Tuesday, March 31, 2009

Hide Entire Drives Partition Without Registry

Here is a cool technique which hides entire hard disk drives by a simple procedure. This is the best security tip to be employ against unauthorised users. 1) Go to Start > Run > type "diskpart". A DOS window will appear with following description. DISKPART> 2) Then type "list volume" The result will look something like one as shown below- 3) Suppose you want to hide drive E then type "select volume 3" Then a message will appear in same window { Volume 3 is the selected volume} 4) Now type "remove letter E" Now a message will come { Diskpart Removed the Drive letter } sometime it requires to reboot the computer. Diskpart...

Running Multiple Instances of Yahoo Messenger

If you are using Yahoo! Messenger v8.0 or above, YahooMulti.reg will let you run multiple copies of Yahoo Messenger. At the same time which will allow you to login multiple ID’s at the same time. 1) Open Registry Editor (regedit.exe) Click Start > Run and then type 'regedit' press enter. 2) Then Look For- HKEY_CURRENT_ USER\Software\yahoo\ pager\Test. 3) Then change this value of plural to like this- “Plural”=dword: 00000001 Source:- http://www.insecure.in/multiple_yahoo_trick.asp...

Hide EXE File into JPG

This is a good trick to hide your exe files into a jpg file..! How about sending a trojan or a keylogger into your victim using this trick..?? 1) Firstly, create a new folder and make sure that the options 'show hidden files and folders' is checked and ‘hide extensions for known file types’ is unchecked. Basically what you need is to see hidden files and see the extension of all your files on your pc. 2) Paste a copy of your server on the new created folder. let's say it's called 'server.exe' (that's why you need the extension of files showing, cause you need to see it to change it) 3) Now you’re going to rename this 'server.exe' to whatever you want, let’s say for example 'picture.jpeg' 4) Windows is going to warn you if you really want to change this extension from exe to jpeg,...

Increase Broadband Speed Using Simple Tweak

  A Simple Tweak (XP Pro only) which will increase your Broadband Speed. Make sure you Log on as Administrator, not as a user with Administrator privileges. Follow the steps as given below- 1) Click on Start Button. 2) Select Run From Start Menu. 3) Type gpedit.msc 4) Expand the [Administrative Templates] branch. 5) Then Expand the [Network] branch. 6) Highlight(Select by Single Click) [QoS Packet Scheduler] 7) Double-click [Limit Reservable Bandwidth] (Available in Right Side Panel) 8) Check(Select By Single Click on it) [Enabled] 9) Change [Bandwidth limit %] to 0 % 10) Click [OK] Button. 11) Restart Your PC. 12) Now Check Your Broadband Speed.   Source:- http://www.insecure.in/broadband_trick.asp...

Create Folders And Files With NO! Name

This trick will allow you to create files and folders without any name. Just follow the steps as given below :- 1) Select any file or folder. 2) Right click on it, select 'Rename' or simply press 'F2'. 3) Press and hold the 'Alt' key. While holding the Alt key, type numbers '0160' from the numpad. Note :- Type the numbers '0160' from the numpad, that is, the numbers present on the right side of the keyboard. Don’t type the numbers which are present on top of the character keys. 4) Press Enter and the nameless file or folder will be created. Reason :- The file or folder that seems nameless is actually named with a single space. But what if you want to create another nameless file or folder in the same directory ? For this you will have to rename the file with 2 spaces. Just follow...

Chat with Friends through ms dos Command Prompt

1) All you need is your friend's IP Address and your Command Prompt. 2) Open Notepad and write this code as it is.....! @echo off :A Cls echo MESSENGER set /p n=User: set /p m=Message: net send %n% %m% Pause Goto A 3) Now save this as "Messenger.Bat". 4) Open Command Prompt. 5) Drag this file (.bat file) over to Command Prompt and press Enter. 6) You would then see something like this: 7) Now, type the IP Address of the computer you want to contact and press enter You will see something like this: 8) Now all you need to do is type your message and press Enter. Start Chatting.......! Source:- http://w...

Run Firefox inside Firefox

How to run Firefox inside Firefox.? Yup you can run Firefox inside Firefox just by typing following url. How about Opening Firefox inside Firefox which is again in another Firefox..? Not bad huh? And its really easy too just type in this url in Firefox's address bar and there you go! Firefox inside Firefox! copy paste following url in a web browser (mozilla Firefox). chrome://browser/content/browser.xul Following is the screenshot of this trick (firefox in firefox in Firefox, which is again in another firefox)-   Source:- http://www.insecure.in/firefox_in_firefox.asp...

Reveal *****(Asterisk) Passwords Using Javascript

Want to Reveal the Passwords Hidden Behind Asterisk (****) ? Follow the steps given below- 1) Open the Login Page of any website. (eg. http://mail.yahoo.com) 2) Type your 'Username' and 'Password'. 3) Copy and paste the JavaScript code given below into your browser's address bar and press 'Enter'. javascript: alert(document.getElementById('Passwd').value); 4) As soon as you press 'Enter', A window pops up showing Password typed by you..! Note :- This trick may not be working with firefox.   Source:- http://www.insecure.in/reveal_pass_trick.asp...

