Open top menu
Monday, 27 January 2014
How To Change Your IP address

IP address refers to internet protocol address; each and every system will have a unique IP address by which the location of the system can be found. We can change the IP address of our system by the following process,


Step 1. Click on "Start" in the bottom left hand corner of screen
Step 2. Click on "Run"
Step 3. Type in "cmd" and hit ok you should now be at an MSDOS prompt screen.
Step 4. Type "ipconfig /release" just like that, and hit "enter"
Step 5. Type "exit" and leave the prompt
Step 6. Right-click on "Network Places" or "My Network Places" on your desktop.
Step 7. Click on "properties

You should now be on a screen with something titled "Local Area Connection", or something close to that, and, if you have a network hooked up, all of your other networks.
Step 8. Right click on "Local Area Connection" and click "properties"
Step 9. Double-click on the "Internet Protocol (TCP/IP)" from the list under the "General" tab
Step 10. Click on "Use the following IP address" under the "General" tab
Step 11. Create an IP address (It doesn't matter what it is. I just type 1 and 2 until i fill the area up).
Step 12. Press "Tab" and it should automatically fill in the "Subnet Mask" section with default numbers.
Step 13. Hit the "Ok" button here
Step 14. Hit the "Ok" button again you should now be back to the "Local Area Connection" screen.
Step 15. Right-click back on "Local Area Connection" and go to properties again.
Step 16. Go back to the "TCP/IP" settings
Step 17. This time, select "Obtain an IP address automatically" tongue.gif
Step 18. Hit "Ok"
Step 19. Hit "Ok" again
Step 20. You now have a new IP address

With a little practice, you can easily get this process down to 15 seconds.


“This only changes your dynamic IP address, not your ISP/IP address. If you plan on hacking a website with this trick be extremely careful, because if they try a little, they can trace it back.”
This is only for educational purpose. Feel free to comment…
Read more
Saturday, 25 January 2014
no image

This is one of the simple and commonly used techniques used in olden days for chatting within a specific area for free. No internet connection is needed for this.

Step 1:- All you need is your friends IP address and your Command Prompt.
Step 2:- Open your notepad and write tis code as it is.
@echo off:
A
Cls
echo MESSENGER
set /p n=User:
set /p m=Message:
net send %n% %m%
Pause
Goto A3.
Step 3:- Now save this as "Messenger. Bat”.
Step 4:- Drag this file (.bat file) over to Command Prompt and press enter!
Step 5:- You would then see something like this:
MESSENGER
User:
Step 6:- After "User” type the IP address of the computer you want to contact.
Step 7:- Before you press "Enter” it should look like this,
MESSENGER
User: IP_Address User: IP_Address
Message: Hi, How are you? Message: Hi, How are you?

Step 8:- Now all you need to do is press "Enter”, and start chatting.
“This Trick Works In the LAN connection only. And may not support some latest operating Systems like Windows 7 and Windows Vista.”

Read more
no image

           Steganography is the art and science of hiding messages. Steganography is often combined with cryptography so that even if the message is discovered it cannot be read.
The word steganography is derived from the Greek words "steganos" and "graphein", which mean "covered" and "Writing." Steganography, therefore, is covered writing.

Steganography software

OutGuess is a universal steganography tool that allows the insertion of hidden information into the redundant bits of data sources. The nature of the data source is irrelevant to the core of OutGuess. The program relies on data specific
Handlers that will extract redundant bits and write them back after modification. In this version the PNM and JPEG image formats are supported. In the next paragraphs, images will be used as concrete example of data objects, though OutGuess can use any kind of data, as long as a handler is provided.

F5 is a publicly available steganography software package which hides messages in BMP, GIF, and JPG graphics.

Camera/Shy is the only steganography tool that automatically scans for and delivers decrypted content straight from the web. It is a stand-alone, Internet Explorer-based browser that leaves no trace on the user's system and has enhanced security.

JPHIDE and JPSEEK are programs which allow you to hide a file in a jpeg visual image. There are lots of versions of similar programs available on the internet but JPHIDE and JPSEEK are rather special. The design objective was not simply to hide a file but rather to do this in such a way that it is impossible to prove that the host file contains a hidden file. Given a typical visual image, a low insertion rate (under 5%) and the absence of the original file, it is not possible to conclude with any worthwhile certainty that the host file contains inserted data. As the insertion percentage increases the statistical nature of the jpeg coefficients differs from "normal" to the extent that it raises suspicion. Above 15% the effects begin to become visible to the naked eye.

MP3Stego will hide information in MP3 files during the compression process. The data is first compressed, encrypted and then hidden in the MP3 bit stream. Although MP3Stego has been written with steganography applications in mind it might be used as a copyright marking system for MP3 files (weak but still much better than the MPEG copyright flag defined by the standard). Any opponent can uncompressed the bit stream and recompress it; this will delete the hidden information (actually this is the only attack we know yet) but at the expense of severe quality loss.

