Showing posts with label Hacking Tutorials. Show all posts
Showing posts with label Hacking Tutorials. Show all posts

Sunday, 15 July 2012

How to know who used your PC/Laptop in your absence

                                    How to know who used your PC/Laptop in your absence


Now easily find out, who used your PC/Laptop in your absence, without using any software.
Just follow these simple steps:

start >> run >>eventvwr.msc

Events are stored in three log files: Application, Security, and System.
These logs can be reviewed and archived.
For our purposes we want the System log. Click on "System" in the left-hand column for a list of events.
Look for a date and time when you weren't home and your computer should have been off.
Double click on the eg: info n it will show u the detail.
You can also use this log to see how long someone was on the computer. Just look at the time the computer was turned on and off for that day.

Tuesday, 3 July 2012

How to update Random Status Automatically

After a great research on Access tokens, and my Facebook auto liker i am sharing some codes to update random facebook status automatically.

Note: We use access tokens to update status randomly and for auto posting. And you need a hosting with cronjob.

For this, you need to create  2 PHP files and 1 txt file.

Our 1st PHP file will be the main file which accept the access token and contain the posting command.

__________________________________

<?php
$access_token = "Your Access Token";
$url = "https://graph.facebook.com/me/feed?method=POST";
$linx = "http://vivekcreations.com/status.php (Edit the url with your Path of second file Means status.php file)";
$status = file_get_contents($linx);
$ch = curl_init();
$attachment = array( 'access_token' => $access_token,
'message' => $status,
);
curl_setopt($ch, CURLOPT_URL,$url);
curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 2);
curl_setopt($ch, CURLOPT_POST, true);
curl_setopt($ch, CURLOPT_POSTFIELDS, $attachment);
$result= curl_exec($ch);
curl_close ($ch);
?>

____________________________

Save this file as main.php.


Now create second file and save the file with name status.php

______________________________


<?
srand((double)microtime()*1000000);
$Arry_txt= preg_split ("/-vicky-/", join ('', file (" http://vivekcreations.com/status.txt (Edit the url with your Path of second file Means status.txt file) ")));
echo $Arry_txt[rand(0, sizeof($Arry_txt) -1)];
?>

______________________________

Now our last file means txt file which contains all the random status.
Make a txt file and save it with name status.txt

_______________________________


"status 1"
/-vicky-/
"status 2"
/-vicky-/
"Oops"
/-vicky-/
"Status 3"

____________________________

Put your all random status in double qoutes and split them with /-vicky-/ It makes all your status different from each other.

Direct Download all three files in a zip folder from here

Now upload the all files on your server or hosting and simply run main.php file.

How to auto update these random status ?

Well the solution is simple just use cronjob and give a path of your main.php file to execute after every timeslap which you have mentioned in cronjob. like this:


For any question regarding codes just visit the developer profile here ( Vicky Verma )


Friday, 4 May 2012

How to use any SIM in any Modem without unlocking it


Step by step instruction: 
1. Insert SIM in Modem
Idea Net Setter
Vodafone Net Setter

2. Modem show invalid SIM, just ignore it and close modem software.
3. Start NOKIA PC suite.
4. Go to Nokia pc suite connect to internet option.
Nokia PC Suit Menu
5. Go to Configure. Select your data card modem,and make all operator apn setting as like when we use Nokia mobile connection.
Eg:- Apn for Airtel – airtelgprs.com
Nokia PC Suit Configure
6. Finish set up.
7. Now connect to internet through PC suite.
Nokia PC Suit Net Connect
8. Finally your net is connected without unlocking the modem.

For any help regarding this post just mention in comments.



Thursday, 1 March 2012

How to make any Internet Download Manager (IDM) full version with serial key crack or keygen

Internet Download Manager is a download accelator. By using this software we are able download from the Internet at a high speed.But when we are downloading the software from its official site it is not a full version. That is a 30 day trial pack. After these days are past it will ask you to enter serial key or to buy. So here is the process to make any downloaded IDM full version.
After making this it will be registered for lifetime and not ask to register it further.


Process:

1. Download latest version of IDM from Here or If you already have IDM installed Update it [Process for update: Click on help on the menu bar and then click on check updates. It will search for updates and ask you to install]

2. If you like your installed version of IDM very much. Then don't update or skip the first step.

3. Now click on "registration" on the menu bar.

4. When you click on registration, Now a new window Will be open ask your First Name, Last Name, Email Address and Serial Key. See Screenshot

IDM Registration

5. Enter your First name, Last Name, Email address in the required field.

6. In the serial key field enter any of the following given below
   
     RLDGN-OV9WU-5W589-6VZH1
     HUDWE-UO689-6D27B-YM28M
     UK3DV-E0MNW-MLQYX-GENA1
     398ND-QNAGY-CMMZU-ZPI39
     GZLJY-X50S3-0S20D-NFRF9
     W3J5U-8U66N-D0B9M-54SLM
     EC0Q6-QN7UH-5S3JB-YZMEK
     UVQW0-X54FE-QW35Q-SNZF5
     FJJTJ-J0FLF-QCVBK-A287M

And click on ok to register.

