Pages

Wednesday 22 May 2013

Backdoor for window xp and win 7.

Lets assume that you have just cracked victim's windows password.  or simply got access to his windows for some time.Can you make some changes in windows so that you could access the windows again even if victim changes the password ?? or Can you make any changes in your own windows so that you could access it anytime even if anybody sets/changes password ?
Simply Can we set a backdoor in windows ?
Yes we can :) .
Backdoor actually means maintaining access.
okay lets do one thing first. Open your command prompt (run as administrator in win 7/vista).

How to Hack WiFi Password ?


First of all you need to scan for available wireless networks.

you can use“NetStumbler” or “Kismet” for Windows and Linux and KisMac for Mac.

It’ll also show how the Wi-fi network is encrypted. The two most common encryption techniques are:

1) WEP (Wire Equivalent Privacy )

2) WAP(Wireless Application Protocol)

Sunday 19 May 2013

File system

When you format a hard drive or a flash drive, you prepare it for its use as a storage medium by an operating system. During this process a file system is set up and all information previously stored on the drive is removed.
You may have heard of computer file systems like FAT or NTFS before, but do you actually know what they do and which ones you are using? This article explains how they work and what their differences are.

E-mail..working,travelling,sending fake email.

Email stands for Electronic Mail. Email sending and receiving is controlled by the Email servers.Email service providers configure Email Server before anyone can Sign into his or her account and start communicating digitally.Users from across the world register in to these Email servers and setup an Email account.

Shortcut Keys For Windows 8.



1) Windows key : Access the Start screen
2) Windows+D : Access the Desktop.
3) Windows+C : Show the Charms.
4) Windows+Q (or just start typing when you are on the Start menu) : Search
5) Windows+H : Share
6) Windows+K : Start Windows Devices

Friday 17 May 2013

difference between core i3,i5,i7

Core i3:
* Entry level processor.
* 2-4 Cores
* 4 Threads
* Hyper-Threading ­ (efficient use of processor resources)
* 3-4 MB Catche

Wednesday 15 May 2013

TCP/IP model

The TCP/IP Model separates networking functions into discrete layers. Each layer performs a specific function and is transparent to the layer above it and the layer below it.The TCP/IP model is one of the two most common network models, the other being the OSI Model.
The TCP/IP network model breaks down into four (4) layers:
  • Application Layer
  • Transport Layer
  • Internet Layer
  • Network Access Layer

OSI model--open system interconnect

The Open Systems Interconnect (OSI) model has seven layers.The layers are stacked this way:
  • Application
  • Presentation
  • Session
  • Transport
  • Network
  • Data Link
  • Physical

Tuesday 14 May 2013

login in window xp without knowing password:


if u forgot password or want to log on in others computer just follow this trick....
1) Start computer
2) When it asks for password press ctrl+alt+delete ­ keys twice

networking -questions & answers

1)Wi-Fi is a -
a) type of computer
b) type of network cable
c) set of popular technologies and standards for wireless computer networking
d) set of computer programs that help people make money on the Internet

DBMS-question & answers

1) The DBMS acts as an interface between what two components of an enterprise-class database system?
a) Database application and the database
b) Data and the database
c) The user and the database application
d) Database application and SQL

hack the window password using the backdoor

Now I am going to teach you how to hack windows password with use of a backdoor. You should already know that you can change the password on windows, without knowing the old one, using CMD.
the only problem with this method, is that you can’t open it on logon-screen.

Friday 10 May 2013

Immunity Debugger


Immunity Debugger is a powerful new way to write exploits, analyze malware, and reverse engineer binary files. It builds on a solid user interface with function graphing; the industry's first heap analysis tool built specifically for heap creation, and a large and well supported Python API for easy extensibility.

Browse hijacking




Browser hijacking is a type of online fraud. Scammers use malicious software to take controlof your computer's Internet browser and change how and what it displays when you're surfing the web.

How do you know if your browser has been hijacked?

•Home page or other settings change on your computer. Links are added that point to websites that you'd usually avoid.

Some facts about computers and IT Field.



1.A byte means 8 bits and a nibble means 4 bits.
2.First harddisk available was of 5MB
3.Ethernet is the registered trademark 0f Xerox.
4.google uses over 10000 network computers to crawl the web
5.Google can be queried in 26 languages
6.The floopy disk was patented by allen shugart in 1946.
7.More than 80% of web pages are in english.

how to become hacker?



1. Have the 'hacker' attitude
2. Improve your logical thinking
3. Practice your English
4. Learn programming languages

errors meaning while browsing.

Most of us come across the internet errors, during browsing.. Here i give the correct meanings or the mistakes which we have done..

Error 400 - Bad request.
Error 401 - unauthorized
request.
Error 403 - forbidden.
Error 404 - Not found.
Error 500 -Internal error.
Error 501 - Not Implemented
Error 502 - Bad Gateway
Error 503 -Service unavailable.
Error 504 - Gateway Time-Out
Error 505 - HTTP Version not supported/DNS Lookup Fail/unknwn host
Error 500-599 - Server Errors.

full form of hacker


H - Hide IP
A - Aim Victim
C - Crack Encrypt
K - Kill Firewall
E - Enter into Database
R - Return Anonymous

Thursday 2 May 2013

hiding data behind images.

The art and science of hiding information by embedding messages within other, seemingly harmless messages. Steganography works by replacing bits of useless or unused data in regular computer files (such as graphics, sound, text, HTML, or even floppy disk ) with bits of different, invisible information. This hidden information can be plain text cipher text or even images.

