Thursday, 20 November 2014

VeraCrypt: Open Source Free Disk Encryption:

It adds enhanced security to the algorithms used for system and partitions encryption making it immune to new developments in brute-force attacks.
This is acceptable to the legitimate owner but it makes it much more harder for an attacker to gain access to the encrypted data.
VeraCrypt storage format is INCOMPATIBLE with TrueCrypt storage format. Hidden volume (steganography) and hidden operating system.  Read more


Comodo Internet Security:

Comodo Internet Security 5.5.195786
Comodo claim that their firewall is unique in that it passes all known leak tests to ensure the integrity of data entering and exiting your system. Comodo has put firewall through all kinds of sophisticated tests to ensure its firewall powerful enough to ward off these attacks with default settings. No other firewall has had to work this hard.

  •     Secures against internal and external attacks
  •     Blocks internet access to malicious Trojan programs
  •     Safeguards your Personal data against theft
  •     Delivers total end-point security for Personal Computers and Networks



Trend Micro HijackThis is a free utility that generates an in depth report of registry and file settings from your computer. HijackThis makes no separation between safe and unsafe settings in its scan results giving you the ability to selectively remove items from your machine. In addition to this scan and remove capability HijackThis comes with several tools useful in manually removing malware from a computer.
HijackThis inspects your computers browser and operating system settings to generate a log file of the current state of your computer. Using HijackThis you can selectively remove unwanted settings and files from your computer. Because the settings identified in a HijackThis log file can belong to both legitimate software and unwanted malware, it is important to use extreme caution when choosing to removing anything using HijackThis.
HijackThis also comes with a process manager, HOSTS file editor, and alternate data stream scann


Rootkit Hunter - Rootkit scanning tool

Rootkit scanner is scanning tool to ensure you for about 99.9%* you're clean of nasty tools. This tool scans for rootkits, backdoors and local exploits by running tests like:
- MD5 hash compare
- Look for default files used by rootkits
- Wrong file permissions for binaries
- Look for suspected strings in LKM and KLD modules
- Look for hidden files
- Optional scan within plaintext and binary files


Windows XP Shortcuts Keys


ALT+- (ALT+hyphen) Displays the Multiple Document Interface (MDI) child window's System menu ALT+ENTER View properties for the selected item
 ALT+ESC Cycle through items in the order they were opened ALT+F4 Close the active item, or quit the active program
ALT+SPACEBAR Display the System menu for the active window
ALT+TAB Switch between open items
ALT+Underlined letter Display the corresponding menu
BACKSPACE View the folder one level up in My Computer or Windows Explorer
 CTRL+A Select all
CTRL+I Italics
CTRL+O Open an item
CTRL+U Underline
CTRL+V Paste
CTRL+F4 Close the active document
CTRL while dragging Copy selected item
CTRL+SHIFT while dragging Create shortcut to selected iteM
CTRL+RIGHT ARROW Move the insertion point to the beginning of the next word

 CTRL+LEFT ARROW Move the insertion point to the beginning of the previous word
CTRL+DOWN ARROW Move the insertion point to the beginning of the next paragraph
 CTRL+UP ARROW Move the insertion point to the beginning of the previous paragraph
 SHIFT+DELETE Delete selected item permanently without placing the item in the Recycle Bin
 ESC Cancel the current task
F1 Displays Help
F2 Rename selected item
F3 Search for a file or folder
F4 Display the Address bar list in My Computer or Windows Explorer
F5 Refresh the active window
F6 Cycle through screen elements in a window or on the desktop
F10 Activate the menu bar in the active program
SHIFT+F10 Display the shortcut menu for the selected item
CTRL+ESC Display the Start menu
SHIFT+CTRL+ESC Launches Task Manager
SHIFT when you insert a CD Prevent the CD from automatically playing
 WIN Display or hide the Start menu
WIN+BREAK Display the System Properties dialog box
WIN+D Minimizes all Windows and shows the Desktop
WIN+E Open Windows Explorer
WIN+F Search for a file or folder
WIN+F+CTRL Search for computers
WIN+L Locks the desktop
WIN+M Minimize or restore all windows
WIN+R Open the Run dialog box
WIN+TAB Switch between open items

HIdden Run Commands

Hidden Bluetooth software in windowsXp:

Restoring a Lost Desktop-

Type a period " . "
Then press Enter
R You Playing Game In Ur pc?
Want To Do It Advance?
Try This Trick
-type joy.cpl
If ur PC is hanged then do this.

