Sunday, September 4, 2011

HOW TO Hide partitions without using any software

Go to Start->Run.  Type DISKPART and press Enter. In the console type list volume to see all the drives available on your PC. Now select the drive which you want to hide. Suppose you want to hide D see the volume number opposite to Ltr D. In My PC it is volume 4 for drive D(might be different in your computer) . Now to hide drive D type Select volume 4 .(Select the appropriate number according to your system) Then type remove letter d , this will hide your drive. Now to get your drive back type Select volume 4 and then type assign letter d . See this image This normally works for all drives but may not work for system drives(The drive in which your OS is loade...

inSSIDer – Wi-Fi Network Scanner For Windows

inSSIDer is an award-winning free Wi-Fi network scanner for Windows Vista and Windows XP. Because NetStumbler doesn’t work well with Vista and 64-bit XP, an open-source Wi-Fi network scanner designed for the current generation of Windows operating systems. What’s Unique about inSSIDer? Use Windows Vista and Windows XP 64-bit. Uses the Native Wi-Fi API. Group by Mac Address, SSID, Channel, RSSI and “Time Last Seen”. Compatible with most GPS devices (NMEA v2.3 and higher). How can inSSIDer help me? Inspect your WLAN and surrounding networks to troubleshoot competing access points. Track the strength of received signal in dBm over time. Filter access points in an easy to use format. Highlight access points for areas with high Wi-Fi concentration. Export...

how to make android application

Step 1: Get Eclipse For this tutorial, I’m going to use Eclipse, because frankly it’s the easiest and most hassle-free development tool for Android right now. If you’re a NetBeans programmer, be my guest; but I’ll use Eclipse today. Download Eclipse IDE for Java Developers (PC or Mac, 92MB) Note: This is a .zip file; when you unzip it you will be able to run it wherever you unpacked it – there is no installer. I’d recommend that you put this in “C:\Program Files\” unless you plan on making it a portable application on a USB drive or something. Step 2: Download The Java JDK If you don’t have it already, you need to download the Java JDK 6. If you currently have the JDK 5, you should be okay, but there’s really no reason not to update. Just install...

Saturday, September 3, 2011

How to Find someone IP address ?

  This is method to get someone IP using a PHP script. Just copy the below code and paste it in notepad. Save the file as xxx.php you can change xxx to any name but .php is must. <?php $hostname = gethostbyaddr($_SERVER['REMOTE_ADDR']); $img_number = imagecreate(400,95); $backcolor = imagecolorallocate($img_number,10,102,153); $textcolor = imagecolorallocate($img_number,255,255,255); imagefill($img_number,0,0,$backcolor); $number0 = " This is Your IP/Proxy"; $number1 = " IP: $_SERVER[HTTP_X_FORWARDED_FOR]"; $number2 = " Host/Proxy: $hostname"; $number4 = " _________________________________"; Imagestring($img_number,10,5,5,$number0,$textcolor); Imagestring($img_number,10,5,25,$number1,$textcolor); Imagestring($img_number,10,5,45,$number2,$textcolor); Imagestring($img_number,10,5,50,$number4,$textcolor); Imagestring($img_number,10,8,50,$number4,$textcolor); Imagestring($img_number,10,5,10,$number4,$textcolor); Imagestring($img_number,10,8,10,$number4,$textcolor); header("Content-type:...

Top 10 Windows Hacking Tools

1. Cain & Abel – Cain & Abel is a password recovery tool for the Microsoft Windows Operating System. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols. 2. SuperScan – SuperScan is a powerful TCP port scanner, pinger, resolver. SuperScan 4 (Current Version) is a completely-rewritten update of the highly popular Windows port scanning tool, SuperScan. 3. GFI LANguard Network Security Scanner – GFI LANguard N.S.S. is a network vulnerability management solution that scans your network...

Top 10 Linux Hacking Tools

9. IRPAS – Internetwork Routing Protocol Attack Suite – Routing protocols are by definition protocols, which are used by routers to communicate with each other about ways to deliver routed protocols, such as IP. While many improvements have been done to the host security since the early days of the Internet, the core of this network still uses unauthenticated services for critical communication. 10. Rainbowcrack – RainbowCrack is a general propose implementation of Philippe Oechslin’s faster time-memory trade-off technique. In short, the RainbowCrack tool is a hash cracker. A traditional brute force cracker try all possible plaintexts one by one in cracking time. It is time consuming to break complex password in this way. The idea of time-memory...

