Sunday, 18 March 2012

Facebook Likes Bot | Free Download

When we explore the virtual world must be familiar with the term BOT.


Bot is one of the clients are connected to an automatic system that does not directly controlled by humans. A bot to react to commands that are recognized by the action already known.

Bot is available in many formats, ranging from simple and that operates through a script on the server, up to a full and robust botyang.


I will not discuss here one by one type of BOT, but I will try to introduce one of the BOT DESKTOP that is only for entertainment only.
Why is the desktop boots, because the bot does not run on a server script like a bot, this bot is shaped desktop application and runs on personal computers, so if the computer does not run the bot will not run.

Bot the function I made up that this is the BOT is, where the bot will do some action like a facebook user to do, namely LIKE STATUS, STATUS to CONFIRM COMMENT Requests automatically. Maybe for those who have been using a version before is not so confused, because it's for a single bot bot is a development which I have previously made, of course, with some improvement-improvement.

Here are details on the new bot.


 Application Name: FB GENERATOR AUTO COMMENT & LKE +

 - Version: 4.1.3
 - Release: July 19, 2011
 - Facebook: https://www.facebook.com/vivekcreations

===== =============================================
1. LICENSE
================================================= =
 - FB & Auto Comment Generator Like + is not a paid software (freeware)
 - Abuse of the use will result in termination of service bot

=========================== =======================
2. Updates 
================================================= =
 - A new look and can be configured
 - Confirm friend requests Auto
 - Auto Logout of FB if the application is stopped
 - Suport Systray
 - Target can be selected
 - the target exception (ID)
 - Signature can be edited (if signature is fix)
 - Fix:  Comments repeated in the same shipment that makes spam


====================================== ============
3. USE 
================================================= =
 - connect to Facebook (Connect button)
 - Login to your account via the browser in an application
 - Settings
   > Fill a comment (for Auto Comment)
   > Check [Friend Mention] to call the friend's name in a comment
   > To exclude someone from the BOT action, setting the expection
   > Select the target bot
   > Set the time interval 
 - Start

A. Front View

Facebook Auto Like Bot

2. Display Settings 

For this setting, the user can freely determine the action of bot, what your target and what comments will be sent.

    - COMMENT: Textbox will be filled if we choose the action bot = Auto comment
    - SIGNATURE: To provide a signature at the end of the comment.
    - Mention FRIEND: For the name of a friend in the comments.
    - KEY EXCEPTION: To set an exception.
    - TARGET: Target bot ;)
    - INTERVAL: Recurrence time it takes the bot to perform an action

Facebook Auto Like Bot

3. Exceptions settings.

    Click the Add / [+] and enter the ID facebook from friends who would be excluded
    Click the Remove / [-] to eliminate the exemption
    Kemudiaan click [SAVE] to save.

Facebook Auto Like Bot

4. Bots can also be arranged through the Systray (hidden application conditions)

Facebook Auto Like Bot

Note: All settings will be saved and loaded automatically when the bot is run.


Downloading Password: 123


How to fix Windows Counterfeit Error


Start Windows Registry editor and delete the folder "WGALOGON" located in the following location:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows NT\CurrentVersion\WinlogonNotify.

Delete all references in your registry to WgaTray.exe

Another alternative suggest that three files are installed Windows XP System Folder:

\WINDOWS\system32\WgaLogon.dll
\WINDOWS\system32\WgaTray.exe
\WINDOWS\system32\LegitCheckControl.dll

The wgatray.exe process makes the check for genuine windows software. You can disable WGA by removing the execute bit on WgaLogon.dll. That way, winlogon can't call it as a notification package at boot, and since WgaLogon is responsible for running and maintaining WgaTray.exe, no more tray popups either.

To change the execute bit of WgaLogon.dll, first turn off Simple File Sharing.
Now right click the file in Windows Explorer and open the Security Tab. Hit the Advanced button, uncheck the Inherit box at the bottom, hit the Copy button, then hit OK. Go through each listed user/group and remove the "Read & Execute" permission for that file, leaving the "Read" permission as-is.

