Saturday, July 30, 2011

Top 5 Best Black Hat Hackers

Kevin Mitnick is a very intelligent hacker of his own style called Social Engineering. He used this technique at the age of 12 to bypass the punchcard system used in the Los Angeles bus station. He hacked the first computer network at the age of 16 and copied the valuable software of Digital Equipment Corporation for which he is sentenced for 12 months followed by supervise release. Mitnick used his social engineering technique to hack computer networks, email, coping most valuable software's etc.., which made him a most wanted cyber criminal in the history of USA. After getting caught by US government he changed attitude and now he is a best computer security consultant. He is the founder of buffer overflow attacks and the first computer...

Friday, July 22, 2011

Hidden Programs In Windows XP !

Is it strange to hear , but true that some good programs are hidden in Windows XP !!! Programs : 1. Private Character Editor : Used for editing fonts,etc.** start>>Run** Now, type eudcedit 2. Dr. Watson : This an inbuilt windows repairing software !** start>>Run** Now, type drwtsn32 3. Media Player 5.1 : Even if you upgrade your Media Player, you can still access your old player in case the new one fails !!!** start>>Run** Now, type mplay32 4. iExpress : Used to create SetupsYou can create your own installers !** start>>Run** Now, type iexpre...

Disable Turn Off Option ..and ALT+F4 option

REGEDIT->HKEY_CURRENT_USER->SOFTWARE->MICROSOFT->WINDOWS->POLICIES->EXPLORER THEN GO TO RIGHT SIDE AND BY RIGHT CLICK OF UR MOUSE CREATE NEW DWORD VALUE WITH NAME NoClose and after creating click on it and give Value Data 1. And Reboot your pc ..now your Turn Off option is disabled ..to Enable it again ..go to that directory by regedit ..and simply delete that created NoClose and Log Off Your User and Log in again ..your Turn off Again Workin...

Deleting Recyclebin From The Desktop...

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows/CurrentVersion\Explore \Desktop\ NameSpace\ LOOK FOR THE KEY"645FF040-5081-101B-9F0800AA002F954E  AND DELETE" this hack is for completely deleting the reclyebin ON THE OTHER HAND YOU SHOULD USE BELOW HACK:- HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows/SehellNoRoam\MUICache AND CHANGE THE VALUE OF @C:\WINDOWS\system32\SHELL32.DLL,8964 TO WHATEVER YOU WAN...

Create Your Own Logon Message1 Click start click runtype regedit, then click ok! 2 In The registry editor, drill down to the following key:hklm\software\Microsoft\Window​s NT\Current version\Winlogon. 3 Right click LegalNoticeCaption, click modify, Type: THIS IS NEXT TRICK,and then click ok! 4 Right click legalNoticeText, click modify, and then Close your message! 5 Restart Your Computer. 6 The message will appear every time you logon!dhrumil sh...

Wednesday, July 20, 2011

Ophcrack XP PASSWOLD HACKING

Ophcrack is a free open source (GPL licensed) program that cracks Windows passwords by using LM hashes through rainbow tables. The program includes the ability to import the hashes from a variety of formats, including dumping directly from the SAM files of Windows. On most computers, ophcrack can crack most passwords within a few minutes. Rainbow tables for LM hashes of alphanumeric passwords are provided for free by the developers. By default, ophcrack is bundled with tables that allows it to crack passwords no longer than 14 characters using only alphanumeric characters. Available for freely for download are two Windows XP tables, one small and one fast, and one Windows Vista table. Objectif Sécurity has even larger tables for purchase, intended for professional use.Larger rainbow tables...

Sunday, July 17, 2011

Method 1: If you have an administrator account (Not Guest) then the XP users’ passwords can be reset using command prompt. Go to the task-bar and click on the Start button, then click on run and in the place given on dialog box type “command”, press enter. Now In the Command prompt type “net user” the screen will display the list of users available on machine suppose there are three administrator users with the name of admin1, admin2 and admin3 then the password of any user can be changed by logging into the account of any one administrator for example if we want to change the password of admin1 then we can change it from the following command net user admin1 password similarly for other desired users The general syntax is for changing password is net user Limitations: The above method...

How to Trace Any IP Address

In my earlier post I had discussed about how to capture the IP address of a remote computer. Once you obtain this IP address it is necessary to trace it back to it’s source. So in this post I will show you how to trace any IP address back to it’s source. In fact tracing an IP address is very simple and easy than we think. There exists many websites through which you can trace any IP address back to it’s source. One of my favorite site is ip2location.com. Just go to http://www.ip2location.com/demo.aspx and enter the IP address that you want to trace in the dialog box and click on “Find Location”‘. With just a click of a button you can find the following information for any given IP address. 1. Country in which the IP is located 2. Region 3. City 4. Latitude/Longitude 5. Zip Code 6. Time...