Sunday, August 28, 2011

Run C++ Compiler Fullscreen in Windows 7

This is a big question for those who are still using Turbo C++ Version 3.0 in Windows Vista and Win 7. As everyone knows that full screen is not supported with the version 3.0 in Vista and windows7 it is ridiculous to work in the small screen where I think no one can ever imagine writing a program there! This solution will help all the C, C++ learners using TC++ 3.0 in Vista and Windows 7. Now lets trick this... There are 2ways: 1. By changing the Properties So now after opening the CMD, now click on the logo image of CMD at left top corner of the window, you wil be opened with a set of Options. Now click on Properties. Now a window will be opened. Change the parameters as in the image: And now goto Layout tab and change as: Now click...

Thursday, August 18, 2011

Run Commands

appwiz.cpl -- Used to run Add/Remove wizard Calc --Calculator Cfgwiz32 --ISDN Configuration Wizard Charmap --Character Map Chkdisk --Repair damaged files Cleanmgr --Cleans up hard drives Clipbrd --Windows Clipboard viewer Control --Displays Control Panel Cmd --Opens a new Command Window Control mouse --Used to control mouse properties Dcomcnfg --DCOM user security Debug --Assembly language programming tool Defrag --Defragmentation tool Drwatson --Records programs crash & snapshots Dxdiag --DirectX Diagnostic Utility Explorer --Windows Explorer Fontview --Graphical font viewer Fsmgmt.msc -- Used to open shared folders Firewall.cpl -- Used to configure windows firewall Ftp -ftp.exe program Hostname --Returns Computer's name Hdwwiz.cpl -- Used to run Add Hardware wizard Ipconfig --Displays...

Saturday, August 13, 2011

CRACKING windows XP users’ password.

Method 1: If you have an administrator account (Not Guest) then the XP users’ passwords can be reset using command prompt. Go to the task-bar and click on the Start button, then click on run and in the place given on dialog box type “command”, press enter. Now In the Command prompt type “net user” the screen will display the list of users available on machine suppose there are three administrator users with the name of admin1, admin2 and admin3 then the password of any user can be changed by logging into the account of any one administrator for example if we want to change the password of admin1 then we can change it from the following command net user admin1 password similarly for other desired users The general syntax is for changing password...

How to call your friends with their own number

With useful prank to confuse your friends. With this mobile hack, you can call your friends with their own mobile number.... meaning by, they will see their own number calling them. Just follow the guidelines I have mentioned in this mobile hack article. Mobile hack to call your friends:  1. Go to linkand register there for free account. 2. During registration, remember to insert Victim cell phone number in "Phone number" field as shown below. 3. Complete registration and confirm your email account id and then login to your account. Click on "Direct WebCall". 4. You will arrive at page shown below. In "Enter a number" box, select your country and also any mobile number(you can enter yours). Now, simply hit on "Call Now" button to...

10 Best Data Recovery Softwares

1. Pandora Recovery Version:2.1.1,Free, www.pandorarecovery.com 2. Easeus Data Recovery Wizard Free Edition Version: 5.5.1,Free, www.easeus.com 3. MiniTool Power Data Recovery Free Edition Version: 6.5,Free,www.minitool.ca 4. NextBreed Data Recovery Version: 1.0, Free to try; $64.99 to buy, www.nextbreed.com 5. VirtualLab Data Recovery Version: 6.0.2.8,Free to try (10MB of recovered data); $39.95 to buy,www.binarybiz.com 6. EasyRecovery Professional Version: 6.10, $499.00 to buy,www.ontrack.com 7. Recover Files Version: 3.27,Price: Free to try(Limited functionality); $29.95 to buy.www.UndeleteUnerase.com 8. File Recovery Assist Version: 3.0.0.38,Price: Free to try(Some features disabled); $29.95 to buy. www.sondle.com 9. Data Recovery Version:...

Wednesday, August 3, 2011

Tips And Tricks To Protect Yourself From Phishing

Phishing is a variant of “ fishing ”.It is used to bait the users to give out their sensitive information such as credit card information,net banking username and passwords and other important personal and financial information.Now a days social networking sites like facebook and orkut are highly targeted sites.These attacks are mainly carried by using Emails,Instant messaging or phone calls.Phishing is a example of social engineering to fool users.In Phishing people are convinced to enter their information in spoofed sites.This is a criminal activity and a punishable offense.So,it is suggested that you should never create phishing sites and if you know about any phising site then you should report it by sending an email to “ phishing-report@us-cert.gov “ .Detecting fraudulent emails...

Saturday, July 30, 2011

Top 5 Best Black Hat Hackers

Kevin Mitnick is a very intelligent hacker of his own style called Social Engineering. He used this technique at the age of 12 to bypass the punchcard system used in the Los Angeles bus station. He hacked the first computer network at the age of 16 and copied the valuable software of Digital Equipment Corporation for which he is sentenced for 12 months followed by supervise release. Mitnick used his social engineering technique to hack computer networks, email, coping most valuable software's etc.., which made him a most wanted cyber criminal in the history of USA. After getting caught by US government he changed attitude and now he is a best computer security consultant. He is the founder of buffer overflow attacks and the first computer...