7. After you click OK, it will show an error message that you have registered IDM using fake serial key and IDM will exit. See screenshot

IDM

Now the actual My Creations process starts:

8. First of all go to "C:/" drive then go to "Windows" Folder and then go to "System32" folder and then go to "Drivers" folder and then go to "Etc" Folder.
Path is: C:\Windows\System32\drivers\etc
Or Simply "C:\Windows\System32\drivers\etc" paste this (without quotes) in the address bar and hit enter. 
It will open the required folder.

9. In the Etc folder you will see the hosts file. Open the file with notepad.

Now copy the below lines of code and add to hosts file as shown below the image box :

127.0.0.1 tonec.com
127.0.0.1 www.tonec.com
127.0.0.1 registeridm.com
127.0.0.1 www.registeridm.com
127.0.0.1 secure.registeridm.com
127.0.0.1 internetdownloadmanager.com
127.0.0.1 www.internetdownloadmanager.com
127.0.0.1 secure.internetdownloadmanager.com
127.0.0.1 mirror.internetdownloadmanager.com
127.0.0.1 mirror2.internetdownloadmanager.com

How to make any Internet Download Manager (IDM) full version with serial key crack or keygen

10. After adding these codes, save the notepad file. And exit from there.

Now again repeat the 3rd step to 6th step.
Reboot or restart your PC. After restart Now open your IDM it will be full version and not ask you to register.

In windows vista and seven  we are not able to save the "hosts" file  due to security resion. For that first of all we have to take the ownership of the file to our logged user.

How to change IP with Proxy

One way to change the IP address of the computer is by using a Proxy.
Now we need to go in deep of this creation for better understanding.

What is a Proxy?

In general a proxy is an IP (Internet Protocol) or an intermediary who can serve as a media liaison with the ISP connection. Proxy is one of the functions can change our computer identity (IP) with a different IP. Here are tips on replacing the IP with a proxy:

For this creation I use the Mozilla Firefox browser.

Consider the following example, before I change to using the tool what is my ip IP and location of the server looks as follows (IP deliberately Blur because the interests of privacy):

what is my ip

After I enter the proxy would look as follows:

How to change IP with Proxy

All identities will be changed by entering the proxy.
Follow these steps to change the IP
In the Browser tap  Tools> Options , then the box will pop up the following configuration

mozilla option tab

Then select Advanced> Network> Settings , will appear as follows:

mozilla advanced option tab

Fill HTTP Proxy with your Proxy, for example I use data
IP: 89.97.232.161
Port: 80
Country: Italy

Then press the OK to terminate. You can find out your computer with the new IP tool what is my IP . while for some you can use proxy to download Proxy here.
If still you are facing problem regarding my post then you can mention in your comments.
Good Luck :)


Monday, 6 February 2012

How to speed up internet without any software | Full Tutorial

How to speed up internet without any software | Full Tutorial

Well in my this creation i will teach you, how to speed up your internet without any software. Its just a game of registry edit.

Yeah you can speed up you net by this tutorial. So lets start how it works and what you need to do :)

For Windows 2k/XP

1. First, open the Windows Registry using Regedit, and (after backing up) navigate to:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\ServiceProvider

2. Note the following lines (all hex dwords):

Class = 008 ( biggrin.gif - indicates that TCP/IP is a name service provider, don't change
LocalPriority = 1f3 (499) - local names cache
HostsPriority = 1f4 (500) - the HOSTS file
DnsPriority = 7d0 (2000) - DNS
NetbtPriority = 7d1 (2001) - NetBT name-resolution, including WINS

3. What we're aiming to do is increase the priority of the last 4 settings, while keeping their order. The valid range is from -32768 to +32767 and lower numbers mean higher priority compared to other services. What we're aiming at is lower numbers without going to extremes, something like what's shown below should work well ;)

4. Change the "Priority" lines to:

LocalPriority = 005 (5) - local names cache
HostsPriority = 006 (6) - the HOSTS file
DnsPriority = 007 (7) - DNS
NetbtPriority = 008 ( biggrin.gif - NetBT name-resolution, including WINS

5. Reboot for changes to take effect.



For Windows 9x/ME

1. The tweak is essentialy the same as in Windows 2000/XP, just the location in the Registry is slightly different. For a more detailed description see the Windows 2000/XP section above

2. Open the Windows Registry using Regedit, and (after backing up) navigate to:

HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\VxD\MSTCP\ServiceProvider

3. You should see the following settings:
Class=hex:08,00,00,00

LocalPriority=hex:f3,01,00,00
HostsPriority=hex:f4,01,00,00
DnsPriority=hex:d0,07,00,00
NetbtPriority=hex:d1,07,00,00

