Saturday 5 November 2011

dont use cyber cafe when.........risk of privacy

dear frnds,,,,,mst read dis....
Dear friends, If you visit a cyber cafe and find find any black pin attached to your CPU as shown in the picture, kindly do not use that system. This pin is actually a connection which save all your data you enter in the system.
Thus it is a risk to your privacy over net. Risk to passwords, banking or any data you entered.
Itz a hardware keylogger very powerful it records each and every action ur system.
Like and then share this to all your friends..........

Tuesday 11 October 2011

Privacy Attacks :-Privacy Attacks :-Privacy Attacks :-

-: Privacy Attacks :-


Here attacker uses various automated tools which are freely available on the internet. Some of them are as follows:

1) Trojan :- Trojan is a Remote Administration Tool (RAT) which enable attacker to execute various software and hardware instructions on the target system.

Most trojans consist of two parts -
a) The Server Part :- It has to be installed on the the victim's computer.
b) The Client Part :- It is installed on attacker's system. This part gives attacker complete control over target computer.

Netbus, Girlfriend, sub7, Beast, Back Orifice are some of the popular trojans.

2) Keylogger :- Keyloggers are the tools which enable attacker to record all the keystrokes made by victim and send it's logs secretly to the attacker's e-mail address which is previously set by him.

Almost all the Trojans have keylogging function.

Use of latest updated antirus-firewall, detect the presence of trojan and remove it permanently.

3) Spyware :- Spyware utilities are the malicious programs that spy on the activities of victim, and covertly pass on the recorded information to the attacker without the victim's consent. Most spyware utilities monitor and record the victim's internet-surfing habits. Typically, a spyware tool is built into a host .exe file or utility. If a victim downloads and executes an infected .exe file, then the spyware becomes active on the victim's system.
Spyware tools can be hidden both in .exe files an even ordinary cookie files.
Most spyware tools are created and released on the internet with the aim of collecting useful information about a large number of Internet users for marketing and advertising purposes. On many occasions, attacker also use spyware tools for corporate espionage and spying purposes.

4) Sniffer :- Sniffers were originally developed as a tool for debugging/troubleshooting network problems.
The Ethernet based sniffer works with network interface card (NIC) to capture interprete and save the data packets sent across the network.
Sniffer can turn out to be quite dangerous. If an attacker manages to install a sniffer on your system or the router of your network, then all data including passwords, private messages, company secrets, etc. get captured.

DOS

-: Denial Of Service (DoS) Attacks :-


A denial of service (DoS) attack is an attack that clogs up so much memory on the target system that it can not serve it's users, or it causes the target system to crash, reboot, or otherwise deny services to legitimate users.There are several different kinds of dos attacks as discussed below:-

1) Ping Of Death :- The ping of death attack sends oversized ICMP datagrams (encapsulated in IP packets) to the victim.The Ping command makes use of the ICMP echo request and echo reply messages and it's commonly used to determine whether the remote host is alive. In a ping of death attack, however, ping causes the remote system to hang, reboot or crash. To do so the attacker uses, the ping command in conjuction with -l argument (used to specify the size of the packet sent) to ping the target system that exceeds the maximum bytes allowed by TCP/IP (65,536).
example:- c:/>ping -l 65540 hostname
Fortunately, nearly all operating systems these days are not vulnerable to the ping of death attack.

2) Teardrop Attack :- Whenever data is sent over the internet, it is broken into fragments at the source system and reassembled at the destination system. For example you need to send 3,000 bytes of data from one system to another. Rather than sending the entire chunk in asingle packet, the data is broken down into smaller packets as given below:
* packet 1 will carry bytes 1-1000.
* packet 2 will carry bytes 1001-2000.
* packet 3 will carry bytes 2001-3000.
In teardrop attack, however, the data packets sent to the target computer contais bytes that overlaps with each other.
(bytes 1-1500) (bytes 1001-2000) (bytes 1500-2500)
When the target system receives such a series of packets, it can not reassemble the data and therefore will crash, hang, or reboot.
Old Linux systems, Windows NT/95 are vulnerable.