Hit OK to apply the permission changes and close the file properties dialog. Restart the machine. You can now turn "Use simple file sharing" back on, if you want.

A third alternative posted on the internet suggest that users clear the content of file data.dat located in the following directory:
C:\Documents and Settings\All Users\Application Data\Windows Genuine Advantage\data

Save the data.dat empty file and change the attributes to "Read Only" - Restart you computer.
Or start your PC in Safe Mode and delete the following files from Windows system32 folder - wgalogon.dll spmgs.dll wgatray.exe The WGA setup file is in C:\WINDOWS\SoftwareDistribution\Download\6c4788c9549d437e76e1773a7639582

If you don't use "Fast User Switching", you can disable the Windows XP Welcome Screen if you are logged in as an Administrator. This will remove the initial WGA Warning Screen:

1. Click on Start -> Control Panel ->User Accounts
2. Click on "Change the way users log on or off"
3. Uncheck "Use the Welcome Screen" - Choose Apply
4. Close the User Accounts window and the Control Panel
5. The next time you reboot your computer, the classic login prompt will be used

To enable Fast User Switching, you must also enable the Use the Welcome screen option. Also, Fast User Switching cannot be used when Offline Files are enabled.

Disable wgatray.exe - Some users are claiming that removing the WGATray.exe (or killing the WGATray.exe process) are working for them.

None of these methods are guaranteed to work and people are just experimenting. Meanwhile Microsoft is not willing to relent to crackers this time and are planning to release an update of WGADiag2.exe utility in the next few days.

WGADiag2 will also fix the problem with registry key permissions may cause the installation of Windows Genuine Advantage Notifications KB905474 to fail from Windows Update:

Here's a manual fix provided by Microsoft. These permissions can be repaired using Registry Editor as follows:

1. Click Start, and then click Run
2. In the Open box, type regedit, and then click OK
3. Expand HKEY_CLASSES_ROOT
4. Locate the subkey HKEY_CLASSES_ROOT\LegitCheckControl.Legi…
5. Right-click the subkey and select Permissions….
6. Ensure that Administrators allowed Full Control permission
7. Repeat steps 3-6 for the subkey
HKEY_CLASSES_ROOT\LegitCheckControl.Le…

Microsoft has also published a kB article if the Windows Genuine Advantage (WGA) validation check process does not validate successfully on a Microsoft Windows XP-based computer, and you receive one or both of the following error messages:

Product Key Inaccessible 0x80080212

This problem occurs when you do not have the appropriate permissions for the Windows Genuine Advantage\Data folder. In the Permissions for Users section, make sure that Read & Execute, List Folder Contents and Read permissions are given. If the previous steps fail, start the computer in Safe Mode and rename the %allusersprofile%\Application Data\Windows Genuine Advantage directory.

Saturday, 10 March 2012

Online Port Scanner | Free Scripts Download

online port scanner by- Vivek Creations


Port Scanner v 1.7  is a online application designed to probe a server or host for open ports. This is often used by administrators to verify security policies of their networks and by attackers to identify running services on a host with the view to compromise it.

What is Port Scanning ?


A port scan or portscan is "An attack that sends client requests to a range of server port addresses on a host, with the goal of finding an active port and exploiting a known vulnerability of that service."


online port scanner by- Vivek Creations

Port Scanner v 1.7 Is a powerful PHP Port scanner which is created by Vivek Creation to scan ports for a given IP address.

Download Links for Port Scanners scrtips:

Goto Our Online Port Scanner v 1.7 -- > Here

Friday, 9 March 2012

Best Linux Distributions

What is the best linux distribution for you ?

There are various approaches to answering this question. The broad answer is: "any of them," but that's not very helpful if you're just looking for a place to start.

The problem is, there never can be one best Linux distribution for everyone, because the needs of each user tend to be unique. Telling someone who's looking for a good introductory distribution to try Gentoo, for instance, would be a mistake because for all its positive qualities, Gentoo is decidedly not a beginner's distro.