4. The "priority" lines should be changed to:

LocalPriority=hex:05,00,00,00
HostsPriority=hex:06,00,00,00
DnsPriority=hex:07,00,00,00
NetbtPriority=hex:08,00,00,00

5. Reboot for changes to take effect


System.ini IRQ Tweak - Windows 9x/ME ONLY

1. Find your Network Card's IRQ

1. In order to add the entry to your System.ini file, you'd first have to find your NIC's IRQ

2. Right-click on My Computer icon on your Desktop, then left-click on Properties (a shortcut for that would be to press the 'Windows' + 'Pause' keys). Navigate to Device Manager and double-click on Computer. Under "View Resources" you will find a list of IRQs, each with description of the device that's using it. Note the IRQ number used by your Network Adapter

2. Adding the entry to System.ini

1. Once you've found the IRQ of your Network Card, you need to reserve some RAM for its use, by adding an entry to the System.ini file. You can edit the file in any text editor, however the easiest way is to use Windows' built in "System Configuration Editor"

2. Navigate to Start > Run and type sysedit . Find the [386enh] Section in the System.ini file and add Irq[n]=4096 under it, where [n] is the IRQ number of your NIC and 4096 is the amount of RAM you want to reserve in Kbytes. We recommend using 4096, however you can experiment with different values if you want. Save changes in the file, exit and reboot for changes to take effect.

Note: If you choose to try different values, keep in mind that reserving too much RAM for your NIC will decrease the amount of RAM available for applications, while reserving too little might not give the desired effect. It is the one of the great creativity of Vivek Creations Now some additional thoughts.


3. Additional Thoughts


1. The only negative effect of the System.ini IRQ tweak is that it will reduce the amount of RAM available for running applications a bit, by reserving some specifically for your Network Card's use. The gain in performance usually outweighs the negative effect by far, considering any Computer with 32Mb of RAM or more

2. This tweak may or may not work for you. It is not a documented tweak by Windows

3. Keep in mind that if you add hardware to your system the IRQ of the Network Adapter might change, in which case you will need to modify the setting in System.ini

4. In systems with multiple NICs, you might want to add the setting for both IRQs. Also, you could reserve RAM for other IRQs if you wish, just use common sense and don't forget it reduces the amount of RAM available for running applications

5. If you are using an USB device, it does not have a specific IRQ, however you can try adding the entry using the IRQ of the USB Controller

6. For internal Cable Modems, you'd have to add the entry using the IRQ of your modem, rather than the IRQ of a Network Card.


RESULTS WILL VARY


No matter how good your systems may be, they're only as effective as what you put into them. Enjoy my creations and keep yourself updated here for more interesting tutorials.
Do you want more tutorials related to Windows or Registry ?
If you want to read them all then simply Click Here



Sunday, 5 February 2012

Delete any Facebook profile in 24 hours | Full tutorial

Delete Facebook profile

Actually this is not a hacking tutorial. Its only a trick by which you can delete the facebook profile of anyone. Yeah anyone ;)
This is my creation about the facebook security, so how it works what we need and how to do this ? Let me explain you in detail. If you want any help or suggestion then you can submit it in comments thanks for reading this tutorial of vivek creations Read more interesting post about Facebook here.
So, lets do it in some steps.

Step 1 : 


https://www.facebook.com/help/contact.php?show_form=memorialize_special_requests

Click Here first
This is the Url we will use to Report our slave. This Form allows you to report a deceased person (someone who is dead).



Step 2 : 


Complete the Fields: 
Explain: Full Name: Your Victims Full name(Name last name)

Date of birth: Go at his profile and click at Info tab and get his date of birth.

Account Email Addresses: Do the same thing, go to his profile and click on info tab and get his email addresses.

Networks: Again,go to his profile and click on Info tab and get his networks, copy them and paste in the form.

Web address of profile you would like to report: Just go to his profile and copy the link in the address bar.

Relationship to this person: To make more believable select Immediate Family.

Requested Action: Remove Profile Proof Of Death: This is the hardest part of this form. 
Now to make a proof of a death just Google in your language a "Death Certificate" or "Certificate of a Death". 
It doesn't matters from what country you are, Download any death certificate and edit it with the help of photoshop.
Save your image to desktop and upload it in one of the Image Free Hosting like: http://imageshack.us 
And it's done.



Yeah that is only the trick and that is only the creation. Think Think! Wink Wink ;) ;)


Now,


Additional Information: Write what you want, just write that you are in his/her family and you would like to close his/her Facebook account because you won't like that when he is dead, his Facebook is opened.
Attachment includes the note and its objects.


Finally Submit and wait for 24 hours. Please don't misuse my creation. Its only a service of facebook.
Thanks for a visitor of my creations.
If you want updates of our site than you can subscribe yourself through email. Just take a look on Right top of my site.