3) SYN - Flood Attack :- In SYN flooding attack, several SYN packets are sent to the target host, all with an invalid source IP address. When the target system receives these SYN packets, it tries to respond to each one with a SYN/ACK packet but as all the source IP addresses are invalid the target system goes into wait state for ACK message to receive from source. Eventually, due to large number of connection requests, the target systems' memory is consumed. In order to actually affect the target system, a large number of SYN packets with invalid IP addresses must be sent.

4) Land Attack :- A land attack is similar to SYN attack, the only difference being that instead of including an invalid IP address, the SYN packet include the IP address of the target sysetm itself. As a result an infinite loop is created within the target system, which ultimately hangs and crashes.Windows NT before Service Pack 4 are vulnerable to this attack.

5) Smurf Attack :- There are 3 players in the smurf attack–the attacker,the intermediary (which can also be a victim) and the victim. In most scenarios the attacker spoofs the IP source address as the IP of the intended victim to the intermediary network broadcast address. Every host on the intermediary network replies, flooding the victim and the intermediary network with network traffic.
Smurf Attack Result:- Performance may be degraded such that the victim, the victim and intermediary networks become congested and unusable, i.e. clogging the network and preventing legitimate users from obtaining network services.

6) UDP - Flood Attack :- Two UDP services: echo (which echos back any character received) and chargen (which generates character) were used in the past for network testing and are enabled by default on most systems. These services can be used to launch a DOS by connecting the chargen to echo ports on the same or another machine and generating large amounts of network traffic.

: Input Validation Attacks :-

-: Input Validation Attacks :-


Input Validation Attacks are where an attacker intentionally sends unusual input in the hopes of confusing the application.
The most common input validation attacks are as follows-

1) Buffer Overflow :- Buffer overflow attacks are enabled due to sloppy programming or mismanagement of memory by the application developers. Buffer overflow may be classified into stack overflows, format string overflows, heap overflows and integer overflows. It may possible that an overflow may exist in language’s (php, java, etc.) built-in functions.
To execute a buffer overflow attack, you merely dump as much data as possible into an input field. The attack is said to be successful when it returns an application error. Perl is well suited for conducting this type of attack.
Here’s the buffer test, calling on Perl from the command line:
$ echo –e “GET /login.php?user=\
> `perl –e ‘print “a” x 500’`\nHTTP/1.0\n\n” | \
nc –vv website 80
This sends a string of 500 “a” characters for the user value to the login.php file.
Buffer overflow can be tested by sending repeated requests to the application and recording the server's response.

2) Canonicalization :- These attacks target pages that use template files or otherwise reference alternate files on the web server. The basic form of this attack is to move outside of the web document root in order to access system files, i.e., “../../../../../../../../../boot.ini”. This type of functionality is evident from the URL and is not limited to any one programming language or web server. If the application does not limit the types of files that it is supposed to view, then files outside of the web document root are targeted, something like following-
/menu.asp?dimlDisplayer=menu.asp
/webacc?User.asp=login.htt
/SWEditServlet?station_path=Z&publication_id=2043&template=login.tem
/Getfile.asp?/scripts/Client/login.js
/includes/printable.asp?Link=customers/overview.htm

3) Cross-site Scripting (XSS) :- Cross-site scripting attacks place malicious code, usually JavaScript, in locations where other users see it. Target fields in forms can be addresses, bulletin board comments, etc.
We have found that error pages are often subject to XSS attacks. For example, the URL for a normal application error looks like this:
http://website/inc/errors.asp?Error=Invalid%20password
This displays a custom access denied page that says, “Invalid password”. Seeing a string
on the URL reflected in the page contents is a great indicator of an XSS vulnerability. The attack would be created as:
http://website/inc/errors.asp?Error=<script%20src=...
That is, place the script tags on the URL.