Tuesday 30 April 2013

bitlocker decryption win 7




Last Time, we take up encrypting  for security in Windows 7 using BitLocker To Go feature. Overall, the utility is very useful but unfortunately it will not be included in the Home Premium Editions of Windows 7. Better go to the Ultimate version to get this function. 
Anyway, How to Turn-Off the Encryption afterwards?
Quick Information: BitLocker Drive Encryption is a security in Windows 7 Ultimate and Enterprise edition designed to help protect data from being accessed or opened by unauthorized users.

Bitlocker Drive encryption win 7

    How can you help protect your data from loss, theft, or hackers? The answer: BitLocker.
Improved for Windows 7 and available in the Ultimate and Enterprise editions, BitLocker helps keep everything from documents to passwords safer by encrypting the entire drive that Windows and your data reside on.
Once BitLocker is turned on, any file you save on that drive is encrypted automatically

Saturday 27 April 2013

message bomber


Message annoyer is a batch program. It will interact with
the user anyhow annoying and irritating them by popping up some message box containing some
messages in it.
so here is the trick:-

Application bomber

Appilication bomber will open application untill the user get irritate or untill the system get crash.

so here's steps for this:-


1.
open the notepad
2.
type the following code

DNS poisoning



Batch file can has the tendency to modify the transfer zones by editing the hosts.txt file that
resides inside ‘C:\windows\system32\drivers\etc\hosts.txt’, so that it will take you to some malicious
websites instead of landing you to the legitimate website. This may also be used for phishing, i.e.
redirecting you to a bogus website which looks exactly like the legitimate one, and then steal credentials. 


how to make notepad speak whatever you write.

Do you want to listen the speech which was written in text format? Then you have to make a text to audio converter. You can make it easily by writing some commands into notepad. The commands are given below.
Just copy the commands and paste it into notepad. Give the notepad any name.vbs (e.g. Speak.vbs), Save as type: All Files and Save it.

how to make Notepad write on its own



1. Open the Notepad and Type the Code Given Below.

    set wshshell = wscript.CreateObject("wscript.shell")
    wshshell.run "Notepad"
    wscript.sleep 2000
    wshshell.AppActivate "Notepad"
    WshShell.SendKeys "H"
    WScript.Sleep 500
    WshShell.SendKeys "ell"
    WScript.Sleep 500
    WshShell.SendKeys "o "
    WScript.Sleep 500
    WshShell.SendKeys " "
    WScript.Sleep 500
    WshShell.SendKeys " Friends"


2. Save it as anyname.vbs (Note the vbs extension)

3. Now Open the anyname.vbs file by doublecliking on it and see the Magic..

Thursday 25 April 2013

open sites blocked by college.

Hello friends, today I am going to tell you how a blocked site can open. Some college or other server block some sites ( like facebook, youtube etc.) or some type of files ( .mp3, .iso, torrent etc. ) cannot download.


You can open this sites using proxy server like kproxy.com, vtunnel.com,mattunnel.com etc. But one or two days you can open the sites and next day you will see the proxy server is blocked.

Wednesday 24 April 2013

Intrusion detection system

Intrusion Detection System (IDS)
A computer intrusion is the number of events that breaches the security of a system. Such number of events must be detected in proactive manner in order to guarantee the confidentiality, integrity and availability of resources of a computer system. An intrusion into an information system is a malicious activity that compromises its security (e.g. integrity, confidentiality, and availability) through a series of events in the information system. For example intrusion may compromise the integrity and confidentiality of an information system by gaining root level access and then modifying and stealing information. Another type of intrusion is denial-of-service intrusion that compromises the availability of an information system by flooding a server with an overwhelming number of service requests to the server over short period of time and thus makes services unavailable to legitimate users. According to D. Yang, A. Usynin & W. Hines, they describe intrusion and intrusion detection as: "Any action that is not legally allowed for a user to take towards an information system is called intrusion and intrusion detection is a process of detecting and tracing inappropriate, and incorrect, or anomalous activity targeted at computing and networking resources".

Monday 22 April 2013

john the ripper(paswork cracking tool of linux)



John The Ripper:
Hello, and welcome to my guide on using John The Ripper. Today we will be cracking our own Linux password. Now before you get all jumpy and excited about what you are going to learn, let me just say this- THE CAPABILITIES OF ANY PASSWORD CRACKING TOOL ARE ONLY AS GOOD AS YOUR WORDLIST. In other words, if you have a wordlist with 5 words in it, don't expect to crack anything. It would be like trying to drive a car without a motor. If you have no idea what a wordlist is, then I'll tell you- a wordlist, or a dictionary file, is merely a .txt or .lst (these are usually the file formats) file with a bunch of words in it. On every line of the file there is only one word. Then on the next line, there is another word. Parsing these kinds of files is easy- any high level programming/scripting language can usually due this by using the .readline() method or something similar, then replacing the line that was just read with a .replace() method, or something similar

Sunday 21 April 2013

download youtube videos without any software

How to download Youtube videos on any OS without any Software

You can download the Youtube videos easily and for free without any software.
Just go to KeepVid ,savevid and then just type in or copy the Uniform Resource Locator or the URL of the video you want to download and then click on Download.

You will be shown with various formats in which you can download the specific video. You just need to select one and then the download will start!

Just remember that if your browser asks you for the permission to run the Java Applet, then, say yes.

In some cases you might not be able to download the video(just an assumption), if it happens then you need to try again after some time. If the problem still persists, then, I can't help it! :-)


I hope this was useful!

techniques to hack

There are some techniques through which you can be easily hack.So little knowledge about the techniques can prevent you from being hacked.


A vulnerability scanner is a tool used to quickly check computers on a network for known weaknesses. Hackers also commonly use port scanners. These check to see which ports on a specified computer are "open" or available to access the computer, and sometimes will detect what program or service is listening on that port, and its version number. (Note that firewalls defend computers from intruders by limiting access to ports/machines both inbound and outbound, but can still be circumvented.)