Steghide is a steganography program that is able to hide data in JPG, BMP, WAV, and AU files. The color frequencies are not changed thus making the embedding resistant against first-order statistical tests.

Hydan steganographically conceals a message into an executable. It exploits redundancy in the i386 instruction set by defining sets of functionally equivalent instructions. It then encodes information in machine code by using the appropriate instructions from each set. The executable file size remains unchanged. The message is Blowfish encrypted with a user-supplied passphrase before being embedded.

We can also do this easily via command prompt as we discussed earlier, these are the list of freeware software by which we can perform additional task. This is only for educational purpose. Feel free to comment
Read more
Friday, 24 January 2014
Email hacking

How Email Works?

+ Email sending and receiving is controlled by the Email servers. All Email service providers configure Email Server before anyone can Sign into his or her account and start communicating digitally.
+ Once the servers are ready to go, users from across the world register in to these Email servers and setup an Email account. When they have a fully working Email account, they sign into their accounts and start connecting to other users using the Email services.


Email Spoofing

+ Email spoofing is the forgery of an Email header so that the message appears to have originated from someone or somewhere other than the actual source. Distributors of spam often use spoofing in an attempt to get recipients to open, and possibly even respond to, their solicitations. Spoofing can be used legitimately.
+ There are so many ways to send the Fake Emails even without knowing the password of the Email ID. The Internet
is so vulnerable that you can use anybody's Email ID to send a threatening Email to any official personnel.

Methods to send fake Emails

Open Relay Server
Web Scripts

Fake Emails: Open Relay Server

+An Open Mail Relay is an SMTP (Simple Mail Transfer Protocol) server configured in such a way that it allows anyone on the Internet to send Email through it, not just mail destined ‘To’ or ‘Originating’ from known users.
+An Attacker can connect the Open Relay Server via Telnet and instruct the server to send the Email.
+Open Relay Email Server requires no password to send the Email.

Fake Emails: via web script

+Web Programming languages such as PHP and ASP contain the mail sending functions which can be used to send Emails by programming Fake headers i.e.” From: To: Subject:”
+There are so many websites available on the Internet which already contains these mail sending scripts. Most of them provide the free service.
+Some of Free Anonymous Email Websites are:

+Mail.Anonymizer.name (Send attachments as well)
+FakEmailer.net
+FakEmailer.info
+Deadfake.com

Proving a fake Email
+Every Email carry Header which has information about the Travelling Path of the Email
+Check the Header and Get the location from the Email was sent
+Check if the Email was sent from any other Email Server or Website
+Headers carry the name of the Website on which the mail sending script was used.

Securing your Email account
+Always configure a Secondary Email Address for the recovery purpose.
+Properly configure the Security Question and Answer in the Email Account.
+Do not Open Emails from strangers.
+Do not Use any other’s computer to check your Email.
+Take Care of the Phishing Links.
+Do not reveal your Passwords to your Friends or Mates.

Hope this tutorial is useful to you. This is only for educational purpose. Feel free to comment…

Read more
Sunday, 19 January 2014
Proxy Servers

         Proxy servers can be classified of two types, they are
• Web Proxy
• Anonymous Proxy Server

Web Proxy Server
• A Proxy site is a web page which allows a user to browse other web sites.
• If an Attacker finds that he is blocked from accessing a Website, he will use any of web proxy sites to get bypass the block.



By this process you can hide your ip address from being hacked. The various websites by which you can hide your ip address are,
   1. www.hidemyass.com
   2. www.anonymizer.eu
   3. www.anonymizer.ru   and many more…

Anonymous Proxy Server
• An Anonymous proxy is a proxy server designed to protect the privacy and anonymity of web browsers from web site operators.
• In Anonymous Proxy, you get an IP Address and a Port Number. You have to configure that IP and Port with your Web Browser and you will be surfing anonymously.
Every user can hide his or her IP address through their web server by the following technique as follows; this is very simple and can be done in all web browsers,


Thus by this trick you can safe guard your IP from being hacked.

“Do not use this hack trick in any criminal activities and please do not destroy any ones account
This is for educational purpose only”.

Hope this tutorial is useful to you. Feel free to comment
Read more
Saturday, 18 January 2014
Wrapper + Removal of Trojans

A Wrapper is a program used to combine two or more executable into a single packaged program.
The wrapper attaches a harmless executable, like a game, to a Trojan’s payload, the executable code that does the real damage, so that it appears to be a harmless file.
Hackers use Wrappers to bind the Server part of the Software behind any image or any other file. Wrappers are also known as Binders.
Generally, games or other animated installations are used as wrappers because they entertain the user while the Trojan in, being installed. 
This way, the user doesn’t notice the slower processing that occurs while the Trojan is being installed on the system—the user only sees the legitimate application being installed.