4) SQL Injection :- This kind of attack occurs when an attacker uses specially crafted SQL queries as an input, which can open up a database. Online forms such as login prompts, search enquiries, guest books, feedback forms, etc. are specially targeted.
The easiest test for the presence of a SQL injection attack is to append “or+1=1” to the URL and inspect the data returned by the server.
example:- http://www.domain.com/index.asp?querystring=sports' or 1=1--

-: Wireless Hacking :


-: Wireless Hacking :-


Wireless networks broadcast their packets using radio frequency or optical wavelengths. A modern laptop computer can listen in. Worse, an attacker can manufacture new packets on the fly and persuade wireless stations to accept his packets as legitimate.
The step by step procerdure in wireless hacking can be explained with help of different topics as follows:-

1) Stations and Access Points :- A wireless network interface card (adapter) is a device, called a station, providing the network physical layer over a radio link to another station.
An access point (AP) is a station that provides frame distribution service to stations associated with it.
The AP itself is typically connected by wire to a LAN. Each AP has a 0 to 32 byte long Service Set Identifier (SSID) that is also commonly called a network name. The SSID is used to segment the airwaves for usage.

2) Channels :- The stations communicate with each other using radio frequencies between 2.4 GHz and 2.5 GHz. Neighboring channels are only 5 MHz apart. Two wireless networks using neighboring channels may interfere with each other.

3) Wired Equivalent Privacy (WEP) :- It is a shared-secret key encryption system used to encrypt packets transmitted between a station and an AP. The WEP algorithm is intended to protect wireless communication from eavesdropping. A secondary function of WEP is to prevent unauthorized access to a wireless network. WEP encrypts the payload of data packets. Management and control frames are always transmitted in the clear. WEP uses the RC4 encryption algorithm.

4) Wireless Network Sniffing :- Sniffing is eavesdropping on the network. A (packet) sniffer is a program that intercepts and decodes network traffic broadcast through a medium. It is easier to sniff wireless networks than wired ones. Sniffing can also help find the easy kill as in scanning for open access points that allow anyone to connect, or capturing the passwords used in a connection session that does not even use WEP, or in telnet, rlogin and ftp connections.

5 ) Passive Scanning :- Scanning is the act of sniffing by tuning to various radio channels of the devices. A passive network scanner instructs the wireless card to listen to each channel for a few messages. This does not reveal the presence of the scanner. An attacker can passively scan without transmitting at all.

6) Detection of SSID :- The attacker can discover the SSID of a network usually by passive scanning because the SSID occurs in the following frame types: Beacon, Probe Requests, Probe Responses, Association Requests, and Reassociation Requests. Recall that management frames are always in the clear, even when WEP is enabled.
When the above methods fail, SSID discovery is done by active scanning

7) Collecting the MAC Addresses :- The attacker gathers legitimate MAC addresses for use later in constructing spoofed frames. The source and destination MAC addresses are always in the clear in all the frames.

8) Collecting the Frames for Cracking WEP :- The goal of an attacker is to discover the WEP shared-secret key. The attacker sniffs a large number of frames An example of a WEP cracking tool is AirSnort ( http://airsnort.shmoo.com ).

9) Detection of the Sniffers :- Detecting the presence of a wireless sniffer, who remains radio-silent, through network security measures is virtually impossible. Once the attacker begins probing (i.e., by injecting packets), the presence and the coordinates of the wireless device can be detected.

10) Wireless Spoofing :- There are well-known attack techniques known as spoofing in both wired and wireless networks. The attacker constructs frames by filling selected fields that contain addresses or identifiers with legitimate looking but non-existent values, or with values that belong to others. The attacker would have collected these legitimate values through sniffing.

11) MAC Address Spoofing :- The attacker generally desires to be hidden. But the probing activity injects frames that are observable by system administrators. The attacker fills the Sender MAC Address field of the injected frames with a spoofed value so that his equipment is not identified.

12) IP spoofing :- Replacing the true IP address of the sender (or, in rare cases, the destination) with a different address is known as IP spoofing. This is a necessary operation in many attacks.

13) Frame Spoofing :- The attacker will inject frames that are valid but whose content is carefully spoofed.

