Sunday, August 28, 2011

Run C++ Compiler Fullscreen in Windows 7

This is a big question for those who are still using Turbo C++ Version 3.0 in Windows Vista and Win 7. As everyone knows that full screen is not supported with the version 3.0 in Vista and windows7 it is ridiculous to work in the small screen where I think no one can ever imagine writing a program there! This solution will help all the C, C++ learners using TC++ 3.0 in Vista and Windows 7.

Now lets trick this...
There are 2ways:

1. By changing the Properties

So now after opening the CMD, now click on the logo image of CMD at left top corner of the window, you wil be opened with a set of Options. Now click on Properties.

Now a window will be opened. Change the parameters as in the image:

And now goto Layout tab and change as:

Now click OK and thats it now you have a full screen CMD, now open Compiler and continue your Programming.
2. Using DOS Box tool

DOSBox is a DOS-emulator that uses the SDL-library which makes DOSBox very easy to port to different platforms. DOSBox has already been ported to many different platforms, such as Windows, BeOS, Linux, MacOS X.

So after downloading this tool you will be needed to mount the harddrive which has the Compiler in it..

First Open the DOS BOX application which will be same as our Command Prompt window.
Now type in,

MOUNT C C:\TC\BIN\

Here C is the name of the Drive and C:\TC\BIN\ is the address where the compiler is located.

Now Just type TC and hit ENTER and thats it now you have a full screen Compiler in Win7 or Win Vista.

click here to download DOS BOX

Thursday, August 18, 2011

Run Commands


appwiz.cpl -- Used to run Add/Remove wizard

Calc --Calculator

Cfgwiz32 --ISDN Configuration Wizard

Charmap --Character Map

Chkdisk --Repair damaged files

Cleanmgr --Cleans up hard drives

Clipbrd --Windows Clipboard viewer

Control --Displays Control Panel

Cmd --Opens a new Command Window

Control mouse --Used to control mouse properties

Dcomcnfg --DCOM user security

Debug --Assembly language programming tool

Defrag --Defragmentation tool

Drwatson --Records programs crash & snapshots

Dxdiag --DirectX Diagnostic Utility

Explorer --Windows Explorer

Fontview --Graphical font viewer

Fsmgmt.msc -- Used to open shared folders

Firewall.cpl -- Used to configure windows firewall

Ftp -ftp.exe program

Hostname --Returns Computer's name

Hdwwiz.cpl -- Used to run Add Hardware wizard

Ipconfig --Displays IP configuration for all network adapters

Logoff -- Used to logoff the computer

MMC --Microsoft Management Console

Msconfig --Configuration to edit startup files

Mstsc -- Used to access remote desktop

Mrc -- Malicious Software Removal Tool

Msinfo32 --Microsoft System Information Utility

Nbtstat --Displays stats and current connections using NetBIOS over TCP/IP

Netstat --Displays all active network connections

Nslookup--Returns your local DNS server

Osk ---Used to access on screen keyboard

Perfmon.msc -- Used to configure the performance of Monitor.

Ping --Sends data to a specified host/IP

Powercfg.cpl -- Used to configure power option

Regedit --Registry Editor

Regwiz -- Registration wizard

Sfc /scannow -- System File Checker

Sndrec32 --Sound Recorder

Shutdown -- Used to shutdown the windows

Spider -- Used to open spider solitaire card game

Sfc / scannow -- Used to run system file checker utility.

Sndvol32 --Volume control for soundcard

Sysedit -- Edit system startup files

Taskmgr --Task manager

Telephon.cpl -- Used to configure modem options.

Telnet --Telnet program

Tracert --Traces and displays all paths required to reach an internet host

Winchat -- Used to chat with Microsoft

Wmplayer -- Used to run Windows Media player

Wab -- Used to open Windows address Book.

WinWord -- Used to open Microsoft word

Winipcfg --Displays IP configuration

Winver -- Used to check Windows Version

Wupdmgr --Takes you to Microsoft Windows Update

Write -- Used to open WordPad
by dhrumil shah

Saturday, August 13, 2011

CRACKING windows XP users’ password.