All too often, Linux aficionados will tend to list the distributions they like as the best, which is fair, but if they are not aware of their audience, they could suggest something that does not meet that person's needs. Finding a good Linux distribution is like finding a good match in an online dating service: good looks aren't the only quality upon which to judge a Linux distro.

To help users discover the Linux distribution that's best for them, this resource will definitively list the best candidates for the various types of Linux users to try. The use-case categories will be:
  • Best Desktop Distribution
  • Best Laptop Distribution
  • Best Enterprise Desktop
  • Best Enterprise Server
  • Best LiveCD
  • Best Security-Enhanced Distribution
  • Best Multimedia Distribution
Best Linux Desktop Distribution

There are a lot of Linux distributions that have the primary focus of becoming the next best desktop replacement for Windows or OS X. Of all the categories in this list, this is the most sought-after, and contentious, group of distros.

While it would be ideal to include many distributions on this list, the reality is that there really needs to be just one "best" Linux distribution. For early 2010, that distro has to be Canonical's Ubuntu.

linux distros- Ubuntu

Ubuntu edges out its closest contenders, Fedora and openSUSE, because its development team is constantly focused on the end-user experience. Canonical and the Ubuntu community have spent a lot of time and resources on bringing ease-of-use tools to this distribution, particularly in the area of installing Ubuntu and installing applications within Ubuntu.

In addition, Ubuntu's level of support for its desktop products is highly superior, which is important in this class of distributions since it is the most likely to contain users new to Linux. Both the official and unofficial Ubuntu documentation is robust and searchable, a big plus.

Best Linux Laptop Distribution

Laptop distributions almost fall into the same category as desktop users, but there are a number of key differences that make the criteria for evaluating a good laptop distribution important. Power management, docking tools, and wireless ease-of-use are critical to users on the go, as is having a distro that meets those needs.

Right now, the best laptop distribution is openSUSE, one of the lead contenders for the desktop honors. On the laptop, openSUSE shines with great connectivity tools, such as an easy-to-use networking toolset that not only handles WiFi connectivity, but also CDMA/cellular modem connections.

best linux distros

openSUSE also deals with docking stations for laptops very well, including dual-monitor management on the fly. Power management is very granular, which is great for detailing various power needs you might find yourself needing.

Best Linux Enterprise Desktop

This category is replete with great contenders as well, and it's difficult to highlight just one. At the end of the day, though, the nod must be given to SUSE Linux Enterprise Desktop (SLED).

linux distros SLED

The reason is simple: while SLED and its primary competitor Red Hat Enterprise Linux Desktop are nearly identical in features and support performance, SLED has the advantage of the openSUSE Build Service, a free and open service that lets applications be built and delivered to SUSE Linux and openSUSE products (as well as Red Hat and CentOS).

This is a very important differentiator in enterprise desktop development, as it means that SLED has the current advantage of application building and deployment in the enterprise arena.

Best Linux Enterprise Server

Again, in this category it really comes down to two main contenders: Red Hat Enterprise Linux (RHEL) and SUSE Linux Enterprise Server (SLES). Given the pick for the Enterprise Desktop category, you might expect SLES to get the "best of" label here.

But, when all factors for the enterprise server are weighed, RHEL is still the king of this particular hill.

Best Distros Red Hat

Red Hat edges out Novell with its server product, because RHEL users get a deeply mature distribution, and Red Hat's support structure is second to none in the enterprise channels.

Best Linux LiveCD

As Linux technology improves, users can easily choose the LiveCD version of practically any of the Linux distros listed here to get the best LiveCD experience for their needs.

There is a specialized class of LiveCDs, however, that offers users utilities and tools for the specific purpose of repairing existing Linux and Windows installations. These distros are very useful to have regardless of what primary Linux distribution you like to use, because in a crisis they are invaluable to own.