Read Also:

How to convert a Facebook profile to a Page

Mask My IP 2.2.5.6 | Full version Free Download

Mask My IP 2.2.5.6
Mask My IP 2.2.5.6 | 5.3 Mb

When you connect to a network, your computer has a unique identification IP-address as your home address, alerting everyone who you are and where you are. When you visit online stores, or send an e-mail, your IP address associated with this activity, and it identifies you personally. Hackers who steal personal data can get into your computer, monitor your activities, to steal your personal information. Mask My IP program will help to solve this problem. 
Key Features: 
- Hide Real IP Address 
- Surf Anonymously 
- Block ISP Eavesdropping 
- Guard Against Hackers 
- Prevent Identity Theft & Credit Card Fraud 
- Protect All Connections Including Wi-Fi 
- Defend in the Forum once be banned 
- Send Anonymous Emails 
- Easy & Effective 
- Auto / Manual IP Changing 
- 100% Clean & Safe 
- Compatible With A lot

Home Page - http://www.mask-myip.com/
Setup
+
Crack
Mediafire
4shared
2shared

Thursday, 26 January 2012

How to Prevent a website from SQL Injection Attack | Full Tutorial


A SQL injection is a common programming error the consequences of which can be really devastating. Many successful hacking attacks start when a hacker discovers a vulnerability that gives an opportunity to inject SQL code.

When an SQL injection occurs, the structure of an SQL query is compromised and as a result you are left at the mercy of the potential hackers. If there is a vulnerability found, hackers can exploit it to gain access not only to your site and database but in extreme cases also to your corporate network. When hackers can inject their code in your code, they can do what they want.

Why do SQL injections happen so often?


The shortest answer is that SQL injections are so popular because of poor programming. Hackers know about the potential of a successful SQL injection attack and they search for vulnerabilities. Unfortunately, very often they don’t have to search hard – vulnerabilities pop right in their face. On the other hand, the risk for a hacker from executing an SQL injection is minor, while the potential rewards are lucrative. What else could a criminal ask for?
Therefore, don’t rely that hackers won’t bother with your site and don’t leave the door widely open. Nobody says that each vulnerability of this type will turn into an attack but it’s not wise to take any chances. The good news is that fortunately, SQL injections are also relatively easy to prevent.

Steps to prevent a SQL injection attack


Basically, there are two fire-proof ways to make an SQL injection impossible:


  • Don’t use dynamic database queries.
  • Don’t accept user input in queries.

However, obviously these two steps can’t be done because if you follow them, then the sites you can create will be very static and in today’s Web this is not a solution. What you can do, is minimize the risks when using dynamic queries and user input. Here are some basic principles that apply to any programming language:

1. Patch your SQL server regularly


Before we get into the coding part of the advice how to prevent an SQL injection, we need to start with the fundamental issues. SQL injections might be a frequent programming error but they aren’t the only way for a hacker to break into. If your underlying software – i.e. the database and the operating system have vulnerabilities, then your efforts to secure your code become obsolete. This is why you should always patch your system, especially your SQL server.

2. Limit the use of dynamic queries

As I already mentioned, dynamic queries are the door to SQL injections. Of course, it might not be realistic to expect that all dynamic queries can be trashed right away but some of the ways out are stored procedures, parameterized queries, and above all – prepared statements. The exact approaches vary from one programming language to the other but basically any programming language offers good substitutes of dynamic queries.

For instance, the PreparedStatement() with bind variables in Java, or the SqlCommand() and OleDbCommand() with bind variables in PHP, or strongly typed parameterized queries with bindParam() in PHP are all possibilities to explore.

3. Escape user input


The second biggest evil for SQL injections is user input. While you can’t always avoid user input completely, the next best thing is to escape it. Escaping user input doesn’t do as good job as limiting dynamic queries but still it can stop many SQL injection attacks. For instance, if you are using PHP, for GET and POST, use htmlspecialchars() to escape XSS characters and addslashes(), in case you using database. Alternatively, you can escape user input from inside your database but since the exact code varies from one database to the next, you should check with the docs of your database for the exact syntax to use.

4. Store database credentials in a separate file

In order to minimize the damage in case of an SQL injection attack, always store database credentials in a separate file. This way even if a hacker manages to break in, he or she won’t benefit much.

5. Use the principle of least privilege

The principle of least privilege is a security cornerstone and it applies to SQL injections as well. For instance, when you grant a user access only to the tables he or she needs rather to the whole database; this drastically reduces the damage potential.

6. Turn magic quotes off

Turning the magic_quotes_gpc variable off can also stop some SQL injection attacks. Unfortunately, this isn’t always a reliable measure because sometimes magic quotes might be off and you are unaware of this but still it is better than nothing. In any case, you need to have code to substitute quotes with slashes. Here is the simplest way to do it:

if (!get_magic_quotes_gpc()) {
$username = addslashes($username);
$password = addslashes($password);
}

7. Disable shells


Many databases offer shell access which essentially is what an attacker needs. This is why you need to close this door. Consult your DB’s documentation about how to disable shell access for your particular database.