Method 1:
If you have an administrator account (Not Guest)
then the XP users’ passwords can be reset using command prompt.
Go to the task-bar and click on the Start button, then click on run and in the place given on dialog box type “command”, press enter.
Now In the Command prompt type “net user”
the screen will display the list of users available on machine
suppose there are three administrator users with the name of admin1, admin2 and admin3

then the password of any user can be changed by logging into the account of any one administrator
for example if we want to change the password of admin1
then we can change it from the following command
net user admin1 password
similarly for other desired users
The general syntax is for changing password is
net user
Limitations: The above method will only work if you are logged in as the administrator user.
Method 2:
Windows Recovery option,
Boot from the Windows XP CD and press enter when you are prompted to Install Windows copy, on the next screen there is a repair existing Windows version. This method is also known as windows recovery method,
The repair option will take as much time as the installation would have taken because the Windows file-system is replaced including the SAM file where the password is stored.
C:WindowsSystem32configsam
whereas the users’ setting remain untouched.
Thus the users’ password is reset to NULL value.
#In repair mode you have another hole to modify the password.It is easier.The steps are as following.
Boot from xp bootable.After license agreement is done(pressing f8) select the target window for repair.
After file copy completed machine will restart.And repair process will start.You will see ‘installing devices’ 39 minutes left etc. at bottom left of your screen.
Now press Shift+f10.A console(command window) will open.
type nusrmgr.cpl and hit enter.This will let you to enter in the user account setting.Now change the password.You will not be asked for old password. Just type the new password there.
Continue the repair process.It is strongly recommended that you continue the repair until it is completed.
You are done, the password is replaced.The password strength does not matter in this case.
Method 3:
Boot your computer from a live Linux CD or DVD which has an NTFS/HPFS file-system support.
Then Mount the drive which has Windows copy installed on it. Copy the sam file on the location
C:WindowsSystem32configsam
Which will be mentioned as /media/disk-1/Windows/System32/config/sam
It is a common misconception that sam file can be viewed through normal text editor, sam file isnt a normal text file.
Gnome, KDE or vim text Editors won’t display the content of this file
Open the file using Emacs Editor (available in nearly all the distributions of Live Linux). It will be hard to find the the password hashes, so go for the user-names which are not encrypted, just after the user-names passwords’ hashes can be found out, copy the code between “%” sign and on the the Google search for the rainbow tables, They will provide the decrypted value which have already been brute-forced earlier. This is isn’t a sure shot method, as the rainbow project is still under development. The password can be set to NULL by deleting the content, but this might result in the corruption of the sam file, and recovery is the only option left after it.
Limitations: This Method can corrupt your SAM file, which may lead to a repair of Windows XP, and you can risk your personal data with that.
Method 4:
OPHcrack method.
This is a sure shot password recovery method based upon bruteforcing.
This Live CD is based upon the slax LiveCD v.5.1.7. It has been customized to include ophcrack 2.3.3 and the SSTIC04-10k tables set. It is able to crack 99.9%% of alphanumeric passwords. Since the tables have to be loaded into memory, cracking time varies with the amount of available RAM. The minimum amount of RAM required is 256MB (because the LiveCD uses a lot of it). The recommended amount is 512MB. Ophcrack will auto-detect the amout of free memory and adapts its behaviour to be able to preload all the tables it can.
A shell script launched at the beginning of the X session(Session for managing your desktop) does the job of finding the Windows partition and starting appropriate programs to extract and crack password hashes. It will look for all partitions that contains hashes. If more than one are found, you will have to choose between them.
If your partition is not detected, make sure your the partition containing the hashes you want to crack is mounted and the use ophcrack ‘Load from encrypted SAM’ function to recover your Windows hashes. Then click ‘Launch’ and the cracking process will start.
Download the ISO image of OPH crack Live Linux CD from sourceforge mirrors.
Another small application which resets the users’ password is available at

How to call your friends with their own number

With useful prank to confuse your friends. With this mobile hack, you can call your friends with their own mobile number.... meaning by, they will see their own number calling them. Just follow the guidelines I have mentioned in this mobile hack article.
Mobile hack to call your friends:

 1. Go to linkand register there for free account.

2. During registration, remember to insert Victim cell phone number in "Phone number" field as shown below.
3. Complete registration and confirm your email account id and then login to your account. Click on "Direct WebCall".