14) Wireless Network Probing :-
The attacker then sends artificially constructed packets to a target that trigger useful responses. This activity is known as probing or active scanning.

15) AP Weaknesses :-
APs have weaknesses that are both due to design mistakes and user interfaces

16) Trojan AP :- An attacker sets up an AP so that the targeted station receives a stronger signal from it than what it receives from a legitimate AP.

17) Denial of Service :- A denial of service (DoS) occurs when a system is not providing services to authorized clients because of resource exhaustion by unauthorized clients. In wireless networks, DoS attacks are difficult to prevent, difficult to stop. An on-going attack and the victim and its clients may not even detect the attacks. The duration of such DoS may range from milliseconds to hours. A DoS attack against an individual station enables session hijacking.

18) Jamming the Air Waves :- A number of consumer appliances such as microwave ovens, baby monitors, and cordless phones operate on the unregulated 2.4GHz radio frequency. An attacker can unleash large amounts of noise using these devices and jam the airwaves so that the signal to noise drops so low, that the wireless LAN ceases to function.

19) War Driving :- Equipped with wireless devices and related tools, and driving around in a vehicle or parking at interesting places with a goal of discovering easy-to-get-into wireless networks is known as war driving. War-drivers (http://www.wardrive.net) define war driving as “The benign act of locating and logging wireless access points while in motion.” This benign act is of course useful to the attackers.
Regardless of the protocols, wireless networks will remain potentially insecure because an attacker can listen in without gaining physical access.

Tips for Wireless Home Network Security

1) Change Default Administrator Passwords (and Usernames)
2) Turn on (Compatible) WPA / WEP Encryption
3) Change the Default SSID
4) Disable SSID Broadcast
5) Assign Static IP Addresses to Devices
6) Enable MAC Address Filtering
7) Turn Off the Network During Extended Periods of Non-Use
8) Position the Router or Access Point Safely

-: EMail Hacking :-


-: EMail Hacking :-


All email communications on the internet are possible by two protocols:
1) Simple Mail Transfer Protocol (SMTP port-25)
2) Post Office Protocol (POP port-110)

E-Mail hacking consists of various techniques as discussed below.

1) EMail Tracing :- Generally, the path taken by an email while travelling from sender to receiver can be explained by following diagram.

Mail-Path


The most effective and easiest way to trace an email is to analyze it's email headers. This can be done by just viewing the full header of received email. A typical email header looks something like this:



The above email header gives us the following information about it's origin and path:

a) Sender's email address :- atiles@destatis.de

b) Source IP address :- 141.203.33.92

c) Source mail server :- dsl-189-160-34-89.prod-infinitum.com.mx

d) Email client :- Thunderbird 2.0.0.6

-: Password Hacking :-

-: Password Hacking :-


Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password.
Most passwords can be cracked by using following techniques :

1) Hashing :- Here we will refer to the one way function (which may be either an encryption function or cryptographic hash) employed as a hash and its output as a hashed password.
If a system uses a reversible function to obscure stored passwords, exploiting that weakness can recover even 'well-chosen' passwords.
One example is the LM hash that Microsoft Windows uses by default to store user passwords that are less than 15 characters in length.
LM hash breaks the password into two 7-character fields which are then hashed separately, allowing each half to be attacked separately.

Hash functions like SHA-512, SHA-1, and MD5 are considered impossible to invert when used correctly.


2) Guessing :- Many passwords can be guessed either by humans or by sophisticated cracking programs armed with dictionaries (dictionary based) and the user's personal information. Not surprisingly, many users choose weak passwords, usually one related to themselves in some way. Repeated research over some 40 years has demonstrated that around 40% of user-chosen passwords are readily guessable by programs. Examples of insecure choices include:
* blank (none)
* the word "password", "passcode", "admin" and their derivatives
* the user's name or login name
* the name of their significant other or another person (loved one)
* their birthplace or date of birth
* a pet's name
* a dictionary word in any language
* automobile licence plate number
* a row of letters from a standard keyboard layout (eg, the qwerty keyboard -- qwerty itself, asdf, or qwertyuiop)
* a simple modification of one of the preceding, such as suffixing a digit or reversing the order of the letters.
and so on....
In one survery of MySpace passwords which had been phished, 3.8 percent of passwords were a single word found in a dictionary, and another 12 percent were a word plus a final digit; two-thirds of the time that digit was.
A password containing both uppercase &  lowercase characters, numbers and special characters too; is a strong password and can never be guessed.