8. Disable any other DB functionality you don’t need

In addition to the shells there are many other functions in a database you don’t need. While not all of them are a security risk, the general rule here is that less is more. Just remove or at least disable any functionality you can do without.

9. Test your code

Finally, the last step to ensure your code is SQL injections-proofed is to test it. There are automated tools you can use to do this and one of the most universal is the SQL Inject Me Firefox extension. This tool has many options and many tests the best is if you have the time to run all of them.

All these steps to prevent an SQL injection are relatively easy to implement but failing to do so could make a huge difference. If you stick to these rules, you will drastically reduce the risk of your site being compromised via a SQL injection. Still, you can never be 100 per cent sure that you are completely protected against such an attack (or any other type of attack, to be more precise) and this is why you need to keep an eye on your logs so if a breach occurs, you will know it right away and react appropriately to minimize the damage.

For more about website security you can visit my all posts on WebSite Security
Thanks for reading this creation.
Be updated always here :)

Friday, 20 January 2012

How to Convert Firefox into keylogger


Do you want create your own working undectable keylogger and without any programming knowledge.The keylogger can store all the usernames and passwords of mozilla firefox without the user’s consent. So i am going to teach you about the hidden tricks of mozilla on how to convert your mozilla into a keylogger or you can say your own keylogger :)

How this Keylogger Works?


Whenever you login into any website using mozilla firefox browser it always ask’s you whether you want to Save password or not for that website.
We will be using a script that will not give the user option to save the password instead it will automatically save the passwords without user’s consent and we will retrieve them later.

Can this be detected by antivirus?
I have scanned it with Mcafee,Norton and Avast and it is totally undetectable.

Does It work on all websites?
It is working on almost all websites like facebook,hotmail,reddit and digg.But this trick somehow failed on Gmail.
Now I will give you the step by step tutorial on how to use this trick.
  1. Download this script here
  2. Now go to the following address
If you are Windows user then goto
C:/Program Files/Mozilla Firefox/Components

If you are MAC user then goto
Applications > Right click Firefox > Show Package Contents >Contents/MacOS/Components
  1. Now find a file nsLoginManagerPrompter.js and copy it to somewhere safe location because we will be replacing this file in next step.
  2. Extract the script folder that you have downloaded in first step and copy and paste the nsLoginManagerPrompter.js from the folder to the folder mentioned in step 2.
  3. So now your firefox keylogger is ready.Now Each and every username and password will be automatically saved.
The next step is to retrieve the username and passwords that have been stored in your firefox browser.
It is very easy to retrieve the password from firefox using firepasswordviewer. (Click Here) For more detail about

Decrypt Passwords Stored in Firefox With FirePasswordViewer

Monday, 16 January 2012

Youtube Videos Download Trick 2012

Youtube videos now you can download without any software of any other resources websites.
Its normally a trick to grab the youtube videos in seconds..
So what you need to do. Ok let me share this creation.

Firstly open the video page of youtube (The video which you want to download)
Like this:

Now simply add ss Just before the word youtube in the url.
Like this...

And HIT Enter :)
You have done.. 
Now you see a new webpage where the downloading link appears in different formats. Just enjoy the new creations. And read the more latest creations related to web.



Sunday, 15 January 2012

Trick to bypass Mobile verification of any site

I know most of the peoples dont like the mobile verification term of websites. Its commonly used by Gmail, when you try to make multiple email ids with same ip then gmail ask for mobile verification to create the account. And unfortunately if you dont have any cell phone means you cant use email service.
Yeah it sucks..
But after some searching i have search out a website which is the world's leading web-based unified messaging system that channels your free voicemail and fax messages directly to your e-mail.

Overall means you can bypass/skip the step of mobile verification :)

In this creation i am going to teach you about how to bypass the mobile verification of any site.
So here are the steps.

1. First of all go to http://k7.net/. and sign up there.
This is a site where you can receive fax or voice calls without having a phone no. When you create an account on this site, it will provide you an unique phone no. of US.

2. Now go for creating account on gmail, enter all the information as you want, but in Location fill 'United States'.

3. Now click on 'I accept, create an account'.

4. Now it will take you to mobile verification page. Here select the option of Voice call and fill the no. that you got from k7.net.

5. Now you will get a mail having verification code as voice mail on that account from which you have registered on K7.net. Open it, download the attachment file and listen the code.

6. Now enter the code of your voice mail in verification code. and click OK.

7. Yuppiiee, your account is ready now :)

Saturday, 14 January 2012

Admin finder perl script


The things you need 
1. Active perl (click here to download)
2. admin finder script (click here to download )

Install the active perl and extract the archive in to “c:\perl\bin” now go to start > run and type CMD andhit enter now type “cd c:\perl\bin” and hit enter after that paste the perl script name  “admin_CP_finder.pl ” and just hit enter now enter the site which you want to find admin penal and hit enter (I have hide my site) and now enter the source code of the website (my site have asp source codeso I have added 2) and just hit enter. you will found the admin penal.
Happy hacking.


