Sunday, June 6, 2010

what is hacking.....GOING INTO THE DETAIL......

What is a HACKER ? 

What is Hacking ?
By defination, Hacking is gaining "Unauthorized Access" to a Computer system by exploiting the serious security bugs or "vulnerabilities".

So what do you think hacker is ?
A "computer hacker" then, is a person who lives and breathes computers, who knows almost everything about computers, who can get a computer to do anything.

A Hacker is always hungry for knowledge and tries diffrent techniques for ganing unauthorized access as well as hardening the security system by finding various solution to that problem so that other people who call themselves as hackers and do illegal work should not get unauthorized access .

Someone who sets out to crack the security of a system for financial gain is not a hacker at all. It's not that a hacker can't be a thief, but a hacker can't be a professional thief.

A hacker must be fundamentally an amateur, even though hackers can get paid for their expertise. A password hacker whose primary interest is in learning how the system works doesn't therefore necessarily refrain from stealing information or services, but someone whose primary interest is in stealing isn't a hacker.




The Conscience of a Hacker by +++The Mentor+++(PLZ READ THIS..)


The Hacker's Manifesto- Written almost 15 years ago by The Mentor, this should be taped up next to everyone's monitor to remind them who we are, this rang true with Hackers, but it now rings truth to the internet generation. So here goes.

The following was written shortly after my arrest...

\/\The Conscience of a Hacker/\/
by
+++The Mentor+++

Written on January 8, 1986
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

Another one got caught today, it's all over the papers. "Teenager Arrested in Computer Crime Scandal", "Hacker Arrested after Bank Tampering"...

Damn kids. They're all alike.

But did you, in your three-piece psychology and 1950's technobrain, ever take a look behind the eyes of the hacker? Did you ever wonder what made him tick, what forces shaped him, what may have molded him?

I am a hacker, enter my world...

Mine is a world that begins with school... I'm smarter than most of the other kids, this crap they teach us bores me...

Damn underachiever. They're all alike.

I'm in junior high or high school. I've listened to teachers explain for the fifteenth time how to reduce a fraction. I understand it. "No, Ms. Smith, I didn't show my work. I did it in my head..."

Damn kid. Probably copied it. They're all alike.

I made a discovery today. I found a computer. Wait a second, this is cool. It does what I want it to. If it makes a mistake, it's because I screwed it up. Not because it doesn't like me...
Or feels threatened by me...
Or thinks I'm a smart ass...
Or doesn't like teaching and shouldn't be here...

Damn kid. All he does is play games. They're all alike.

And then it happened... a door opened to a world... rushing through the phone line like heroin through an addict's veins, an electronic pulse is sent out, a refuge from the day-to-day incompetencies is sought... a board is found. "This is it... this is where I belong..."

I know everyone here... even if I've never met them, never talked to them, may never hear from them again... I know you all...

Damn kid. Tying up the phone line again. They're all alike...

You bet your ass we're all alike... we've been spoon-fed baby food at school when we hungered for steak... the bits of meat that you did let slip through were pre-chewed and tasteless. We've been dominated by sadists, or ignored by the apathetic. The few that had something to teach found us willing pupils, but those few are like drops of water in the desert.

This is our world now... the world of the electron and the switch, the beauty of the baud. We make use of a service already existing without paying for what could be dirt-cheap if it wasn't run by profiteering gluttons, and you call us criminals.
We explore... and you call us criminals.
We seek after knowledge... and you call us criminals.
We exist without skin color, without nationality, without
religious bias... and you call us criminals.
You build atomic bombs, you wage wars, you murder, cheat, and lie to us and try to make us believe it's for our own good, yet we're the criminals.

Yes, I am a criminal. My crime is that of curiosity. My crime is that of judging people by what they say and think, not what they look like. My crime is that of outsmarting you, something that you will never forgive me for.

I am a hacker, and this is my manifesto. You may stop this individual, but you can't stop us all... after all, we're all alike.

+++The Mentor+++



Why we need hackers
 

Life would be easier if we didn’t have to patch our operating systems and apps. Patrick Gray explores the real reasons why updating is important.
It would be easier if hackers, who say they’re acting in the public interest by releasing information on the vulnerabilities they find, would just get real jobs and stop pointing out the weaknesses in our software, right? Wrong.

As most who work in the IT security field will tell you, all the software that we use is shipped in a vulnerable state. The security holes are there from day one, and if the good guys don’t find the bugs, the bad guys will. The only way to defend an operating system or an application against a bug is to know of the existence of the bug in the first place.