Press shift+ctrl+esc
n den click on 'END TASK'
ur PC is runing now

create folder without name

>select any folder
>rename it
>press alt & type 0160
Amazing trick for use

Windows Backup Utility if installed
go to run
type ntbackup
Now use backup

Disable CD Autorun
1) Click Start, Run and enter GPEDIT.MSC
2) Go to Computer Configuration, Administrative Templates, System.
3) Locate the entry for Turn autoplay off and modify it as you desire.

Remove the Recycle Bin from the Desktop
If you don't use the Recycle Bin to store deleted files , you can get rid of its desktop icon all together.
Run Regedit and go to:

Click on the "Recycle Bin" string in the right hand pane. Hit Del, click OK.

Hide 'User Accounts' from users
Go to Start/Run, and type:
Open the path
User Config > Admin Templates > Control Panel
doubleclick "Hide specified Control Panel applets"
put a dot in 'enabled', then click 'Show"
click Add button,
type "nusrmgt.cpl" into the add box

Turn off Welcome screen
Open User Accounts in Control Panel.
Click Change the way users log on or off

To Recover deleted or corrupt photos:

DiskInternals Flash Recovery 4.2 full download using which you can recover deleted or corrupted photos within few seconds. Isn't that nice, its best that you can recover all your deleted data from the flash memory cards used in cameras.

DiskInternals Flash Recovery is a flash memory file recovery tool that restores all corrupted and deleted photographs or the ones that were lost due to hardware malfunction. This utility works even if a memory card was re-formatted.

• Easy Recovery Wizard.
• Can preview and recover JPEG, JPG, TIFF, BMP, PNG, GIF, TGA and other images.
• Can preview and recover RAW images:
• CRW - Canon Digital Camera Raw Image Format.
• CR2 - Canon Digital Camera Raw Image Format version 2.0.
• NEF - Nikon Digital SLR Camera Raw Image File.
• PEF - Pentax Raw Image Format
• RAF - Fuji CCD-RAW Graphic File.
• X3F - Sigma Camera RAW Picture File.
• BAY - Kodak/Roper Bayer Picture Sequence.
• ORF - Descent 3 Outrage Room Format.
• MRW - Minolta Diamage Raw Image File.
• RAW - Image Alchemy HSI Temporary Raw Bitmap
• SRF - Sony DSC-F828 Raw Image File.
• Other RAW images
• Works under Microsoft® Windows® 95, 98, ME, NT, 2000, XP, 2003 Server.
• Supported file systems: FAT12, FAT16, FAT32, NTFS (NT 4), NTFS5 (2000, XP).
• Recovered files can be saved on any (including network) disks visible to the host operating system.
• Creates recovery snapshot files for logical drives. Such files can be processed like regular disks.
                           To Download
DiskInternals Flash Recovery 4.2 full download
Data recovery software download

Run Commands


Accessibility Controls
Add Hardware Wizard
Add/Remove Programs
Administrative Tools
control.exe admintools
Automatic Updates
Bluetooth Transfer Wizard
Certificate Manager
Character Map
Check Disk Utility
Clipboard Viewer
Command Prompt
Component Services
Computer Management
Date and Time Properties
DDE Shares
Device Manager
Direct X Control Panel (if installed)
Direct X Troubleshooter
Disk Cleanup Utility
Disk Defragment
Disk Management
Disk Partition Manager
Display Properties
control.exe desktop
Display Properties
Display Properties (w/Appearance Tab Preselected)
control.exe color
Dr. Watson System Troubleshooting Utility
Driver Verifier Utility
Event Viewer
File Signature Verification Tool
Folders Properties
control.exe folders
control.exe fonts
Fonts Folder
Free Cell Card Game
Game Controllers
Group Policy Editor (XP Prof)
Hearts Card Game
Iexpress Wizard
Indexing Service
Internet Properties
Java Control Panel (if installed)
Java Control Panel (if installed)
Keyboard Properties
control.exe keyboard
Local Security Settings
Local Users and Groups
Logs You Out Of Windows
Microsoft Chat
Minesweeper Game
Mouse Properties
control.exe mouse
Mouse Properties
Network Connections
control.exe netconnections
Network Connections
Network Setup Wizard
Nview Desktop Manager (if installed)
Object Packager
ODBC Data Source Administrator
On Screen Keyboard
Opens AC3 Filter (if installed)
Password Properties
Performance Monitor
Performance Monitor
Phone and Modem Options
Power Configuration
Printers and Faxes
control.exe printers
Printers Folder
Private Character Editor
Quicktime (If Installed)
Regional Settings
Registry Editor
Registry Editor
Removable Storage
Removable Storage Operator Requests
Resultant Set of Policy
Resultant Set of Policy (XP Prof)
Scanners and Cameras
Scheduled Tasks
control.exe schedtasks
Security Center
Shared Folders
Shuts Down Windows
Sounds and Audio
Spider Solitare Card Game
SQL Client Configuration
System Configuration Editor
System Configuration Utility
System File Checker Utility
System Properties
Task Manager
Telnet Client
User Account Management
Utility Manager
Windows Firewall
Windows Magnifier
Windows Management Infrastructure
Windows System Security Tool
Windows Update Launches
Windows XP Tour Wizard
Try them out..