Wednesday, 11 January 2012

CODE THAT FORMATS UR ENEMEY'S COMPUTER.........PLZZ DON'T TRY DIS IN UR PC

Paste the below code in a notepad file:

0100101100011111001001010101010101

Save the file as
'whateveryouwish.exe'
When you open it, the hard
disk formats!!!
You can keep this file in
your school's computer in a
far-off folder.
At first
rename it and send a
shortcut to desktop. Now
hide the original file. Change the icon of the
shortcut to that of My
computer and rename it as
'My Computer' and delete
the original 'My computer'. When someone tries to
open it....BOOOM!!!
If you are unable to format
C drive when the victim's
PC is running, then you can
use the following line of
code:

0110011001101111011100100110110101
100000011000110011101001011100
0010000000101111010100010010111101


It's extremely cool!!! How about making the
computer not to boot in
the first place??
Then use this code:

0110010001100101011011000010000000
101111010100110010111101010001
0010000001100011001110100101110001
101111011101000010111001101001
0110111001101001


You will be astounded at
the result when someone
tries to restart the PC!
NOTE : THIS IS JUST FOR
EDUCATIONAL PURPOSE......

Saturday, 7 January 2012

How to Uninstall Backtrack 5 Dual Boot Win 7


It’s not uninstall actually, hha just simply delete it.
after a month i tried to use backtrack 5, i found out that my disk space allocated for backtrack 5 was nearly empty, 10 GB was too small. So i’d like to add new disk space, but i haven’t found the way to do it. I came up with uncool steps.
1. Remove old backtrack installation
2. Reinstall backtrack with new disk space allocation
to remove backtrack installation, which is dual booted with windows 7, i have to make sure my windows 7 can still work well. after googling, i got the message to do fixmbr to recover windows 7 boot manager. so here are the steps.
A. Fixing windows 7 boot manager
1. prepare your win7 installation disk (dvd/usb), plug it in.
2. start your computer, set the boot priority from bios setting (first boot usb, or cd/dvd room)
3. when windows 7 installation comes up, choose repair
4. choose repair this computer with recovery tool, click next
5. choose command prompt
6. enter this command
bootRec.exe /fixmbr
7. reboot your computer
B. Remove backtrack
1. now your computer should start the win 7 automatically
2. go to control panel > System and Security > Administrative Tools > Computer Management > choose Disk Management (under storage properties)
3. u will see clearly your computer partitions, delete your backtrack partition by right click > delete Volume
4. after it is deleted you will have new disk space and u can expand your other windows partition.

Thursday, 5 January 2012

How To Block Websties Without Software


Steps:

1] Browse C:\WINDOWS\system32\drivers\etc
2] Find the file named "HOSTS"
3] Open it in notepad
4] Under "127.0.0.1 localhost" Add 127.0.0.2 www.sitenameyouwantblocked.com , and that site will no longer be accessable.
5] Done!

-So-

127.0.0.1 localhost
127.0.0.2 www.blockedsite.com

-->www.blockedsite.com is now unaccessable<--


For every site after that you want to add, just add "1" to the last number in the internal ip (127.0.0.2) and then the addy like before.

IE: 127.0.0.3 www.blablabla.com
127.0.0.4 www.blablabla.com
127.0.0.5 www.blablabla.com

etc

Wednesday, 4 January 2012

How to build a black box? (Full Tutorial 2012)


How to build a black box?

I found this tutorial quite a long time ago and I don't know if it still works. Nevertheless , it might be interresting to read, you might even learn something from it! I would have gladly given credit to it's author but won't since I have no idea who he is. So here is his tutorial that remained unchanged ( I hope!):

A BLACK BOX
is a device that is hooked up to your phone that fixes your phone so that when you get a call, the caller doesn't get charged for the call. This is good for calls up to 1/2 hour, after 1/2 hour the phone Co. gets suspicious, and then you can guess what happens.

What this little beauty does is keep the line voltage from dropping to 10v when you answer your fone. The line is instead kept at 36v and it will make the fone think that it is still ringing while your talking. The reason for the 1/2 hour time limit is that the
phone CO. thinks that something is wrong after 1/2 an hour of ringing.

All parts are available at Radio Shack. Using the least possible parts and arangement, the cost is $0.98 !!!! And that is parts for two of them! Talk about a deal! If you want to splurge then you can get a small PC board, and a switch. There are two
schematics for this box, one is for most normal fones. The second one is
for fones that don't work with the first. It was made for use with a Bell
Trimline touch tone fone.

** Schematic 1 for most fones **
** LED ON: BOX ON **

FROM >--------------------GREEN-> TO
LINE >--! 1.8k LED !---RED--> FONE
!--///--!>--!
! !
------>/<-------
SPST



Parts: 1 1.8k 1/2 watt resistor
1 1.5v LED
1 SPST switch

You may just have two wires which you connect together for the switch.