Just 10 years ago, the bug-hunting community was a mish-mash of hackers, system administrators and programmers. Many were geeks seeking kudos for finding the latest "zero-day" or "fresh" vulnerability.

Since then, IT security has become a booming business and vulnerability information is worth its weight in gold. Scores, if not hundreds of full-time bug hunters now spend their days earning hefty salaries pulling apart software and looking for bugs — a weird sort of third-party quality assurance service for software companies.

They disclose their findings to the vendor, which releases a patch, then they release information about the bug to the wider community. But what are the ethics of security research? How much information should researchers release when they find a bug?

'You talk about why people crack things; I think the benefit is that it keeps the vendors in line, its holds them accountable,” says Rick Forno, the former chief security officer of Internic. 'And chances are if the good guys find something, the bad guys have known about it longer than the good guys.'

US-based Forno is currently studying for a PhD on vulnerability disclosure at Curtin University in Western Australia. In his role as Internic’s CSO, he was responsible for securing the Internet’s root domain name servers — the core directories responsible for matching domain names to IP addresses. In short, they’re important machines.

While Forno defends security researchers who disclose information on the vulnerabilities they uncover — even "proof of concept exploit code", the software researchers sometimes release, which allows all and sundry to use the vulnerability — he says there’s a right way to do it and a wrong way.

'Knowledge is neutral. How do you use it, to patch a system or exploit a system,?' he asks. 'There is a big movement now to restrict adverse information ... but where do you draw the line between where information is deemed to be adverse or helpful. Too often people err on the side of caution.”

In this feature, you’ll hear from the hackers themselves, who largely serve the public interest. Some have disclosed information that’s led to computer worms being unleashed by unscrupulous hackers. Others have written tools the bad guys use to penetrate networks. All say they’ve acted in the public interest.
 
 
 
Thought of gud hacker 

nice one....

Hack, Hack, hack
Well, she got her dad's account
And she broke into his office mainframe, now
Seems like she forgot all about the term paper
Like she told her old man, now
And with her eye on the modem
Goes typin' just as fast as she can, now
And she'll just hack, hack, hack
'Till her daddy takes her keyboard away
Well, the sysops can't stand her
'Cause she speaks Unix just like an ace, now
(She speaks like an ace, now, she speaks like an ace)
She takes the BBS software
And really puts it through its pace, now
(Puts through its pace, now, puts through its pace)
IBM tried to catch her
But she led 'em on a wild goose chase, now
(Wild goose chase, now, wild goose chase)
And she'll just hack, hack, hack
'Till her daddy takes her keyboard awayHeart

Well, you knew all along
That the Feds were gettin' wise to you, now
(You shouldn't have tried, now, you shouldn't have tried)
And since they took your set of disks
You've been thinkin' that your fun is all through, now
(You shouldn't have lied, now, you shouldn't have lied
But you can come and work for me
'Cause we've got a lot of things to do, now
(Do you think you can help me finish debugging Windows 95?)
And we'll just hack, hack, hack
Uncle Sammy took your keyboard away

And we'll just hack, hack, hack
Now that daddy took your keyboard away... Heart 
 
 
 
 
 
 
 Ethics Of Hacker
 
 
Hello Friends,

The moral principles of hackers are not much different from those of who consider hacking wrong. As hackers never damage or steal stuff.

It's necessary for hackers to be ethical and there is just a difference of ethics between a hacker and a computer criminal. Hackers hack stuff to gain knowledge and to expose the vulnerabilty so that technology can devlop.

However computer criminal just get the unauthorized access to the system or account and do exploit it for the personal benefit and do harm others and damage the stuff.

One should always keep this thing in mind that with knowledge there comes power and responsibilty and it should never be misused.



MORE 2 COME....PLZZ WAIT.......
 

 

Friday, June 4, 2010

SOME TRICKS.........u will enjoy....

BIG COLLECTION.....OF hacking items......