Calculations On Command Prompt

The command processor CMD.EXE comes with a mini-calculator that can perform simple arithmetic on 32-bit signed integers: C:\>set /a 2+2 4 C:\>set /a 2*(9/2) 8 C:\>set /a (2*9)/2 9 C:\>set /a "31>>2" 7 Note that we had to quote the shift operator since it would otherwise be misinterpreted as a "redirect stdout and append" operator. For more information, type set /? at the command prompt.   Source:- http://www.insecure.in/cal_cmd_trick.asp...

Folder Lock Without Any Software

Folder Lock With Password Without Any Software- Paste the code given below in notepad and 'Save' it as batch file (with extension '.bat'). Any name will do. Then you see a batch file. Double click on this batch file to create a folder locker. New folder named 'Locker' would be formed at the same location. Now bring all the files you want to hide in the 'Locker' folder. Double click on the batch file to lock the folder namely 'Locker'. If you want to unlock your files,double click the batch file again and you would be prompted for password. Enter the password and enjoy access to the folder. if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK if NOT EXIST Locker goto MDLOCKER :CONFIRM echo Are you sure u want to Lock the folder(Y/N) set/p "cho=>"...

Shutdown Command Via Command Prompt

The 'Shutdown' Command Becomes More Flexible and Automated when used from the Command Prompt. To Run the 'Shutdown' command from the command prompt, go to 'Start > Run', type 'cmd', and press 'Enter'. In the black box (the command prompt) type 'Shutdown' and the Switches you want to use with the 'Shutdown' command. You have to use at least one switch for the shutdown command to work. The Switches :- The 'Shutdown' command has a few options called Switches. You can always see them by typing 'shutdown -?' in the command prompt if you forget any of them. -i: Display GUI interface, must be the first option -l: Log off (cannot be used with -m option) -s: Shutdown the computer -r: Shutdown and restart the computer -a: Abort a system shutdown -m \\computername: Remote computer...

The Ethical Hacker

Welcome to the unique confluence of hackers , crackers and security professionals on the world wide web. This is your complete resource for internet security and ethical hacking.  -: The Ethical Hacker :- Most people think that hackers are computer criminals. They fail to recognize the fact that criminals and hackers are two totally different things. Media is responsible for this. Hackers in reality are actually good and extremely intelligent people who by using their knowledge in a constructive manner help organizations, companies, government, etc. to secure documents and secret information on the internet. Source:-...

Windows-XP Password Cracking

Here we use the tool "Cain and Abel" for cracking passwords of any local user/administrator. First download cain and abel from "http://www.oxid.it/cain.html" and install it on your system. Make sure that you have disabled the antivirus/firewall running on your system before installing and throughout this process. Two most effective techniques used here are "Brute-Force" and "Cryptanalysis". Brute-Force:- As this techniques takes more time to complete, the attacker prefer this technique only when there is a hope that the password contain same type of characters or may be two. i.e only loweralpha, only alpha, only numeric or may...

Password Hacking

Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password. Most passwords can be cracked by using following techniques : 1) Hashing :- Here we will refer to the one way function (which may be either an encryption function or cryptographic hash) employed as a hash and its output as a hashed password. If a system uses a reversible function to obscure stored passwords, exploiting that weakness can recover even 'well-chosen' passwords. One example is the LM hash that Microsoft Windows uses by...

Network Hacking

Network Hacking is generally means gathering information about domain by using tools like Telnet, NslookUp, Ping, Tracert, Netstat, etc. It also includes OS Fingerprinting, Port Scaning and Port Surfing using various tools. Ping :- Ping is part of ICMP (Internet Control Message Protocol) which is used to troubleshoot TCP/IP networks. So, Ping is basically a command that allows you to check whether the host is alive or not. To ping a particular host the syntax is (at command prompt)-- c:/>ping hostname.com example:- c:/>ping www.google.com Various attributes used with 'Ping' command and their usage can be viewed by just...

Increase Virtual RAM - To Make Your System Faster

Follow the steps given below :- 1) Hold down the 'Windows' Key and Press the 'Pause/Break' button at the top right of your keyboard. Another way is Right-Clicking 'My Computer' and then Select 'Properties'. 2) Click on the 'Advanced' tab. 3) Under 'Performance', click 'Settings'. 4) Then click the 'Advanced' tab on the button that pops up. 5) Under 'Virtual Memory' at the bottom, click 'Change'. 6) Click the 'Custom Size' button. 7) For the initial size (depending on your HD space), type in anywhere from 1000-1500 (although I use 4000), and for the Maximum size type in anywhere from 2000-2500 (although I use 6000). 8) Click 'Set', and then exit out of all of the windows. 9) Finally, Restart your computer. 10) You now have a faster computer and 1-2GB of Virtual...