Phishing Attacks

Here we tells about PHISHING & How can we protect from it.~!


The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surroundering private information that will be used for identity theft. The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has. The Web site, however, is bogus and set up only to steal the user’s information.



Phishing scams are not limited to the internet. Some phishers use the telephone to make requests for information. If you get a call from your banking institution asking for personal information, hang up and call your bank directly. Your bank will have your social security number and account information on file and should only ask you to verify a few digits.

like Iphone,Apple ,iTunes n more...By SMS


Congratulations! Your mobile phone has won US$ 10 Million prize money. To claim your money, call this number XXXXXXXX,give your permanent address,pin number,account number or credit card number...

The phisher can ask like it They want your personal Information.

 Some people do the reply to phisher then after he/she can be target of Phisher... so never be reply these type of Messages or Mail.


In a phishing attack, the attacker creates a situation wherein people believe that they are dealing with an authorized party, like their bank or another service provider. The attacker will ask the victim for sensitive information such as credit card information.

Phishing attacks generally target:

    * Bank information – e.g. VISA and PayPal accounts.
    * Username and password information.
    * Social Security numbers.
    * Information which can be used to retrieve forgotten or lost credentials.

Follow the tips below to protect yourself against these threats:

· Your bank will never ask you to divulge account information or passwords via email. Never give out this information, especially via email.

· Don’t open emails that come from untrusted sources.

· Don’t run files that you receive via email without making sure of their origin.

· Don’t click links in emails. If they come from a known source, type them on the browser’s address bar. If they come from an untrusted source, simply ignore them, as they could take you to a web designed to download malware onto your computer.

· Keep your computer protected. Install a security solution and keep it up-to-date.

Protect yourself from Phishing scams that could lead to identity theft. I cannot stress this enough. Phishing scams are a hot topic lately that have grown with the popularity of online banking and social networking sites like MySpace, Facebook and Friendster.

The term Phishing comes from the analogy to "fishing". The phisher uses a bait to lure victims into giving out personal information like passwords and credit card numbers. The bait is typically and urgent plea from one of the victims friends or trusted websites, asking for information to resolve some sort of problem with their account.

 Anti-phishing software is a must for anyone that accesses the internet. Most of the internet service providers have some safety measures included as part of their online security software. Most web browsers also have add-ons that can detect most phishing scams. Unfortunately, these measures are not enough. Some of the more clever phishers have found ways to trick the anti-phishing software so you need to be cautious of suspicious emails and messages.

Network Hacking

Ways To Attack a Network:
The IP address gives the attacker’s Internet address. The numerical address like does not reveal much. You can use PING to convert the address into a domain name in WINDOWS: The Domain Name Service (DNS) protocol reveals the matching domain name.  PING stands for “Packet Internet Groper” and is delivered with practically every
Internet compatible system, including all current Windows versions.
Make sure you are logged on to the net. Open the DOS shell and enter
the following PING command:
Ping –a
Ping will search the domain name and reveal it. You will often have information on the provider the attacker uses e.g.:
Pinging is normally the first step involved in hacking the target. Ping uses
ICMP (Internet Control Messaging Protocol) to determine whether the target host is reachable or not. Ping sends out ICMP Echo packets to the target host, if the target host is alive it would respond back with ICMP
Echo reply packets.
All the versions of Windows also contain the ping tool. To ping a remote host follow the procedure below.
Click Start and then click Run. Now type ping <ip address or hostname>
(For example: ping
This means that the attacker logged on using “”.
Unfortunately, there are several IP addresses that cannot be converted
into domain names.
For more parameter that could be used with the ping command, go to
DOS prompt and type ping /?.