4. You will arrive at page shown below. In "Enter a number" box, select your country and also any mobile number(you can enter yours). Now, simply hit on "Call Now" button to call your friend with his own cell phone number.




5. That's it. Your friend will be shocked to see his own number calling him. I have spent last two days simply playing this cool mobile hack prank.

Thus, use this cool mobile hack to surprise and shock your friends. This mobile hack is free. So, you don't need to lose a buck. Simply register and you'll be able to perform this mobile hack. This mobile hack is available for almost all countries and all cell phones network providers.        

10 Best Data Recovery Softwares

1. Pandora Recovery Version:2.1.1,Free, www.pandorarecovery.com
2. Easeus Data Recovery Wizard Free Edition
Version: 5.5.1,Free, www.easeus.com
3. MiniTool Power Data Recovery Free Edition
Version: 6.5,Free,www.minitool.ca
4. NextBreed Data Recovery Version: 1.0, Free to try; $64.99 to buy, www.nextbreed.com
5. VirtualLab Data Recovery Version: 6.0.2.8,Free to try (10MB of recovered data); $39.95 to buy,www.binarybiz.com
6. EasyRecovery Professional
Version: 6.10, $499.00 to buy,www.ontrack.com
7. Recover Files Version: 3.27,Price: Free to try(Limited functionality); $29.95 to buy.www.UndeleteUnerase.com
8. File Recovery Assist Version: 3.0.0.38,Price: Free to try(Some features disabled); $29.95 to buy. www.sondle.com
9. Data Recovery Version: 2.3.1,Free,tokiwa.qee.jp)
10. Recover My Files
Version: 4.6.8.1012,Price: Free to try (Save-disabled); $69.95 to buy,www.getdata.com

Wednesday, August 3, 2011

Tips And Tricks To Protect Yourself From Phishing

Phishing is a variant of “ fishing ”.It is used to bait the users to give out their sensitive information such as credit card information,net banking username and passwords and other important personal and financial information.Now a days social networking sites like facebook and orkut are highly targeted sites.These attacks are mainly carried by using Emails,Instant messaging or phone calls.Phishing is a example of social engineering to fool users.In Phishing people are convinced to enter their information in spoofed sites.This is a criminal activity and a punishable offense.So,it is suggested that you should never create phishing sites and if you know about any phising site then you should report it by sending an email to “ phishing-report@us-cert.gov “ .Detecting fraudulent emails and phishing sites can be extremely difficult.Here we are giving you tips and tricks to detect these phishing sites and emails and protect your self from getting hacked.

Phishing Can Use The Following Techniques

1 Link manipulation

2 Filter evasion

3. Phone phishing


1. Link Manipulation :- In this method a misspelled url of the original website can be used of the spoofed organization.LikeHttp://www.facbook.com
http://www.faecebook.com
instead of the original address http://www.facebook.com .

The another method that can be used is the different misleading anchor tag
For example:-The URL below may seem to take you to facebook but it will take you to our homepage.You can test it by clicking on the link.

Click Here To Visit Facebook

So try to avoid clicking on links in emails.Instead type the proper address of the site yourself.

2. Filter evasion:-The main method to bring a user to a phishing site by using emails.So, to protect its users from phishing spams gmail and other email services started blocking suspected emails by looking for specific phishing content in emails.To overcome this the hackers started mailing website addresses in pictures.So now images are by default blocked by gmail and you have to enable them manually.

3. Phone Phishing:Websites and Emails are not the only methods.In phone phishing Users receive phone calls or messages requesting them to verify their information by telling the caller.Some people reveal all i important information like their net banking pin or their email passwords.It is recommended that you should never reveal your sensitive information to the caller.

If you have any queries or suggestions then don’t hesitate to comment on this article.

Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes | GreenGeeks Review