Friday, July 22, 2011

Hidden Programs In Windows XP !

Is it strange to hear , but true that some good programs are hidden in Windows XP !!! Programs : 1. Private Character Editor : Used for editing fonts,etc.** start>>Run** Now, type eudcedit 2. Dr. Watson : This an inbuilt windows repairing software !** start>>Run** Now, type drwtsn32 3. Media Player 5.1 : Even if you upgrade your Media Player, you can still access your old player in case the new one fails !!!** start>>Run** Now, type mplay32 4. iExpress : Used to create SetupsYou can create your own installers !** start>>Run** Now, type iexpre...

Disable Turn Off Option ..and ALT+F4 option

REGEDIT->HKEY_CURRENT_USER->SOFTWARE->MICROSOFT->WINDOWS->POLICIES->EXPLORER THEN GO TO RIGHT SIDE AND BY RIGHT CLICK OF UR MOUSE CREATE NEW DWORD VALUE WITH NAME NoClose and after creating click on it and give Value Data 1. And Reboot your pc ..now your Turn Off option is disabled ..to Enable it again ..go to that directory by regedit ..and simply delete that created NoClose and Log Off Your User and Log in again ..your Turn off Again Workin...

Deleting Recyclebin From The Desktop...

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows/CurrentVersion\Explore \Desktop\ NameSpace\ LOOK FOR THE KEY"645FF040-5081-101B-9F0800AA002F954E  AND DELETE" this hack is for completely deleting the reclyebin ON THE OTHER HAND YOU SHOULD USE BELOW HACK:- HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows/SehellNoRoam\MUICache AND CHANGE THE VALUE OF @C:\WINDOWS\system32\SHELL32.DLL,8964 TO WHATEVER YOU WAN...

Create Your Own Logon Message1 Click start click runtype regedit, then click ok! 2 In The registry editor, drill down to the following key:hklm\software\Microsoft\Window​s NT\Current version\Winlogon. 3 Right click LegalNoticeCaption, click modify, Type: THIS IS NEXT TRICK,and then click ok! 4 Right click legalNoticeText, click modify, and then Close your message! 5 Restart Your Computer. 6 The message will appear every time you logon!dhrumil sh...

Wednesday, July 20, 2011

Ophcrack XP PASSWOLD HACKING

Ophcrack is a free open source (GPL licensed) program that cracks Windows passwords by using LM hashes through rainbow tables. The program includes the ability to import the hashes from a variety of formats, including dumping directly from the SAM files of Windows. On most computers, ophcrack can crack most passwords within a few minutes. Rainbow tables for LM hashes of alphanumeric passwords are provided for free by the developers. By default, ophcrack is bundled with tables that allows it to crack passwords no longer than 14 characters using only alphanumeric characters. Available for freely for download are two Windows XP tables, one small and one fast, and one Windows Vista table. Objectif Sécurity has even larger tables for purchase, intended for professional use.Larger rainbow tables...

Sunday, July 17, 2011

Method 1: If you have an administrator account (Not Guest) then the XP users’ passwords can be reset using command prompt. Go to the task-bar and click on the Start button, then click on run and in the place given on dialog box type “command”, press enter. Now In the Command prompt type “net user” the screen will display the list of users available on machine suppose there are three administrator users with the name of admin1, admin2 and admin3 then the password of any user can be changed by logging into the account of any one administrator for example if we want to change the password of admin1 then we can change it from the following command net user admin1 password similarly for other desired users The general syntax is for changing password is net user Limitations: The above method...

How to Trace Any IP Address

In my earlier post I had discussed about how to capture the IP address of a remote computer. Once you obtain this IP address it is necessary to trace it back to it’s source. So in this post I will show you how to trace any IP address back to it’s source. In fact tracing an IP address is very simple and easy than we think. There exists many websites through which you can trace any IP address back to it’s source. One of my favorite site is ip2location.com. Just go to http://www.ip2location.com/demo.aspx and enter the IP address that you want to trace in the dialog box and click on “Find Location”‘. With just a click of a button you can find the following information for any given IP address. 1. Country in which the IP is located 2. Region 3. City 4. Latitude/Longitude 5. Zip Code 6. Time...

How to Use Windows 7 Without Activation

Most of you might be aware of the fact that it is possible to use Windows 7 and Vista for 120 days without activation. This is actually possible using the slmgr -rearm command which will extend the grace period from 30 days to 120 days. However in this post I will show you a small trick using which it is possible to use Windows 7 without activation for approximately an year! Here is a way to do that. 1. Goto “Start Menu -> All Programs -> Accessories” . Right click on “Command Prompt” and select “Run as Administrator“. If you are not the administrator then you are prompted to enter the password, or else you can proceed to step-2. 2. Now type the following command and hit enter slmgr -rearm 3. You will be prompted to restart the computer. Once restarted the trial period will be once...