Ping Sweep
If you are undetermined about your target and just want a live system, ping sweep is the solution for you. Ping sweep also uses ICMP to scan for live systems in the specified range of IP addresses. Though Ping sweep is similar to ping but reduces the time involved in pinging a range of IP addresses. Nmap ( also contains an option
to perform ping sweeps.

 Tracert is another interesting tool available to find more interesting information about a remote host. Tracert also uses ICMP.
Tracert helps you to find out some information about the systems involved in sending data (packets) from source to destination. To perform a tracert follow the procedure below.
Tracer connects to the computer whose IP has been entered and reveals all stations starting from your Internet connection. Both the IP address as well as the domain name (if available) is displayed.
If PING cannot reveal a name, Traceroute will possibly deliver the name of the last or second last station to the attacker, which may enable conclusions concerning the name of the provider used by the attacker and the region from which the attacks are coming.

Go to DOS prompt and type tracert <destination address> 
 (For example: tracert
But there are some tools available like Visual Traceroute which help you
even to find the geographical location of the routers involved.

Port Scanning:-
After you have determined that your target system is alive the next  important step would be to perform a port scan on the target system.
There are a wide range of port scanners available for free. But many of  them uses outdated techniques for port scanning which could be easily recognized by the network administrator. Personally I like to use Nmap ( which has a wide range of options. You can download the NmapWin and its source code from:

Apart from port scanning Nmap is capable of identifying the Operating system being used, Version numbers of various services running,
firewalls being used and a lot more.

Common ports:
Below is a list of some common ports and the respective services
running on the ports.
20 FTP data (File Transfer Protocol)
21 FTP (File Transfer Protocol)
22 SSH
23 Telnet
25 SMTP (Simple Mail Transfer Protocol)
53 DNS (Domain Name Service)
68 DHCP (Dynamic host Configuration Protocol)
79 Finger
110 POP3 (Post Office Protocol, version 3)
137 NetBIOS-ns
138 NetBIOS-dgm
139 NetBIOS
143 IMAP (Internet Message Access Protocol)
161 SNMP (Simple Network Management Protocol)
194 IRC (Internet Relay Chat)
220 IMAP3 (Internet Message Access Protocol 3)
389 LDAP
443 SSL (Secure Socket Layer)
445 SMB (NetBIOS over TCP)
Besides the above ports they are even some ports known as Trojan
ports used by Trojans that allow remote access to that system.

Vulnerability Scanning:
Every operating system or the services will have some vulnerabilities due to the
programming errors. These vulnerabilities are crucial for a successful hack. Bugtraq is
an excellent mailing list discussing the vulnerabilities in the various system. The
exploit  code writers write exploit codes to exploit these vulnerabilities existing in a system.
There are a number of vulnerability scanners available to scan the host for known vulnerabilities. These vulnerability scanners are very important for a network administrator to audit the network security.
Some of such vulnerability scanners include Shadow Security Scanner,Stealth HTTP Scanner, Nessus, etc. Visit vulnerabilities and exploit codes of various
operating systems. Packet storm security
( is also a nice pick.

Vulnerability Scanning:

Every operating system or the services will have some vulnerabilities due to the
programming errors. These vulnerabilities are crucial for a successful hack. Bugtraq is
an excellent mailing list discussing the vulnerabilities in the various system. The
exploit  code writers write exploit codes to exploit these vulnerabilities existing in a system.
There are a number of vulnerability scanners available to scan the host for known vulnerabilities. These vulnerability scanners are very important for a network administrator to audit the network security.
Some of such vulnerability scanners include Shadow Security Scanner,Stealth HTTP Scanner, Nessus, etc. Visit vulnerabilities and exploit codes of various
operating systems. Packet storm security
( is also a nice pick.

Multiple Google talk login

1. Right-click on the desktop

2. Select New
3. Select Shortcut

4. Paste this into the text box:
"c:\program files\google\google talk\googletalk.exe" /nomutex
(dont miss even a comma)
5. Click Next
6. Name it whatever: Google Talk Multiple, etc.

7. Click OK until you are done.

Yahoo Messenger trick- How to open Multiple Yahoo Messenger?