Check Your Password Strength



3) Default Passwords :- A moderately high number of local and online applications have inbuilt default passwords that have been configured by programmers during development stages of software. There are lots of applications running on the internet on which default passwords are enabled. So, it is quite easy for an attacker to enter default password and gain access to sensitive information. A list containing default passwords of some of the most popular applications is available on the internet.
Always disable or change the applications' (both online and offline) default username-password pairs.

4) Brute Force :- If all other techniques failed, then attackers uses brute force password cracking technique. Here an automatic tool is used which tries all possible combinations of available keys on the keyboard. As soon as correct password is reached it displays on the screen.This techniques takes extremely long time to complete, but password will surely cracked.
Long is the password, large is the time taken to brute force it.

5) Phishing :- This is the most effective and easily executable password cracking technique which is generally used to crack the passwords of e-mail accounts, and all those accounts where secret information or sensitive personal information is stored by user such as social networking websites, matrimonial websites, etc.
Phishing is a technique in which the attacker creates the fake login screen and send it to the victim, hoping that the victim gets fooled into entering the account username and password. As soon as victim click on "enter" or "login" login button this information reaches to the attacker using scripts or online form processors while the user(victim) is redirected to home page of e-mail service provider.
Never give reply to the messages which are demanding for your username-password, urging to be e-mail service provider.

It is possible to try to obtain the passwords through other different methods, such as social engineering, wiretapping, keystroke logging, login spoofing, dumpster diving, phishing, shoulder surfing, timing attack, acoustic cryptanalysis, using a Trojan Horse or virus, identity management system attacks (such as abuse of Self-service password reset) and compromising host security.
However, cracking usually designates a guessing attack.

Network Hacking :

-: Network Hacking :-


Network Hacking is generally means gathering information about domain by using tools like Telnet, NslookUp, Ping, Tracert, Netstat, etc.
It also includes OS Fingerprinting, Port Scaning and Port Surfing using various tools.

Ping :- Ping is part of ICMP (Internet Control Message Protocol) which is used to troubleshoot TCP/IP networks. So, Ping is basically a command that allows you to check whether the host is alive or not.
To ping a particular host the syntax is (at command prompt)--
c:/>ping hostname.com

example:- c:/>ping www.google.com


Various attributes used with 'Ping' command and their usage can be viewed by just typing c:/>ping at the command prompt.


Netstat :- It displays protocol statistics and current TCP/IP network connections. i.e. local address, remote address, port number, etc.
It's syntax is (at command prompt)--
c:/>netstat -n



Telnet :- Telnet is a program which runs on TCP/IP. Using it we can connect to the remote computer on particular port. When connected it grabs the daemon running on that port.
The basic syntax of Telnet is (at command prompt)--
c:/>telnet hostname.com

By default telnet connects to port 23 of remote computer.
So, the complete syntax is-
c:/>telnet www.hostname.com port

example:- c:/>telnet www.yahoo.com 21 or c:/>telnet 192.168.0.5 21


Tracert :- It is used to trace out the route taken by the certain information i.e. data packets from source to destination.
It's syntax is (at command prompt)--
c:/>tracert www.hostname.com
example:- c:/>tracert www.insecure.in



Here "*    *    *    Request timed out." indicates that firewall installed on that system block the request and hence we can't obtain it's IP address.

various attributes used with tracert command and their usage can be viewed by just typing c:/>tracert at the command prompt.

The information obtained by using tracert command can be further used to find out exact operating system running on target system.

Monday 10 October 2011

3g mobile of nokia

Play it like it’s LIVE!