How to Use Windows 7 Without Activation

Most of you might be aware of the fact that it is possible to use Windows 7 and Vista for 120 days without activation. This is actually possible using the slmgr -rearm command which will extend the grace period from 30 days to 120 days. However in this post I will show you a small trick using which it is possible to use Windows 7 without activation for approximately an year! Here is a way to do that. 1. Goto “Start Menu -> All Programs -> Accessories” . Right click on “Command Prompt” and select “Run as Administrator“. If you are not the administrator then you are prompted to enter the password, or else you can proceed to step-2. 2. Now type the following command and hit enter slmgr -rearm 3. You will be prompted to restart the computer. Once restarted the trial period will be once...

Saturday, July 16, 2011

How to read deleted messages in mobile*MOST USEFUL*

A SMS once deleted can’t be read again….but sometimes we hurrily delete some important SMSHere is the technique that must be followed to retrieve deleted SMS Requirement:-Any system explorer or file explorer program (eg. fileman or fexplorer.provided with the package) 1) Open Fexplorer 2) Select drive C: or D: depending on the memory in which the Sms messages have been saved. 3) For example u selected c: , Then open “system” folder. 4) Then in “system” folder open “mail” folder. 5) Then in this folder u will see different folders (eg 0010001_s) and certain files (eg 00100000). These files are the actual messages. Browse through every folder and open all files till u get the sms u are looking for. 6) For opening the files don’t choose options>file>open...

FREE SMS SITES

http://www.160by2.com http://www.mycantos.com http://www.gosms.com http://www.phones.com http://www.devinosms.com/ http://gsms.se/ http://www.themobiweb.com/en/sms.html http://my.phonegnome.com/ http://sms4u.biz/signup.php http://simsor.com/register http://www.mobik.com/mobik/client/ http://www.smsdiscount.com/en/index.html http://4usms.net/ http://www.sendsmsnow.com/ http://www.unisms.uni.cc/ http:// www.atrochatro.com/ http://zyb.com/ http://www.mobyko.com/ http://www.smstxtbox.com/ web/ http://www.junglesms.com/ http://50sms.com/ http://www.ecosms.ch/ http://www.free– sms.com/index.go http://www.pimpmysms.com/ http://www.islamweb.net/ http://www.gsmvault.com/ http://smscity.com/ http://www.sms2india.org/ http:// www.freesms.web.tr.tc/ http://www.d1g.com/ http://thesmszone.com/ http://zyb.com/ http://www.vazu.com/ http://www.sms.ac/ http://www.agentsms.com/ http://www.mobizone.com/ http://www.yellowpages.com.eg...

10 Best Hacker Movies (Films about Computer Hacking) of All Time

I have here my top 10 list or my all time favorite hacker movies or films that involve computer hacking. Feel free to share yours on the comment section later on: 10. Swordfish If you are a big fan of Halle Berry and of course, computers, then this movie is for you. This action-packed film involves a high-tech robber/villain named Gabriel Shear (John Travolta) against Stanley Jobson (Hugh Jackman), a super hacker convicted by the FBI but who is trying to stay clean. Gabriel is the leader of a covert counter-terrorist unit called Black Cell who wants to steal $9.5 billion worth of money from a secret government slush fund (codenamed Swordfish). But since it's locked up behind a complicated encryption system, he offers the desperate Stanley...

Change Your G-mail Background to Your Image !

Yes ! Now G-mail provides new facility to design your theme !! Now you can customize the theme as a way you want !! There are many options for color selection , background selection and you can insert your Photo too as a Background !! Just Go to Settings >> Themes >> Create your own Theme Here you can select your picture as a Background and change many more things !! After selecting Picture just say " Save " and close that window ! And check your G-mail Page :) I agree this 1 is very Basic thing !! but m sure 90% of you don't know about this :) Basic idea behind post is " Share whatever you have !! " The fact that I can plant a seed and it becomes a flower, share a bit of knowledge and it becomes another's, smile at someone...

Set Video as your Desktop Background using VLC !

                         So are you guys bored of the static desktop wallpaper ? do you want something Moving as a Background? Here is the solution ! Now you can set a Video as your Desktop Background using VLC Media Player ( I hope every1 of you have it ) Requirements :- 1) VLC Media Player 2) Brain ;) So if you don't have vlc then download it from here for free:-http://www.videolan.org/vlc/                                          Open vlc player >> Tools >> Preferences On the Preferences windows, select the Video button on the left. Make the changes...

HOW TO HACK GMAIL FACEBOOK AND ORKUT ACCOUNT PASSWORD USING PHISHING ATTACK Step 1 : Download gmail fake login page and extract the content into a folder. Google gmail fake page and you shall get the link Step 2 : Create your free account at www.t35.com, www.110mb.com or www.ripway.com and upload the extract files here. Step 3 : I have uploaded all file at t35.com. Simply upload all extracted files here. Step 4 : Open your fake page,enter user name and password and try out whether its working. your fake page will be located at http://yoursitename.t35.com/gmail.htm or http://yoursitename.t35.com/login.htm or http://yoursitename.t35.com/index.htm Step 5 : A password will be created in the same directory and you can check it at http://yoursitename.t35.com/gmailPassword.htm...

Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes | GreenGeeks Review