in Wireshark/TCPDump compatible format, and even plot detected networks and estimated ranges on downloaded maps. As you might expect, this tool is commonly used for wardriving and also warwalking, warflying, and warskating, and so on.

  15. Tcpdump
  16. Tcpdump is an old time IP sniffer and not have pretty GUI but it does great task came also with fewer security holes. It is great for tracking down network problem came with separate windows port named Windump. TCPDump also is the source of the WinPcap packet capture library, which is used by a lot of others network tools.

  17. Cain and Abel
  18. It can recover passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols. It is also well documented. This is one of my favourite password recovering tools. Some of antivirus will detect this tool as threat so please exclude the path before use with antivirus or maybe you just disable antivirus.

  19. John the Ripper
  20. John the Ripper is a fast password cracker, currently available for many flavors of UNIX, DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect weak UNIX passwords. It supports several crypt(3) password hash types which are most commonly found on various Unix flavors, as well as Kerberos AFS and Windows NT/2000/XP LM hashes. Several other hash types are added with contributed patches. You will want to start with some wordlists, which you can find here, here, and here.

Among of this top 10 network security tools are my favourite and most used while hacking. Maybe you also familiar with these tools and want to share something with me.


How to use Google’s command to search information in certain website


Previously I shared about how to use Google’s command to view public webcam, using Google to search files by extension, using Google to answer everything even a blank question, and so on. Now on I want to share you how to use google’s command to search information in certain website.

Why to use this command?

  • If you using normal keyword in Google’s search engine it will crawl information on all website.

  • Not every website provides own search engine that use to search certain information on their website.
  • Even they provide search engine on their website, sometimes it not found what we need on their website.

OK now I understand. So what is the command and how it work?

Simple, only enter "site:www.websitename.com information you want here". Click below to see the example result:
site:4shared.com britney spears womanizer
site:rapidshare.com britney spears womanizer

Use this command with your own creativity. I just gave you the sample. So, what do you think about this command? Anything you want to share here?


Best and useful web based application


What is web based application?

Web application is an application that can be access via web browser such as Mozilla Firefox, Internet Explorer, and Google’s Chrome over internet or intranet. Type of web application such as simple office software (word processor, spreadsheet, and presentation tools) and also can be more advance application such as video and picture editing, point-of-sales, computer-aided design, project management, and so on. Web applications has ability to update and maintain without distributing and installing software because upgrade automatically with new features on server and more importantly it’s need some or no disk space on the client.

Below are the list of web application by categories:


Last.fm – Every track we play will save in our Last.fm profile as something about what we like. After that it searches from other people that also like something what we like and recommend songs from their and our music collection.

ilike - iLike is the Web's leading social music discovery service and the dominant music application on the Facebook, Orkut, hi5 and Bebo platforms. iLike helps people share music recommendations, playlists, and personalized concert alerts.


Google reader - Google Reader is a Web-based RSS feed reader which is we can subscribe to as many RSS feeds as we want, and then browse them in a simplistic two-pane story browser alike Gmail.


Amazon.com - Amazon.com was one of the first online retailers in the world. It started out with books and now sells nearly every consumer goods, including groceries and over-the-counter medicines.
Ebay.com - eBay is The World's Online Marketplace, enabling trade on a local, national and international basis.

Paypal - PayPal was one of the first services to let people exchange money online. Faster, Safer and easier way to pay online without exposing credit card.


Gmail – Google’s email.

Meebo – offer chat for a lot of IM network such as AIM, Yahoo!, MSN, Google Talk and Gmail, MySpace IM, Facebook Chat, and more


google doc– contain word processor, spreadsheet and presentation tools

Rememberthemilk – The best way to manage our task. It’s available in Twitter, Google Calendar, Gmail, via SMS, the iPhone, Windows Mobile devices, Skype, and popular IM clients.

Microsoft Office Live Workspace – Allow sharing Office documents and mission critical files between multiple users.

basecamp - project management

Google Calendar- calendar

Mint – It is Financial management service that will interface directly with our bank and credit card companies (there are more than 3,500 institutions on the system) to keep our accounts up to date.

Publishing and photography

Photobucket- is a photo-sharing and hosting site addition to photo hosting, Photobucket lets its users upload video clips, which can be edited with an integrated video remixing tool designed by Adobe

Flickr - almost certainly the best online photo management and sharing application in the world

Sumopaint - MS Paint alike but more features and it’s online.

befunky – cool picture editing and can make your picture like cartoon and also can make as a gift as it can be place at mug, t-shirt, cap and so on!

Blogger - Web-based blogging platform owned by Google. Users can create and customize their own blogs using a drag-and-drop editor, and have them hosted for free on Google's massive server arrays.