In this class of distribution, KNOPPIX is hands-down the most complete and useful distro. Loaded on a CD or USB storage device, KNOPPIX will let you recover from nearly any rare Linux system crash as well as the much-less-rare Windows breakdowns.

Best Distros KNOPPIX

Best Linux Security-Enhanced Distribution

Linux is inherently very secure compared to other operating systems, but there's always room for improvement.

One of the challenges for locking down Linux is if you are not careful, you can take away too much functionality. Another challenge is that the best security-oriented Linux distro, SELinux, is historically known to be difficult to configure correctly. Still, if security out of the box is your priority, this is the best place to begin.

Another approach is the white hat method: using security and forensic tools to examine your existing installation, determine the holes, then lock your system down based on what gaps you find. If you have the time and inclination, this is a great way to do it, because this will get any existing system more secure right away.

For the white hat approach, the best distribution is BackTrack Linux, a dedicated penetration testing distro that will enable you to safely try to crack any system you are caretaking. Its toolset and strong community give it the advantage in this category.

Best Distros Back Track

Best Linux Multimedia Distribution

General Linux distributions have come a long way in terms of multimedia performance. Rare is the audio or video file that can't be played on Linux. Music services such as Rhapsody and video sites like YouTube and Hulu are also standards-compliant and accessible to Linux users.

Still, for those users who are multimedia creators as well as consumers, there are Linux distributions that contain powerful tools for audio and video editing.

The best in this class is currently Ubuntu Studio. For audio, video, and graphic production, it contains a very complete set of tools, as well as format and codec support for a huge range of multimedia formats.

Best Distros Ubuntu Studio

The applications contained in Ubuntu Studio are the same or similar to those used by major studios to create cutting edge work, so users are getting the best apps, coupled with the strong support ethos already found in the Ubuntu community.

In Linux there are as many opinions as there are lines of code. This represents one view of the best in Linux. Select yours.

Sunday, 4 March 2012

How to set up the Cain & Abel network security tool

First you have to install program, called 'Cain and Abel'. Then, you will be automatically asked to install 'Win Pcap' and you should do that.
After installation you have to click on 'Cain and Abel' program icon with right mouse button and start it as administrator. Then push blue plus sign to scan Mac addresses. After scanning go to the bottom of program window and press APR tab. Then push blue plus icon again. When table appears push first option in first square and first option in second and then OK.
To reload you only need to push the third button at the top of program window.



Don't Get Caught! How to Protect Your Hard Drives from Data Forensics



Over the past few days, a lot of questions have been posed to me about removing sensitive data from hard drives. Ideas seem to range from magnets to microwaves and a lot of things in-between. So, I'd like to explain a little bit about data forensics, how it works, and the steps you can take to be safe.

Often, an anon will delete files from his computer, but that is only half the story, as those files are still really there. And if the careless anon doesn't take steps to fix that, when his door gets kicked in and the FBI takes his hard drive, they will be able to see everything. Don't be that anon.

What Is Computer Forensics? The People on 'CSI'?

Computer forensics is the collection, preservation, analysis and presentation of computer-related evidence. In summary, it helps determine the who, what, where, and when related to a computer-based crime or violation. When the feds are finished arresting you and boxing up your belongings into evidence crates, they will ship them off to the FBI data lab in Washington, D.C.


In addition, an examiner will work to uncover all files on the subject's system. This includes existing active, invisible, deleted, hidden, password-protected, and encrypted files. In many cases, information is gathered during a computer forensics investigation that is not typically available or viewable by the average computer user, such as fragments of data that can be found in the space allocated for existing files (known as “slack space”). Special skills and tools are needed to obtain this type of information or evidence.


An expert can recover pretty much all of your deleted files, along with other data that has not yet been overwritten. As a computer is used, the operating system is constantly writing data to the hard drive. From time to time, the OS will save new data on a hard drive by overwriting data that exists on the drive, but is no longer needed by the operating system, i.e. a deleted file.  So, the ongoing use of a computer system may destroy data that could have been extracted before being overwritten.