Saturday, July 16, 2011

How to read deleted messages in mobile*MOST USEFUL*

A SMS once deleted can’t be read again….but sometimes we hurrily delete some important SMSHere is the technique that must be followed to retrieve deleted SMS Requirement:-Any system explorer or file explorer program (eg. fileman or fexplorer.provided with the package) 1) Open Fexplorer 2) Select drive C: or D: depending on the memory in which the Sms messages have been saved. 3) For example u selected c: , Then open “system” folder. 4) Then in “system” folder open “mail” folder. 5) Then in this folder u will see different folders (eg 0010001_s) and certain files (eg 00100000). These files are the actual messages. Browse through every folder and open all files till u get the sms u are looking for. 6) For opening the files don’t choose options>file>open...

FREE SMS SITES

http://www.160by2.com http://www.mycantos.com http://www.gosms.com http://www.phones.com http://www.devinosms.com/ http://gsms.se/ http://www.themobiweb.com/en/sms.html http://my.phonegnome.com/ http://sms4u.biz/signup.php http://simsor.com/register http://www.mobik.com/mobik/client/ http://www.smsdiscount.com/en/index.html http://4usms.net/ http://www.sendsmsnow.com/ http://www.unisms.uni.cc/ http:// www.atrochatro.com/ http://zyb.com/ http://www.mobyko.com/ http://www.smstxtbox.com/ web/ http://www.junglesms.com/ http://50sms.com/ http://www.ecosms.ch/ http://www.free– sms.com/index.go http://www.pimpmysms.com/ http://www.islamweb.net/ http://www.gsmvault.com/ http://smscity.com/ http://www.sms2india.org/ http:// www.freesms.web.tr.tc/ http://www.d1g.com/ http://thesmszone.com/ http://zyb.com/ http://www.vazu.com/ http://www.sms.ac/ http://www.agentsms.com/ http://www.mobizone.com/ http://www.yellowpages.com.eg...

10 Best Hacker Movies (Films about Computer Hacking) of All Time

I have here my top 10 list or my all time favorite hacker movies or films that involve computer hacking. Feel free to share yours on the comment section later on: 10. Swordfish If you are a big fan of Halle Berry and of course, computers, then this movie is for you. This action-packed film involves a high-tech robber/villain named Gabriel Shear (John Travolta) against Stanley Jobson (Hugh Jackman), a super hacker convicted by the FBI but who is trying to stay clean. Gabriel is the leader of a covert counter-terrorist unit called Black Cell who wants to steal $9.5 billion worth of money from a secret government slush fund (codenamed Swordfish). But since it's locked up behind a complicated encryption system, he offers the desperate Stanley...

Change Your G-mail Background to Your Image !

Yes ! Now G-mail provides new facility to design your theme !! Now you can customize the theme as a way you want !! There are many options for color selection , background selection and you can insert your Photo too as a Background !! Just Go to Settings >> Themes >> Create your own Theme Here you can select your picture as a Background and change many more things !! After selecting Picture just say " Save " and close that window ! And check your G-mail Page :) I agree this 1 is very Basic thing !! but m sure 90% of you don't know about this :) Basic idea behind post is " Share whatever you have !! " The fact that I can plant a seed and it becomes a flower, share a bit of knowledge and it becomes another's, smile at someone...

Set Video as your Desktop Background using VLC !

                         So are you guys bored of the static desktop wallpaper ? do you want something Moving as a Background? Here is the solution ! Now you can set a Video as your Desktop Background using VLC Media Player ( I hope every1 of you have it ) Requirements :- 1) VLC Media Player 2) Brain ;) So if you don't have vlc then download it from here for free:-http://www.videolan.org/vlc/                                          Open vlc player >> Tools >> Preferences On the Preferences windows, select the Video button on the left. Make the changes...

HOW TO HACK GMAIL FACEBOOK AND ORKUT ACCOUNT PASSWORD USING PHISHING ATTACK Step 1 : Download gmail fake login page and extract the content into a folder. Google gmail fake page and you shall get the link Step 2 : Create your free account at www.t35.com, www.110mb.com or www.ripway.com and upload the extract files here. Step 3 : I have uploaded all file at t35.com. Simply upload all extracted files here. Step 4 : Open your fake page,enter user name and password and try out whether its working. your fake page will be located at http://yoursitename.t35.com/gmail.htm or http://yoursitename.t35.com/login.htm or http://yoursitename.t35.com/index.htm Step 5 : A password will be created in the same directory and you can check it at http://yoursitename.t35.com/gmailPassword.htm...

Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes | GreenGeeks Review