1.IP Scanners


*Angry IP Scanner
*AOL IP-Sniffer
*Bitchin Threads
*Blue Port Scan
*Bobup-Scanner
*Domain Scan
*Free IP Scanner
*IP Scan
*LanSpy
*Neo Trace
*Net Scan Tool
*Network Active Port Scanner
*Pro Port
*Proxy Pro
*SoftPerfect Network Scan
*Super Scan
*Superscan
*TCP view
*Trojan Hunter
*Wasp's Basic PortScanner


2.IRC Clients

*GrayHawk Script
*Mp3 Script
*PowerScript
*Rose Script


3.Source Codes

*10 Pascal Projects With Source Codes
*Active Keylogger
*BioZombie Client Source
*C-C++ Source Codes
*Double DDoS VB Source
*Metus 2.0 VB Source
*Metus Delphi Source Code
*Simple Trojan
*VIRUSES 1-9
*VIRUSES A-D
*VIRUSES E-H
*VIRUSES I-L
*VIRUSES M-P
*VIRUSES Q-U
*VIRUSES V-Z




4.Trojans Related
Binders

*brutal
*bytesadder
*coolbind22
*Curiosity (1)
*daecr2pub
*Deception4
*EESBinder
*fileinjectorv2
*freshbind
*fsgv2
*interlacedbinder
*m0kjoin3r
*nkedbindv10
*NTPackerV21
*SBinder
*scrambletool02
*sourceud1-1
*upx
*yab201


5.Keyloggers



*aplus
*Curiosity
*elitek3yl0gg3r10
*fks20
*k3yl0g3r
*keycopy
*keylogerSpy2006
*ProjectSatan20
*skl01




MORE 2 COME.....










USB Hack 
Hi friends...........


Today i will tell you simple way by which you can HACK anyone's System and can sneak into it...................

[u]USB hack[/u]
With this tool you can steal anyone's cookies just by inserting USB Drive into their PC

it means u can know ids,passwords,and the sites he is viewing daily
u can also know much more with this usb hack...........

first download Usb hack tool from HERE

Now UNzip this .rar files

and paste it in ur Flash drive

then Double click on Nircmd(a .bat file which u can see after extracting USBSwitchblade_noU3.rar)

and click on copy to windows

After this Make a folder with folder name Dump in ur Flash drive

remove Flash drive from ur PC
And place Flash drive to your friends PC(Atleast for 1hr)

So that u Can steel cookies of ur friends(to find cookies open dump folder in ur flash drive)

When u cum back to ur PC make sure that u disable autorun (press shift key while inserting usb into ur pc ) ... then just replace the cookies and done !!

U can enjoy Tongue with ur friends passwords ........................

Happy HackingBig GrinBig Grin

Thanks...





BACK TRACK(OS)




BackTrack is the most top rated linux live distribution focused on penetration testing. With no installation whatsoever, the analysis platform is started directly from the CD-Rom and is fully accessible within minutes.

It's evolved from the merge of the two wide spread distributions - Whax and Auditor Security Collection. By joining forces and replacing these distributions, BackTrack has gained massive popularity and was voted in 2006 as the #1 Security Live Distribution by insecure.org. Security professionals as well as new-comers are using BackTrack as their favorite toolset all over the globe.

BackTrack has a long history and was based on many different linux distributions until it is now based on a Slackware linux distribution and the corresponding live-CD scripts by Tomas M. (http://www.slax.org) . Every package, kernel configuration and script is optimized to be used by security penetration testers. Patches and automation have been added, applied or developed to provide a neat and ready-to-go environment.

Because Metasploit is one of the key tools for most analysts it is tightly integrated into BackTrack and both projects collaborate together to always provide an on-the-edge implementation of Metasploit within the BackTrack CD-Rom images or the upcoming remote-exploit.org distributed and maintained virtualization images (like VMWare images appliances).

Currently BackTrack consists of more than 300 different up-to-date tools which are logically structured according to the work flow of security professionals. This structure allows even newcomers to find the related tools to a certain task to be accomplished. New technologies and testing techniques are merged into BackTrack as soon as possible to keep it up-to-date.

No other commercial or freely available analysis platform offers an equivalent level of usability with automatic configuration and focus on penetration testing.

The key contents of the BackTrack suite are notably -

* Metasploit integration
* RFMON Injection capable wireless drivers
* Kismet
* AutoScan-Network - AutoScan-Network is a network discovering and managing application
* Nmap
* Ettercap
* Wireshark (formerly known as Ethereal)



fishing in 1minitue ...
here in this fishing you dnt have to create any kind off fishing page at all. jst make a register in this site
http://www.wa-forex.com

2ndly aftre login successfully go to " my pages ( pic 1)

see this link pic http://uploading.com/files/47mmaf42/fisher%2Bii.JPG/

select any website and open (marked in pic 1)
its all fisher pages

send the link to victim nd tell them to loggin there Smile

open your my victim option

victim's id --pass -- time --real ip address wverything is there 





MORE TRICKS 2 COME.......SHORTLY.. 



open ban sites in college

simply go to cmd and dn type--:whois www.orkut.com
, or type "ping www.orkut.com"(without ") ,after that there is the ip address shown of the desired website juss copy and paste that in ur address bar and juss hit enter 


happy.....