** Schematic 2 for all fones **
** LED ON: BOX OFF **

FROM >---------------GREEN-> TO
LINE >------- ---RED--> FONE
! LED !
-->/<--!>--
! !
---///---
1.8k
�Parts: 1 2 watt resistor
1 1.5v LED
1 DPST switch


Here is the PC board layout that I recommend using. It is neat and is very easy to hook up.

Schematic #1 Schematic #2

************** ****************
* * * ------- *
* --<LED>--- * * ! ! *
* ! ! * * ! <SWITCH> *
* RESISTOR ! * * ! ! ! *
* ! ! * * ! ! / *
* -------- ! * * ! ! *
* ! ! * * ! <LED>! / *
* --SWITCH-- * * ! ! *
* ! ! * * ! ! / *
L * ! ! * F L * ! ! ! * F
I>RED- -RED>O I>RED- ---RED>O
N>-----GREEN---->N N>-----GREEN------>N
E * h * E E * * E
************** ****************

Once you have hooked up all the parts, you must figure out what set of wires go to the line and which go to the fone. This is because of the fact that LED's must be put in, in a certain direction. Depending on which way you put the LED is what controls what wires are for the line & fone.

How to find out:

Hook up the box in one direction using one set offor line and the other for fone.

*NOTE* For Model I switch should be OFF.
*NOTE* For Model ][ switch should be set to side connecting the led.

Once you have hooked it up, then pick up the fone and see if the LED is on. If it is, the LED will be lit. If is doesn't light then switch the wires and try again. Once you know which are which then label them. *NOTE* - If neither directions worked then your
�lable the switch in its current position as BOX ON.

How to use it:

The purpose of this box is for poeple who call you not to pay so it would make
sence that it can only be used to receive! calls. When the box is *ON* then you may only recieve calls. Your fone will ring like normal and the LED on the box will flash. If you answer the fone now, then the LED will light and the caller will not be charged. Hang up the fone after you are done talking like normal. You will not be able to get a dial-tone or call when the box is on, so turn the box *OFF* for normal calls. I don't recommend that you leave it on all the time, as you don't want it to answer when Ma Bell calls!

Hope it brought something to those who read it.
- Vivek Creations

Free World Dialup | Free Calls by just a little bit brain


Free World Dialup

Free World Dialup - http://www.freeworlddialup.com/
"Use FWD to make real, free phone calls using your favorite telephone, computer or PDA and any broadband connection. Call your neighbor or a relative, next door or in another country; all with the same ease, speed, and high quality." Thanks to Jeff Pulver and his crew!

Quick summary:

1 - First, got to http://www.freeworlddialup.com and sign up to get your FWD # and password.
2 - Download http://brands.xten.net/x-litefwd/download/X-LiteFWD_Install.exe FWD/X-Lite ("self-configures") program or go to http://www.myphonebooth.com/ to call any FWD # and U.S. toll free #s using Internet Explorer (Firefox not supported).

Quickstart Guide: http://www.freeworlddialup.com/support/quick_start_guide
FWD Xlite Configuration Guide: http://www.freeworlddialup.com/support/configuration_guide/configure_your_fwd_certified_phone/fwd_xlite/all
MS Windows Messenger Configuration Guide: http://pulver.com/fwd/fwd30news.html#messenger (FWD supports Windows Messenger 4.6/4.7 but not MSN Messenger 5.x.)

3 - To call a U.S. landline/cell #, dial *+arecode+7digit#. (This FWD feature is not listed on their website, but has been working for several months now.)

4 - To call a FWD # from a PSTN (your regular phone), click
http://www.dslreports.com/r0/download/476274~3ccc4c9edbe2a596714a4fd9da897204/fwdaccessnumbers.zip or after you've signed up go to FWD web page, click on "Features", "Access #s" for a list of FWD access numbers in your area. Available in several states in the U.S., UK, NL and DE at this time.

Packet8:
-- To call a P8 phone # from a FWD phone: Dial **898 + 1 + P8 number to be routed to P8 service.
-- To call a FWD # from a P8 phone:
*If the FWD # you are calling contains 5 digits, start to dial with the prefix 0351. For example: 035112345
*If the FWD # you are calling contains 6 digits, start to dial with the prefix 0451.

Call UK:
Get a UK telephone # that will call you on your FWD #. Register http://fwd.calluk.com.