1. Go to start > Run > Type regedit > Press Enter
2. Click on the plus sign near the folder HKEY_CURRENT_USER
3. Click on the plus sign near the folder Software
4. Click on the plus sign near the folder Yahoo
5. Click on the plus sign near the folder Pager
6. Right Click on the folder name Test > New > DWORD Value
7. Right side you will get a file named New Value #1
8. Right Click on the file New Value #1 and Rename it as Plural and press enter
9. Double Click on the file Plural
10. You will get a windown named Edit DWORD Value
11. Type 1 inside 'Select the Value data' and press enter
12. Close the registery editor window
13. Now you can launch multiple windows and use different ID's.

Photobucket Trace MObile Location:


Click On Below Link To Trace Unknown Number ->

Trace Mobile Location


Trace Mobile Location


Get USER info of any reliance No.




Get USER info of any reliance No.

1. Enter the number of whom u want details..

2. Enter any fake email id.

3. And then click Continue.

And now u will get a screen with the number and customer name.

Note :-
Please Dont misuse or over use it :|

Learn TCP/IP

-: IP Spoofing :-

The term IP (Internet Protocol) address spoofing refers to the creation of IP packets with a forged (spoofed) source IP address with the purpose of concealing the identity of the sender or impersonating another computing system.

For Check Your IP Address..

for see another IP address

Why it works ?
IP-Spoofing works because trusted services only rely on network address based authentication. Since IP is easily duped, address forgery is not difficult.
The main reason is security weakness in the TCP protocol known as sequence number prediction.

How it works ?
To completely understand how ip spoofing can take place, one must examine the structure of the TCP/IP protocol suite. A basic understanding of these headers and network exchanges is crucial to the process.


Internet Protocol (IP) :
It is a network protocol operating at layer 3 (network) of the OSI model. It is a connectionless model, meaning there is no information regarding transaction state, which is used to route packets on a network. Additionally, there is no method in place to ensure that a packet is properly delivered to the destination.

Your Browser and Server use TCP/IP
Browsers and servers use TCP/IP to connect to the Internet.
A browser uses TCP/IP to access a server. A server uses TCP/IP to send HTML back to a browser.

Your E-Mail uses TCP/IP
Your e-mail program uses TCP/IP to connect to the Internet for sending and receiving e-mails.

Your Internet Address is TCP/IP
Your Internet address "" is a part of the standard TCP/IP protocol (and so is your domain name).

What is TCP/IP?
TCP/IP is the communication protocol for communication between computers on the Internet.
TCP/IP stands for Transmission Control Protocol / Internet Protocol.
TCP/IP defines how electronic devices (like computers) should be connected to the Internet, and how data should be transmitted between them.

Inside TCP/IP
Inside the TCP/IP standard there are several protocols for handling data communication:
  • TCP (Transmission Control Protocol) communication between applications
  • UDP (User Datagram Protocol) simple communication between applications
  • IP (Internet Protocol) communication between computers
  • ICMP (Internet Control Message Protocol) for errors and statistics
  • DHCP (Dynamic Host Configuration Protocol) for dynamic addressing

TCP Uses a Fixed Connection
TCP is for communication between applications.
If one application wants to communicate with another via TCP, it sends a communication request. This request must be sent to an exact address. After a "handshake" between the two applications, TCP will set up a "full-duplex" communication between the two applications.
The "full-duplex" communication will occupy the communication line between the two computers until it is closed by one of the two applications.
UDP is very similar to TCP, but simpler and less reliable.

IP is Connection-Less
IP is for communication between computers.
IP is a "connection-less" communication protocol.
IP does not occupy the communication line between two computers. IP reduces the need for network lines. Each line can be used for communication between many different computers at the same time.
With IP, messages (or other data) are broken up into small independent "packets" and sent between computers via the Internet.
IP is responsible for "routing" each packet to the correct destination.


IP Routers
When an IP packet is sent from a computer, it arrives at an IP router.
The IP router is responsible for "routing" the packet to the correct destination, directly or via another router.
The path the packet will follow might be different from other packets of the same communication. The router is responsible for the right addressing, depending on traffic volume, errors in the network, or other parameters.

Connection-Less Analogy

Communicating via IP is like sending a long letter as a large number of small postcards, each finding its own (often different) way to the receiver.

TCP/IP is TCP and IP working together.
TCP takes care of the communication between your application software (i.e. your browser) and your network software.
IP takes care of the communication with other computers.
TCP is responsible for breaking data down into IP packets before they are sent, and for assembling the packets when they arrive.
IP is responsible for sending the packets to the correct destination.