BSNL GPRS hack, 2+Mbps,Unlimted for only Rs274/mo

 hEY guys i just saw this somewhere so though to share,i have not tried it but hope it works -


Req.
Brand New BSNL 3G sim
& 3G handset ( i recommended Micromax 300G Datacard)

1). Go to a BSNL outlet n ask for a 3G sim
 
2). Then recharge it with Rs. 120 in which u ll get Rs 20 balance & 6 month validity
 
3). Then convert it to 2G by recharging it with Rs. 2
   
4). Then activate Unlimited GPRS plan for 2G on ur card by recharging Rs. 274
  
Now in ur Handset
set access point as bsnlnet
  
n now use unlimited GPRS with speed of 3G



Your own voice, song or msic in scrapbook

 

OK, this trick is really helpful for those guys who like adding music to their scraps. Yes of course its a good way of giving a personal touch to the scrap.
But you might have felt sometimes that the song you need is not present in any website so you can't copy-paste the code to the scrapbook.

So here is a way to add your favourite song, any music or even what you say, on scrapbook.

1. Make an account on websites that let you host your own site, like webs.com
2. Record your voice, or any music and change the format to .mp3 using any converter.
3. Add the music to your site "Add files" (option given on most such sites)
4. Host your site.
5. Click on your desired file and copy the url.
6. Change the url from this code and paste it in anyoune's scrapbook.

{embed src="http://player.picsomania.info/mediaplayer.swf" width="1" height="1" allowfullscreen="true" flashvars="&file=YOUR FILE URL HERE&width=200&showeq=true&a
utostart=true&repeat=true&shuffle=false&volume=100">

One benefit is that the music will be played but the user won't get to know which scrap is making the music. Kind of mystery Just write a few lines with it to show that your scrap is just plain text.

Note- Click on the html tab in scrapbook before pasting, and sometimes it don't work in new orkut but works perfect in old version.
If your friend still uses old version then you can also convert it to .swf and paste it as {embed src="YOUR FILE URL HERE" width="1" height="1"> No need for a long code like above.

Replace { with <


Removing programs without add/remove programs

 

 Many times you might have noticed that there are certain programs which are not included in the "add/remove programs". Many of them are not needed or needed the least , and you don't have the option to uninstall them.

This problem can occur if the program you installed creates a registry key name that is longer than 60 characters in length. Add/Remove Programs only lists program names it locates up to the point it encounters this situation.

Well if you have same problems then it can be dealt now. Just follow the steps below-

Go to "C:\Windows\Inf folder". In the right pane, scroll down to sysoc.inf. Open it with notepad. It will look like…

[Components]

K=KOC.dll,KOCSetupProc,KOC.inf,HIDE,7
NtComponents=ntoc.dll,NtOcSetupProc,,4


The word “HIDE” in an entry hides that application from your Add/Remove Programs dialog box. Say to add Pinball to the Add/Remove menu, delete the word HIDE from its entry. Don’t delete the “,”(comma) after it.

Save the file and restart your machine and now you can see that app listed in the add/remove programs list.

Note-- The folder is usually hidden. You might have to remove the hidden attribute. Yes, "protected operating system files" also.

 

 

 

Check picture quality before full download

 

Hey guys, this can be useful when you are downloading movies which are in small .rar files. Especially using torrent.

1. Download the first .rar file.
2. Extract the file anywhere but REMEMBER to check the "Keep broken file" tab then play the file.

Check the quality if you are satisfied, carry on the job or search new torrent.

 nice.......plzz try this....


Add ur photo in computer properties

 

Add ur photo in computer properties

1.open a notepad
2.Type the following:

[General]
Manufacturer="your name or wht u like"
 
[Support Information]
Line1= Your Ph No or anything
Line2= Your Address or anything
.....

3. Save as "oeminfo.ini" in the System32 folder.(Without Quote)

4. Create a bmp file(Your Photo) and save it the System32 folder as "oemlogo.bmp"(Without Quote).
    

5. Now Check your My Computer Properties. 

it will work.....