FWD Features: Some features like Voice email needs to be activated at http://www.fwdnet.net

Internet Calling
Call Waiting
CallerID
Missed Call notification
Call Forwarding
Call Transfer
Three Way Calling
Voice email
SoftPhone, IP Phones & *Web-based
Aliases
Whitepages directory
ENUM Entry
eDial SOAP
Conferencing
Instant Messaging
Web Calling/FWD-Talk
Corporate Cisco Call Manager Connection
Calling to Toll Free Numbers in the UK, US, NL, JP and FR TellMe Service (411).
-- NL Dial *31(800)... to reach Netherlands toll free #s.
-- UK Dial *44(800)... or *44(808)... or *44 (500) to reach UK toll free #s.
-- US Dial *1(8xx) xxx xxxx to reach United States toll free #s.
-- JP Dial *81 0120... to reach Japan toll free #s.

Frequently used numbers
613 Echo test
55555 Volunteer Welcome Line
514 FWD Coffee House
612 Time
411 TellMe Information
611 Part Time Technical support
511 FWD Conference Bridge

At the moment, I think this is way better than Skype, Yahoo IM voice chat, etc...I've been using FWD for over a year with my cable broadband service and didn't have to set up any port forwarding on my broadband router. Obviously you'ld need a mic/speakers connected to your PC.

You can also use your regular telephone via an adapter http://voipstore.pulver.com/product_info.php?products_id=32 and IP phone http://voipstore.pulver.com/product_info.php?products_id=33. Adapters and IP phones from different vendors like Cisco are available.

* Broadbandreports.com VoIP forum (formerly known as DSLReports.com)

Create An Ftp Server On Your Pc With Serv-u


Requirements:
Serv-U
No-IP.com Website

Quote:
Step 1. Getting a static IP address.
Get a static address for your FTP server. You will want to do this as opposed to using your IP address for several reasons. First, it’s easier keeping up-to-date. Imagine having to change all of your setting every time your IP changed. With No-IP, the No-IP service runs in background on your computer and updates your current IP address with your FTP server’s URL (for example, you get ftp://rkchoolie.serveftp.com). Second reason, you don’t want your IP address posted out there for everyone to see.

1. Go to www.No-IP.com to create a new user account.
2. Fill in the information that is required and the click Register button.
3. Your account has now been created and your account password has been emailed to you.
4. Check your email mailbox and wait for the mail that contains your password
5. Go back to www.No-IP.com and type your email address and password to login to your account.
6. Once in your account, click on Add a host in the left menu
7. Type in the Hostname you want (example: rkchoolie) and pick a Domain from the list (example: ftpserve.com)
8. Check Allow Wildcards and click the Submit button
9. You now have your static address (example: rkchoolie.serveftp.com)
10. Click on your OS link in the Dyn-Update Client in the bottom right menu and follow links to download the client
11. Once downloaded, install the software and type in your email address and password when asked.
12. Finally tick the checkbox near your static address.

You now have a static web address .


Quote:
Step 2. Installing and setting the FTP server
1. Install Serv-U 4.0.
2. Start Serv-U and use the wizard to setup your ftp.
3. Click next until you're asked for an IP address, leave it blank and then click next.
4. Type the domain name you've just registered above (example: preacher.serveftp.com) in the domain name field and then click Next.
5. You are asked if you want to allow anonymous access, select No and then click next.
6. You are then asked to create a named account, check yes and then click next.
7. Type in the user name you wish for this account (example: Harrie) and click next.
8. Type a password for this account (example: $p3c1aL). For security reasons, try to create a password with some letters, numbers and special characters. Then click next.
9. You will then be asked for the Home directory of the account you just created. Select the directory and then click next.
10. Select yes to lock this account to the Home directory. You want to do this so that the user can not go any further up that his home directory. Click next.
11. The account is now set so click finish.

Quote:
Step 3. Configuring user accounts
1. In the left tree-menu, select the account you've just created and then click on the General tab.
2. Check Hide ‘Hidden’ Files.
3. Check Allow only and enter the number one in the box.
4. Set the Max. download speed to what ever you want. If this is an account that many will be using, set it low to save on your bandwidth. I usually have mine set between 10 – 20. If you leave it blank, users will be able to download from you at full bandwidth.
5. Set the Max no. of users to how many you want to be able to log on at one time. This depends on your connection speed but try these (56 - 1, ISDN - 3, ADSL or cable - 5-6 users.)
6. Now, click on the Dir Access tab.
7. You should see the home folder in there. Highlight it and make your permissions.
8. If you only want users to be able to download check only Read, List, & Inherit.
9. If you want users to be able to upload, but to only one particular folder but not download, click the add button and then select that folder. Now highlight the folder and set these permissions on that folder. Check Write, Append, List, Create, & Inherit. Once you have made the permissions click on the up arrow that is located at the bottom right-hand corner. You want this special upload folder to be list first, before the home folder.
10. If there is a folder that you don’t want anyone to have access to, but it is inside the home folder, then click the add button and then select that folder. Now highlight the folder and make sure that all checkboxes are left. Once you have made the permissions click on the up arrow that is located at the bottom right-hand corner. You want this no access folder to be listed at the very top.
11. There are many other different sets of permissions you can play with. I just covered your basics.
12. Your server is now set!
13. Try logging on with the username and password and see if it works.