How to Protect Yourself

While erasing files simply marks file space as available for reuse, data-wiping overwrites all data space on a storage device, replacing useful data with garbage data. Depending upon the method used, the overwrite data could be zeros (also known as "zero-fill") or could be various random patterns. This is why simply deleting information is never enough. You must take proactive steps to ensure your removal is complete.

We are going to use a great boot disk called DBAN to perform this operation.

Step 1

Obtain and Burn DBAN

You can download the 2.2.6 Beta release from Sourceforge. Once you have the .ISO, all that's left to do is burn it to a blank CD/DVD. Place the media into your drive and restart the computer. Most computers are set to try and boot from the CD drive before the hard disk. If this is not the case, and your computer does not boot the CD drive, you will need to enter your BIOS setup and change the boot priority order.

Step 2

Boot and Run!

After the CD starts, you will be greeted with this screen:


We want to simply press enter here to start DBAN in interactive mode. The main menu shown below should display your hard drive to be wiped.



The next screen shows us DBAN is ready to get down to work, the default method is a DoD Short wipe, and it will work fine for us.




Hit the space bar to select and it will start. Be warned though, the DoD wipe takes a bit of time, especially on larger hard drives. But not as long as a prison sentence would be.

In Closing

DBAM is a great tool to clean a hard drive. I carry a copy of it in my laptop bag when I travel and you should do the same. It is quick and easy and works better then most other tools I have used. Be careful as (obviously) it is impossible to recover if you zap the wrong hard drive!



Saturday, 3 March 2012

How to stop email spam on Gmail

One of the most compelling reasons to use Gmail is to avoid excessive amounts of spam email. Gmail uses innovative technology and community reporting to recognize and automatically filter out spam emails. However, even the most advanced spam filters are not 100 percent effective, and some spam will eventually trickle through the system. To minimize your spam exposure, you can report the spam using Gmail's reporting system and alter your email usage to further protect your email address.

how to stop email spam

Here i am giving you some steps on How to stop email spam.

Modifying Your Email Address for Filtering

Step 1
Modify your own Gmail address with periods (".") within your username, such as transforming "myemailaddress@gmail.com" to "my.email.address@gmail.com." Gmail will read it as the same email address.

Step 2
Extend your email's username with pluses ("+"), followed by a keyword, such as changing "myemailaddress@gmail.com" to "myemailaddress+possiblespam@gmail.com." Gmail will still recognize the email address as yours and deliver it to you.

Step 3
Use "googlemail.com" domain instead of "gmail.com," such as changing "myemailaddress@gmail.com" to "myemailaddress@googlemail.com." This is the old Google domain, but still functions as if you used the current domain.

Step 4
Use these modified email addresses when entering your email on websites. This gives you the ability to filter them, should they become targeted by spam.

Filtering Modified Emails

Step 1
Click "Create a filter" at the top of the Gmail window, to the right of the search bar.

Step 2
Enter the modified email address in the "To" field, and click "Next."

Step 3
Select the appropriate action, such as marking the message read, sending it straight into the archive, applying an identifiable label or deleting it. Click "Create Filter" to create the filter.

Step 4
Create additional filters for each modified email address.

Filtering Specific Emails

Step 1
Select the email you want to filter.

Step 2
Click "More actions" and choose "Filter messages like these." The "From" email address is automatically filled.

Step 3
Modify any other filter criteria you desire, such as subject lines or keywords, and click "Next."

Step 4
Select the action, such as deleting it, applying a label or sending it straight into Archives.

Step 5
Click "Create Filter" to apply the new filter.


Tips & Warnings on how to stop email spam

  • Select any spam messages and click "Report spam" on the top menu to move the message to the spam folder. This also marks the sender as a spam sender, which usually stops subsequent messages and helps Gmail identify spam email to help the Gmail community as a whole.
  • Consider creating a completely separate email account for signing up with websites. As an example, some sites may require you to enter you email address to set up an account or grant access. However, you may not want to receive email from this site, so you could give them the "junk" email address. If they start sending spam, it only goes to this junk email address.