Wednesday, March 11, 2009

Yahoo Messenger User Status Checking Ways Yahoo Invisible User Detection

Many people now days prefer to stay offline while using Yahoo Messenger so how to find Status of someone? There are many ways of finding people who are online but yet invisible.I'm going to describe many of those methods by this post As all we knows that Yahoo has a Stealth settings feature that lets you choose the people who see you as online and offline (Invisible Mode). But may be you want to figure out these peoples really online or offline. There are few methods for check user stats in yahoo messenger.I'm going to discuses them one by one: Doodle IMvironment Method Double Click on the user whose status you want to check. Message window...

Convert a FAT volume or a FAT32 volume to NTFS Fomat

This tutorial will show you how to convert FAT or FAT32 Volume to NTFS Format Please Note: Backup your any important data before doing this we highly recommend to do so because there is a chance to corruption or data loss during the conversion is minimal, So we recommend that you perform a backup of the data on the volume that you want to convert before you start the conversion. Now I'm going to show you how to convert Fat , Fat32 to NTFS format by 5 steps: First Click "Start" , Then "All Programs", "Accessories", and then click "Command Prompt". At the command prompt, type the following, drive letter is the drive that you...

Computer Firewall, Why you need to have Firewall System to Your Computer

Your home Internet connection leaves you vulnerable to hackers who want to access your financial and personal information. hackers can send malicious viruses and worms, blackening to your computer. Intruders have the power to destroy your operating system or gather you data. How can you lock that computer to hackers but still have the freedom to do your business online? A solid firewall help you to stop intruders from accessing to your computer. You keep your Internet link to the outside world but the outside world can't view you unless you want allow to them. With a firewall in place you will still have typical email access, but chat and...

Antivirus2009 - How to Remove Antivirus2009 Easily and Safely

If you are reading this article then your computer must be infected by Antivirus2009. Antivirus2009, Antivirus2008 and XP antivirus are categorized as rogue anti-spyware. They are very complicated viruses. What you see in your computer will be pop ups and annoying redirection when you are browsing. But did you know that they can also reveal your personal information, steal your credit card number and use it? Yes they can! Do not panic I will show you how to remove them quickly and safely now. The first thing that you should do now is to go to my recommended sites and get a free scan there. You can use the free scan without registering or paying....

What is Hacking?

What is your definition of hacking? Most people think of the news stories that relate to big companies having embarrassing problems as their data is compromised. But in truth, hacking goes a lot further than this. It doesn't always have to be someone you don't know who hacks into your systems and causes problems for your business. It could equally be someone who works for you that doesn't have your best interests at heart. This is because the basic meaning of hacking is when someone accesses some or all of your computer systems without permission. And it doesn't just happen over the internet.         Quite...

Tuesday, March 10, 2009

Computer Firewalls

A firewall is a computer software that provides protection from hacking attempts from the Internet. It is very important to install a suitable firewall software to protect the computer from spyware and virus infections. A large number of security companies have developed firewall software. Some of these software are free for personal use. A firewall software is basically a "packet sniffer". Data that gets transferred via the Internet moves in the form of packets. The firewall software intercepts these packets, analyzes its contents and determines if it is harmful to the computer. If the packet contains malicious content, the firewall blocks...

My Email is Missing - What Happened?

Let me tell you about my own experience with disappearing email. After rebooting my computer one day I went into my email program and discovered that all of the existing email folders, Inbox, Sent Items, Deleted Items, and other local folders I had created had just disappeared. I suspected that I may have downloaded some software which had caused the problem.      You see, I was trying to protect my system from spy ware infiltration and so I had downloaded one of the more popular "freeware" solutions, a certain "anniversary" version, to ensure my system was protected. I had been using the same program for a long time, but one...

Do You Have a Virus? Basics of Virus Removal

If you have a virus your doctor probably prescribed an antibiotic for you. It is too bad the same cannot be applied to a computer. A computer virus attacks at many levels. It moves throughout your system and can be difficult to eradicate. In advanced cases it can get into the root area and prevent your system from booting up. If this happens you may have to format ( erase ) your hard drive and reinstall the operating system. This is time consuming and unnecessary if you have the proper protection. The regular user will find it beyond their ability to do this and will contemplate taking their computer to a repair shop. Don't do it! Until you read...

Never Use Copy Paste and IE6

I used to think taxi cabs or restaurants that use old fashion carbon paper receipts for credit card transactions were the biggest source of credit card debt and fraud. I was told thieves would go to the dumpster and rummage through the garbage looking for these receipts. The impression on the carbon paper would give the credit card number, and expiration date. This is one reason why they started using the 3 digit CVS code on the back of credit cards.             However, recently my friend had a virus that sent out a SPAM email to everyone on his Gmail address book! That got me thinking... unlike...

Why You Need to Create and Protect Strong Email Passwords

It is important for several reasons to have a strong password on your e-mail and web site accounts. Your email account is the gateway into your personal information including web banking, investment accounts, and other websites that store your personal information online. There is also a growing trend of spammers breaking into e-mail accounts with weak passwords and using them to send massive amounts of spam which can lead to your ISP closing your e-mail account before you even realize that there is a problem.     The following are examples of weak passwords that must be avoided: temp password change me having...
Page 1 of 30012345Next

 
Design and Bloggerized by JMD Computer