FotoFlexer - The world's most advanced online digital photo editor. It performs advanced effects previously only available to professionals using expensive software.

Twitter - Twitter is a service that lets us broadcast short messages to our friends or "followers."

Search and reference

Google Search – world no 1 search engine

Google map – world map

Wikipedia - A free encyclopedia with millions of articles in dozens of languages


Facebook - is a social utility that connects people with friends and others who work, study and live around them

Myspace - An international site that offers email, a forum, communities, videos and weblog space

Friendster - is a leading global social network emphasizing genuine friendships and the discovery of new people through friends

Deviantart - Art - community of artists and those devoted to art. Digital art, skin art, themes, wallpaper art, traditional art, photography, poetry / prose.

Utility and security

OpenId – it lets us to verify credentials from one site in place of having to sign up for yet another login.

logmein - gives us the flexibility to access and control your computers from anywhere.


Youtube – Share the videos with our friends, family, and the world

Joost - is your place for online video - TV shows, music videos, movies and more


Travbuddy - Honest hotel reviews, millions of travel buddies, and thousands of travel blogs to help plan our next trip.

Anything you want to add? Do you have your own list? Come on, share it here!


High quality option is enabled on youtube


Good news for youtube’s addict because now they’re enabled high quality option on youtube. But it does have differentiation between view youtube video on youtube.com and embedded video. The differentiation is only the way to enable the HQ option. Look at picture below.

Picture below showed the differentiation between high quality and normal quality. (Picture is taken from www.techcrunch.com)

Unfortunately, not all video have the option to view in high quality. Look at video below:

Video below does have high quality option:

Note: you must hit the play button to enable the HQ option!

Anything to share?


My favourite twitter tools


I love twitter very much because a lot of benefit I can get from it such as making friend, generate traffic to my blog, sharing opinion and idea, and also gain knowledge. As a lot of users are using twitter, also a lot of tool is developed. This tool will optimize the use of twitter’s such as searching user according to our interest and local, searching the top rank user (also must follow users), and so on. Below are my favourite twitter tools:

  1. twhirl – run twitter on your desktop

  2. twittervision - See where in the world people are submitting tweets from, real time.

  3. twitthis - Allow visitors to your site to easily share a page or post via Twitter
  4. twitterfox - TwitterFox is a Firefox extension that notifies you of your friends' tweets on Twitter
  5. twitterholic - Shows the top users and accounts on Twitter.
  6. twitlinks - The latest links from the world’s top tech twitter users.
  7. twitbin - Send and receive messages to all your fellow twitterholics, right from your firefox browser.

I hope you also will like these tools. If you find any great twitter tools out there please share here.


Change or Add restriction using Regedit


Today I’ll share with you how to make restriction of what users can or cannot do on computer without using software or tools but only using regedit. All the command I’ll show you today is need to apply at HKEY_USERS\(yourprofilename)\ Software\ Microsoft\ Windows\ CurrentVersion\ Policies\ Explorer. Below is the step:

Note: 0 is Off and 1 is On

  1. Open RegEdit
  2. Go to HKEY_CURRENT_USER\Software\Microsoft\ CurrentVersion\ Policies
  3. Add DWORD or binary values set to 1 in the appropriate keys for On and 0 for Off.
  4. Below is the value:
  • NoDeletePrinter - Disables Deletion of Printers
  • NoAddPrinter - Disables Addition of Printers
  • NoRun - Disables Run Command
  • NoSetFolders - Removes Folders from Settings on Start Menu
  • NoSetTaskbar - Removes Taskbar from Settings on Start Menu
  • NoFind - Removes the Find Command
  • NoDrives - Hides Drives in My Computers
  • NoNetHood - Hides the Network Neighborhood
  • NoDesktop - Hides all icons on the Desktop
  • NoClose - Disables Shutdown
  • NoSaveSettings - Don't save settings on exit
  • DisableRegistryTools - Disable Registry Editing Tools
  • NoRecentDocsMenu - Hides the Documents shortcut at the Start button
  • NoRecentDocsHistory- Clears history of Documents
  • NoFileMenu _ Hides the Files Menu in Explorer
  • NoActiveDesktop - No Active Desktop
  • NoActiveDesktopChanges- No changes allowed
  • NoInternetIcon - No Internet Explorer Icon on the Desktop
  • NoFavoritesMenu - Hides the Favorites menu
  • NoChangeStartMenu _ Disables changes to the Start Menu
  • NoFolderOptions _ Hides the Folder Options in the Explorer
  • ClearRecentDocsOnExit - Empty the recent Docs folder on reboot
  • NoLogoff - Hides the Log Off in the Start Menu

If any of this key not works please tell me! Hope this information will help you.