Get it Now

Model: Nokia X7-00

  • High-definition gaming experience

    Nokia X7 smartphone with apps and games from Ovi Store

    All your favourite HD games for free

    Stack your device with Need for Speed Shift, Assassin’s Creed & many other HD games from Ovi Store.
    Explore Games
  • 4” AMOLED touch screen

    Nokia X7 smartphone with a 4" touch screen

    A beautifully unique design

    The brushed stainless steel finish, distinctive lines and 4” touch screen come together to create something special and truly unique.
  • Always connected 24/7

    Nokia X7 smartphone with email and social networks

    Integrated email & social networks

    Emails straight to your home screen from your personal and work accounts and live 24/7 Facebook and Twitter feeds.

8 ways to make your desktop look beautiful


msn-wallpaper
MSN Wallpaper gives you over 100 high resolution wallpapers
Want to make your Windows desktop look better in just a few minutes? Our sister magazine Windows Vista: The Official Magazine has come up with eight ways to get a better looking desktop.
Try these methods yourself and say goodbye to boring desktops!
1. Get a constantly changing background
A great Microsoft application which lets you cycle between wallpapers automatically, meaning your desktop is always looking fresh and new. What's more MSN Wallpaper gives you over 100 high resolution wallpapers to get you started.
2. Clean up those icons
Icons can look great, but the annoying text doesn't do them any favours, so here's how to get rid of unsightly words forever:
Right click on an icon and click on Rename. Then using the number pad on the right-hand side of your keyboard, hold down the ALT key and type in numbers 255 and press enter. For the next icon write 255 twice, and so on until your desktop is text free. For a full guide on how to do this go to Nick's tutorial.
3. Download a dock
If you like the look of the Apple side of the PC spectrum, there are plenty of ways to recreate this on your PC. ObjectDock and the impressive CircleDock are great places to start.
4. The ultimate background
Windows Vista Ultimate users can take advantage of a great selection of looping movie backgrounds called DreamScenes. There are loads available now, and there's no better way to bring some "Wow" to your desktop. If you're not running Windows Vista Ultimate then there are moving desktops available to download from StarDock.
5. Get even more wallpapers
You can't have too many wallpapers, and there are some beautiful ones available for free on the internet. Artist Dan Proops created some great free abstract wallpapers, VladStudio has a wide range of funky desktop offerings and Hamad Darwish released some the stunning photos which didn't make it to the final release of Windows Vista.
6. Move the Sidebar
If you fancy making your desktop look a little different, then why not move it round. You can have your Sidebar on the left of your screen if you want to mix things up a little bit.
7. Style your Sidebar
There's not many customization options for the Windows Sidebar but a neat little application called Windows Sidebar Styler lets you resize your sidebar, and play around with many of the options.
8. Clean your desktop
The How-to Geek has posted an excellent guide on how to make a button to toggle your desktop icons. If your screen looks unsightly this is a great way to sweep it under the carpet with a single click, and maintain the tidiest of desktops.

How Well Does PCMaid Clean Your Computer?

PCMaid from DOF Soft is designed to rid your PC of dangerous programs which can infect your hard drive. Malicious files can damage your computer, using tools like Trojan horses, tracking cookies, keystroke loggers, browser hijackers, and rootkits. This system can protect your desktop or laptop from these threats to computer security and stability.
Malware files take up valuable space on your hard drive, and cleaning them out can increase system speed and efficiency. This software finds the programs taking up room and performing suspicious functions and eliminates them. Scammers can also use malicious files to steal credit card and identity data, leaving users vulnerable to fraud or identity theft. Downloading this product will protect your sensitive personal information, giving you peace of mind as you surf the internet.
PCMaid comes with a choice of interfaces, for both advanced and beginning users. The company also offers a free trial version for potential customers to try out its functions at their own convenience. Positive reviews praise it for its speed, detection rate, and the wide variety of functions that it performs.
There are some possible drawbacks to this program, however. The free trial version has some limitations, so users might not be able to remove possible threats without purchasing the full upgrade. Some people could see this as a scare tactic to drive up sales, which brings into question the publisher’s credibility.
Another serious concern about PCMaid is the age of the software. The most recent version was published a number of years ago, and as such, might not be compatible with the latest versions of Windows. Users with more modern computers are likely to have one of the newer Windows platforms, usually Vista or Windows 7, and could find themselves open to more modern spyware threats.