IP Addresses
Each computer must have an IP address before it can connect to the Internet.
Each IP packet must have an address before it can be sent to another computer.
IP addess is the identity of computer or website.

Domain Names
A name is much easier to remember than a 12 digit number.
Names used for TCP/IP addresses are called domain names. is a domain name.
When you address a web site, like, the name is translated to a number by a Domain Name Server (DNS).

All over the world, DNS servers are connected to the Internet. DNS servers are responsible for translating domain names into TCP/IP addresses.
When a new domain name is registered together with a TCP/IP address, DNS servers all over the world are updated with this information.
TCP - Transmission Control Protocol
TCP is used for transmission of data from an application to the network.
TCP is responsible for breaking data down into IP packets before they are sent, and for assembling the packets when they arrive.

IP - Internet Protocol
IP takes care of the communication with other computers.
IP is responsible for the sending and receiving data packets over the Internet.

HTTP - Hyper Text Transfer Protocol
HTTP takes care of the communication between a web server and a web browser.
HTTP is used for sending requests from a web client (a browser) to a web server, returning web content (web pages) from the server back to the client.

HTTPS takes care of secure communication between a web server and a web browser.
HTTPS typically handles credit card transactions and other sensitive data.

SSL - Secure Sockets Layer
The SSL protocol is used for encryption of data for secure data transmission.

SMTP - Simple Mail Transfer Protocol
SMTP is used for transmission of e-mails.

MIME - Multi-purpose Internet Mail Extensions
The MIME protocol lets SMTP transmit multimedia files including voice, audio, and binary data across TCP/IP networks.

IMAP - Internet Message Access Protocol
IMAP is used for storing and retrieving e-mails.

POP - Post Office Protocol
POP is used for downloading e-mails from an e-mail server to a personal computer.

FTP - File Transfer Protocol
FTP takes care of transmission of files between computers.

NTP - Network Time Protocol
NTP is used to synchronize the time (the clock) between computers.

DHCP - Dynamic Host Configuration Protocol
DHCP is used for allocation of dynamic IP addresses to computers in a network.

SNMP - Simple Network Management Protocol
SNMP is used for administration of computer networks.

LDAP - Lightweight Directory Access Protocol
LDAP is used for collecting information about users and e-mail addresses from the internet.

ICMP - Internet Control Message Protocol
ICMP takes care of error-handling in the network.

ARP - Address Resolution Protocol
ARP is used by IP to find the hardware address of a computer network card based on the IP address.

RARP - Reverse Address Resolution Protocol
RARP is used by IP to find the IP address based on the hardware address of a computer network card.

BOOTP - Boot Protocol
BOOTP is used for booting (starting) computers from the network.

PPTP - Point to Point Tunneling Protocol
PPTP is used for setting up a connection (tunnel) between private networks.

When you write an email, you don't use TCP/IP.
When you write an email, you use an email program like Lotus Notes, Microsoft Outlook or Netscape Communicator.

Your Email Program Does
Your email program uses different TCP/IP protocols:
  • It sends your emails using SMTP
  • It can download your emails from an email server using POP
  • It can connect to an email server using IMAP

SMTP - Simple Mail Transfer Protocol
The SMTP protocol is used for the transmission of e-mails. SMTP takes care of sending your email to another computer.
Normally your email is sent to an email server (SMTP server), and then to another server or servers, and finally to its destination.
SMTP can only transmit pure text. It cannot transmit binary data like pictures, sounds or movies.
SMTP uses the MIME protocol to send binary data across TCP/IP networks. The MIME protocol converts binary data to pure text.

POP - Post Office Protocol
The POP protocol is used by email programs (like Microsoft Outlook) to retrieve emails from an email server.
If your email program uses POP, all your emails are downloaded to your email program (also called email client), each time it connects to your email server.

IMAP - Internet Message Access Protocol
The IMAP protocol is used by email programs (like Microsoft Outlook) just like the POP protocol.
The main difference between the IMAP protocol and the POP protocol is that the IMAP protocol will not automatically download all your emails each time your email program connects to your email server.

The IMAP protocol allows you to look through your email messages at the email server before you download them. With IMAP you can choose to download your messages or just delete them. This way IMAP is perfect if you need to connect to your email server from different locations, but only want to download your messages when you are back in your office.