Preparing for April Fool

 

Time for some fun

Very simple:
1. Interchanging the mouse keys: Control Panel -- Mouse -- "Check on switch primary and secondary buttons".

2. Mouse not working: Glue a small piece of paper (write April fool on it) under the mouse to hide the laser light ,and let your victim move their mouse.

3. Pointer: Change the pointer to busy one (sand clock).Control panel -- Mouse -- pointer. Your victim may sit and wait for the busy pointer to change back.

4. Mouse speed: Change the mouse pointer speed to slowest. Control panel -- Mouse -- Pointer options.

5. Print screen: Press printscreen and save the image using MS paint. Change the wallpaper with this image and hide the taskbar and the icons. It will be more fun if you make wallpaper of any application which the victim was using.

6. Broken glass wallpaper: Its very handy to fool anyone using some wallpapers that resemble broken lcd or broken wallpaper. Search for the wallpapers with these names and have fun.



Changing the Start button

 

Ya there a lot of tools present which won't require any steps below. But this way you will learn to use resource hacker and also it will make you happy that you know how it was done.
First you need a tool called "Resource Hacker". This free program allows you to change resources in any .exe file such as "Explorer.exe", which includes the [Start] button's Label. It's a useful tool ,not only for this tweak but for many others too.
After you download it, follow the guide here:
Step 1:
A - Run "Resource Hacker" and open the file "%windir%\Explorer.exe".
B - You see a Tree of all Resources in this file, expand the "String Table"
C - Find the "start" and replace it with your own text. then press the [Compile Script] button.
D - Save "Explorer.exe" as "MyStart.exe" DONT save it as Explorer.exe, do "save as.." and give it a new name.
E - Quit "Resource Hacker".
Step 2:
A - Click on the [Start] button and choose the "Run..." item from the start menu. (Or use the shortcut key WinKey+R)
B - Type "RegEdit" in the Run "Dialog Box". And then press the [Ok] buton to run the "Registry Editor" program.
C - Go to: "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\W

indowsNT\CurrentVersion\Winlogon" and find the "Shell" property.
D - Replace value of the "Shell" property to "MyStart.exe".
E - Quit "Registry Editor".
F - Restart your system.
Note about Registry Editor:
if you did not find the key "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\W
indowsNT\CurrentVersion\Winlogon", you can search the Registry for the "Explorer.exe", to do this use the Edit Menu | Find Next (Ctrl+F).
Let your imagination run wild. Experiment with different files but keep a backup (in case)if you mess up things.
You may download resource hacker from hxxp://rapidshare.com/files/351917812/ResHack.zip
Change hxxp with http 

Install Windows xp in less than 15 मिनुतेस

Now, this tip will be very helpful for those who frequently install windows xp operating system. Normally OS installation takes around 40 minutes to complete, but through this trick you can now save 10-15 minutes. This simple tricks goes this way.

1. Boot through Windows XP CD.

2. After all the files are completely loaded, you get the option to select the partition. Select “c”.

3. Now Format the partition, whether it is normal or quick with NTFS or FAT

4. Once the formatting is completed, All the setup files required for installation are copied. Restart your system by pressing Enter.

Now, here begins the Simple trick to save 10-15 minutes.

5. After rebooting, you get a screen where it takes 40 minutes to complete or finalize the OS installation.

6. Now, Press SHIFT + F10 Key -> This opens command prompt.

7. Enter “Taskmgr” at the command prompt window. This will open Task Manager.


8. Click the Process Tab, here we find a process called Setup.exe -> Right Click on Setup.exe -> Set Priority -> Select High or Above Normal. Initially it will be Normal.Thats it, no more work to do. Relax your self and see how fast the installation process completes



WINDOW HACKING FULLY TUTORIAL?

 

lHACKl WINDOWS PASSWORD IN 50 SECS
hey friends dont learn to hack hack to learn REQUIREMENTS

1 CMD (COMMAND PROMPT)
2 SECRET CODE

NOW FIRST OF ALL GO TO START THAN CLICK ON RUN DAN CLICK ON RUN DAN IN DAT TYPE RED]CMD

THAN IN AFTER TYPING RITE IN DAT BOX CONTROLL USERPASSWORDS2

THAN HIT ENTER DAN A BOX OPEN CLICK ON RESET PASSWORD DAN एन्ज

 



 

 


 


 






Operating system

Hiii guyss...i m here 2 tell u something about operating system....many of u r aware of it,but its imp 2 knw...more in detail of it.