yahoo massenger hacking tips

**********

_____________________Yahoo messenger has been one of the most popular and feature-ful online chat clients the world has seen. With plenty of options and buddies around, you can not just leave Yahoo Messenger once you have grown used to it. But where there is crowd, there are risk factors too. Alarmingly people have lost their accounts to hackers and have got millions of spyware and junk mails thanks to Yahoo messenger and its spam friendly technology. How do you get the best out of your chat buddy without risking your account? Well, here is a complete guide that will help.

1. Avoid P2P file Sharing Through Yahoo Messenger
2. Avoid Clicking on Spammy Links
3. Use Ignore Option Effectively
 
4. Use other yahoo 3rd party Chat Clients
5. Always Use Newer Versions of Yahoo Messenger
6. Don't download Yahoo Plug-ins from Unauthorized source
7. Use Proxy if you have a Better Firewall 
8. Use Word Filter 
*******You can change it by going to Yahoo Messenger main box -> Preferences -> Chat.**************
9. Be sure to Delete Your Profile after Chatting from a Public computer 
10. Apply Your Common sense and Use a good Antivirus and anti spyware software

Sunday 9 October 2011

What's New in 2011 New Yamaha R15 Version 2.0

What's New in 2011 New Yamaha R15 Version 2.0
- All new engine fairing which looks very sporty
- New alloy wheels further enhances the looks of the bike
- Proper split seat which is anti-slip and better cushioned
- New decals/graphics which are now in white shade
- Fat rear tyre - 130/70 - R17 (finally, they have done it)
- All-new LED tail light which looks much better than last generation model
- New ECU mapping for better acceleration and mileage
- Bigger 220mm rear disc for improved braking
- Weight increased by 5kgs (now it weighs 136kgs)
- New design for saree guard and mudguard
- First 150cc Indian bike to feature aluminium swingarm

New Yamaha R15 - Gets Design Cues From R1


Overview of 2011 New Yamaha R15 Version 2.0
Yamaha R15 was the first model for the Indian market designed in the true supersport image and featuring a high-level balance of enjoyable running performance on winding roads. Now, Yamaha India has launched 2011 model of Yamaha R15, which is priced at Rs. 1.07 lakhs (ex-showroom New Delhi). The company is promoting it as 'R15 Version 2.0', which resembles to R1, to some extent. Previously, it was expected to be launched in April, then in July, finally New Yamaha R15 version 2.0 is here, it is one of the most awaited bikes of 2011. But the sad part is that New R15 Version 2.0's specifications are exactly the same in comparison to R15 Version 1.0 except the kerb weight which is now 136 kgs. The engine displacement, maximum power and maximum torque figures are same. Yamaha fans would be feeling very disappointed with this because they were waiting for R15 Version 2.0 from 10-12 months and it was expected that power will be increased from 16.8 bhp to 20-22 bhp and torque from 15 nm to 18-19 nm but Yamaha India has kept all the technical specifications intact.
According to Yamaha India while maintaining the proven ease of handling of the R15 version 1.0, the R15 version 2.0 boasts of spruced up looks and better performance in circuit riding. The design elements are borrowed from the supersport model YZF-R1 that is adapted from YZR-M1 MotoGP race machine. The R15 version 2.0 has undergone changes as compared to the present YZF-R15 in the specs of the Engine Control unit (ECU), drivetrain unit, a long aluminum swing arm, wider front and rear tires (radial tire for the rear), split seat, LED taillights and new-design middle cowl & tail cowl. On sales target, Mr Roy Kurian, National Business Head, said: “We aim to sell 5.3 lakh bikes by this fiscal. For YZF-R15, our target is 3,000 bikes per month