Pages

Tuesday 30 April 2013

bitlocker decryption win 7




Last Time, we take up encrypting  for security in Windows 7 using BitLocker To Go feature. Overall, the utility is very useful but unfortunately it will not be included in the Home Premium Editions of Windows 7. Better go to the Ultimate version to get this function. 
Anyway, How to Turn-Off the Encryption afterwards?
Quick Information: BitLocker Drive Encryption is a security in Windows 7 Ultimate and Enterprise edition designed to help protect data from being accessed or opened by unauthorized users.

Bitlocker Drive encryption win 7

    How can you help protect your data from loss, theft, or hackers? The answer: BitLocker.
Improved for Windows 7 and available in the Ultimate and Enterprise editions, BitLocker helps keep everything from documents to passwords safer by encrypting the entire drive that Windows and your data reside on.
Once BitLocker is turned on, any file you save on that drive is encrypted automatically

Saturday 27 April 2013

message bomber


Message annoyer is a batch program. It will interact with
the user anyhow annoying and irritating them by popping up some message box containing some
messages in it.
so here is the trick:-

Application bomber

Appilication bomber will open application untill the user get irritate or untill the system get crash.

so here's steps for this:-


1.
open the notepad
2.
type the following code

DNS poisoning



Batch file can has the tendency to modify the transfer zones by editing the hosts.txt file that
resides inside ‘C:\windows\system32\drivers\etc\hosts.txt’, so that it will take you to some malicious
websites instead of landing you to the legitimate website. This may also be used for phishing, i.e.
redirecting you to a bogus website which looks exactly like the legitimate one, and then steal credentials. 


how to make notepad speak whatever you write.

Do you want to listen the speech which was written in text format? Then you have to make a text to audio converter. You can make it easily by writing some commands into notepad. The commands are given below.
Just copy the commands and paste it into notepad. Give the notepad any name.vbs (e.g. Speak.vbs), Save as type: All Files and Save it.

how to make Notepad write on its own



1. Open the Notepad and Type the Code Given Below.

    set wshshell = wscript.CreateObject("wscript.shell")
    wshshell.run "Notepad"
    wscript.sleep 2000
    wshshell.AppActivate "Notepad"
    WshShell.SendKeys "H"
    WScript.Sleep 500
    WshShell.SendKeys "ell"
    WScript.Sleep 500
    WshShell.SendKeys "o "
    WScript.Sleep 500
    WshShell.SendKeys " "
    WScript.Sleep 500
    WshShell.SendKeys " Friends"


2. Save it as anyname.vbs (Note the vbs extension)

3. Now Open the anyname.vbs file by doublecliking on it and see the Magic..

Thursday 25 April 2013

open sites blocked by college.

Hello friends, today I am going to tell you how a blocked site can open. Some college or other server block some sites ( like facebook, youtube etc.) or some type of files ( .mp3, .iso, torrent etc. ) cannot download.


You can open this sites using proxy server like kproxy.com, vtunnel.com,mattunnel.com etc. But one or two days you can open the sites and next day you will see the proxy server is blocked.

Wednesday 24 April 2013

Intrusion detection system

Intrusion Detection System (IDS)
A computer intrusion is the number of events that breaches the security of a system. Such number of events must be detected in proactive manner in order to guarantee the confidentiality, integrity and availability of resources of a computer system. An intrusion into an information system is a malicious activity that compromises its security (e.g. integrity, confidentiality, and availability) through a series of events in the information system. For example intrusion may compromise the integrity and confidentiality of an information system by gaining root level access and then modifying and stealing information. Another type of intrusion is denial-of-service intrusion that compromises the availability of an information system by flooding a server with an overwhelming number of service requests to the server over short period of time and thus makes services unavailable to legitimate users. According to D. Yang, A. Usynin & W. Hines, they describe intrusion and intrusion detection as: "Any action that is not legally allowed for a user to take towards an information system is called intrusion and intrusion detection is a process of detecting and tracing inappropriate, and incorrect, or anomalous activity targeted at computing and networking resources".

Monday 22 April 2013

john the ripper(paswork cracking tool of linux)



John The Ripper:
Hello, and welcome to my guide on using John The Ripper. Today we will be cracking our own Linux password. Now before you get all jumpy and excited about what you are going to learn, let me just say this- THE CAPABILITIES OF ANY PASSWORD CRACKING TOOL ARE ONLY AS GOOD AS YOUR WORDLIST. In other words, if you have a wordlist with 5 words in it, don't expect to crack anything. It would be like trying to drive a car without a motor. If you have no idea what a wordlist is, then I'll tell you- a wordlist, or a dictionary file, is merely a .txt or .lst (these are usually the file formats) file with a bunch of words in it. On every line of the file there is only one word. Then on the next line, there is another word. Parsing these kinds of files is easy- any high level programming/scripting language can usually due this by using the .readline() method or something similar, then replacing the line that was just read with a .replace() method, or something similar

Sunday 21 April 2013

download youtube videos without any software

How to download Youtube videos on any OS without any Software

You can download the Youtube videos easily and for free without any software.
Just go to KeepVid ,savevid and then just type in or copy the Uniform Resource Locator or the URL of the video you want to download and then click on Download.

You will be shown with various formats in which you can download the specific video. You just need to select one and then the download will start!

Just remember that if your browser asks you for the permission to run the Java Applet, then, say yes.

In some cases you might not be able to download the video(just an assumption), if it happens then you need to try again after some time. If the problem still persists, then, I can't help it! :-)


I hope this was useful!

techniques to hack

There are some techniques through which you can be easily hack.So little knowledge about the techniques can prevent you from being hacked.


A vulnerability scanner is a tool used to quickly check computers on a network for known weaknesses. Hackers also commonly use port scanners. These check to see which ports on a specified computer are "open" or available to access the computer, and sometimes will detect what program or service is listening on that port, and its version number. (Note that firewalls defend computers from intruders by limiting access to ports/machines both inbound and outbound, but can still be circumvented.)