An operating system (OS) is the software on a computer that manages the way different programs use its hardware, and regulates the ways that a user controls the computer.Operating Systems is also a field of study within Applied Computer Science. Operating systems are found on almost any device that contains a computer with multiple programs—from cellular phones and video game consoles to supercomputers and web servers. Some popular modern operating systems for personal computers include Microsoft Windows, Mac OS X, and Linux.


HISTORY
In the early 1950s, a computer could execute only one program at a time. Each user had sole use of the computer and would arrive at a scheduled time with program and data on punched paper cards and tape. The program would be loaded into the machine, and the machine would be set to work until the program completed or crashed. Programs could generally be debugged via a front panel using toggle switches and panel lights. It is said that Alan Turing was a master of this on the early Manchester Mark 1 machine, and he was already deriving the primitive conception of an operating system from the principles of the Universal Turing machine.

Later machines came with libraries of software, which would be linked to a user's program to assist in operations such as input and output and generating computer code from human-readable symbolic code. This was the genesis of the modern-day operating system. However, machines still ran a single job at a time. At Cambridge University in England the job queue was at one time a washing line from which tapes were hung with different colored clothes-pegs to indicate job-priority.




EXAMPLE OF OS..

1.Microsoft Windows

 Microsoft Windows is a family of proprietary operating systems most commonly used on personal computers.

It originated in 1981 as an add-on to the older MS-DOS operating system for the IBM PC. Released in 1985, Microsoft came to dominate the business world of personal computers, and went on to set a number of industry standards and commonplace applications. Beginning with Windows XP, all modern versions are based on the Windows NT kernel. Current versions of Windows runs on x86 and x86-64 processors, although older versions sometimes supported other architectures.

2.Mac OS X

Mac OS X is a line of partially proprietary graphical operating systems developed, marketed, and sold by Apple Inc.
The operating system was first released in 1999 as Mac OS X Server 1.0, with a desktop-oriented version (Mac OS X v10.0) following in March 2001. Since then, six more distinct "client" and "server" editions of Mac OS X have been released, the most recent being Mac OS X v10.6, which was first made available on August 28, 2009. Releases of Mac OS X are named after big cats; the current version of Mac OS X is "Snow Leopard".


3.Plan 9

 Ken Thompson, Dennis Ritchie and Douglas McIlroy at Bell Labs designed and developed the C programming language to build the operating system Unix. Programmers at Bell Labs went on to develop Plan 9 and Inferno, which were engineered for modern distributed environments. Plan 9 was designed from the start to be a networked operating system, and had graphics built-in, unlike Unix, which added these features to the design later. It is currently released under the Lucent Public License. Inferno was sold to Vita Nuova Holdings and has been released under a GPL/MIT license.

4.Linux and GNU

 

Linux is a generic name for a member in a family of operating systems that can be found on anything from supercomputers to wristwatches. Because its components are open source, anyone can read and modify its code. Because of this, it has been modified for a huge variety of electronics. It is used on only 0.5-2% of all personal computers, but it is a silent giant in the world of cell phones, servers, and embedded systems. Linux has superseded Unix in most places, and is used on the 10 most powerful supercomputers in the world.
The GNU project is a mass collaboration of programmers who seek to create a completely free and open operating system that was similar to Unix but with completely original code. It was started in 1983 by Richard Stallman, and is responsible for many of the parts of most Linux variants. For this reason, Linux is often called GNU/Linux. Thousands of pieces of software for virtually every operating system are licensed under the GNU General Public License. Meanwhile, the Linux kernel began as a side project of Linus Torvalds, a university student from Finland. In 1991, Torvalds began work on it, and posted information about his project on a newsgroup for computer students and programmers. He received a wave of support and volunteers who ended up creating a full-fledged kernel. Programmers from GNU took notice, and members of both projects worked to integrate the finished GNU parts into the linux kernel in order to create a full-fledged operating system

5.Google Chrome OS

Chrome is an operating system based on linux and designed by Google. It is currently in development, and targeted towards use in specific types of netbooks. Chrome targets computer users that spend most of their time on the internet—it is technically only a web browser with no other applications, and relies on internet applications used in the web browser to accomplish tasks such as word processing and media viewing.


THERE R MORE OS 2 TELL U GUYS.....plz  wait ..its would be shortly updated...

 ENJOY...