Detection and Removal of Trojans

The unusual behavior of system is usually an indication of a Trojan attack. Actions/symptoms such as,
• Programs starting and running without the User’s initiation.
• CD-ROM drawers Opening or Closing.
• Wallpaper, background, or screen saver settings changing by themselves.
• Screen display flipping upside down.
• Browser program opening strange or unexpected websites
                        
         All above are indications of a Trojan attack. Any action that is suspicious or not initiated by the user can be an indication of a Trojan attack.
One thing which you can do is to check the applications which are making network connections with other computers.

        One of those applications will be a process started by the Server Trojan.
The key to prevent Trojans and backdoors from being installed on a system is not to install applications downloaded from the Internet or open Email attachments from parties you don’t know.

 Software used to find the presence of a Trojan is,
1. Process explorer
2. Anti-virus with anti-Trojan capabilities
3. TCP view.

           By these you can reduce the risk of being attacked by a Trojan. Hope this tutorial is useful to you. Feel free to comment…

Read more
Friday, 17 January 2014
Trojan

             In this tutorial we will learn about Trojan and its types and the different type of functions executed by them in a system.
A Trojan is a malicious program misguided as some very important application. Trojans comes on the backs of other programs and are installed on a system without the User’s knowledge.
Trojans are malicious pieces of code used to install hacking software on a target system and aid the Hacker in gaining and retaining access to that system.
Trojans is a program that appears to perform a desirable and necessary function, it may be software like monitoring program, system virus scanners, registry cleaners, computer system optimizers, or they may be applications like songs, pictures, screen savers, videos, etc...


Many Trojans are used to manipulate files on the victim computer, manage processes, remotely run commands, intercept keystrokes, watch screen images, and restart or shut down infected hosts.
Different Types of Trojans :-
1. Remote Administration Trojans: There are Remote Access Trojans which are used to control the Victim’s computer remotely (without any access to the computer).
2. Data Stealing Trojans: Then there are Data Sending Trojans which compromised the data in the Victim’s computer, then find the data on the computer and send it to the attacker automatically.
3. Security Disabler Trojan: There are Security software disablers Trojans which are used to stop antivirus software running in the Victim’s computer.
              
Some of the famous Trojans are as follows,
1. Beast
2. Pro Rat
3. Net Bus
4. Girl Friend
5. Sub seven… etc.
You can Google it to read more about this, you can also download these Trojans and use it on a victim’s computer, but unfortunately it’s not a freeware and most websites have banned these types of Trojans.
Trojan consists of two parts:
1. A Client component
2. A Server component.
One which resides on the Victim’s computer is called the server part of the Trojan.
One which is on the attacker’s computer is called the client Part of the Trojan. For the Trojan to function as a backdoor, the server Component has to be installed on the Victim’s machine.



              Thus these are the different types of Trojan and its function on a remote system. Hope this tutorial is useful to you…Feel free to comment…
Read more
Wednesday, 15 January 2014
Shrink Your URL

Here is a Simple trick to Shrink the size of your URL.. So that you can easily share the big link with your friends...
To Shrink the URL, Go Here : http://tiny.cc/


 -->Sharable, user-friendly URLs.
 -->Edit links feature for registered users.
 -->Track click statistics;  and no account needed to monitor stats.
 -->Custom option for making personalized URLs.
 -->Bookmarklet tool for one-click link shortening anywhere on the web.

          Insert URLs into email or Skype and never have issues with the links wrapping or breaking. Ideal for blogs, forums, social networks. Used in ebooks, online magazines, newspapers and journals. Archival uses in schools and universities. Used in QR codes it generates a simpler code with lower dpi for printed versions. Or anytime you run into a ridiculously long URL that just won't fit the spot Tiny can make your address short, plus meaningful! 
Read more
Wifi HotSpot Using Laptop

                 Would you like to share your internet connection over to your room and use the same connection for Laptop, Mobile Phones or other devices without any kind of cable connectivity, but you don’t have any expensive wireless router! if so, don’t worry.
           Now you can use your internet connected desktop or laptop as a Wi-Fi hotspot easily. Yes, many people use Connectify software for this. But some people have trouble with this software. Another thing, its provably costs you some money to use the full version...so, whatever Connectify is!

I am talking about ‘Wi-Fi Hotspot Creator’. It’s an alternative of Connectify pro. Download this software from here(http://www.wifihotspotcreator.com).

Now go for using instructions:

Step 1: Install Wi-Fi Hotspot Creator and restart your PC.



 Step  2: Open the program and set your hotspot information as seen bellow. Then press Start to start using your newly created Wi-Fi hotspot.



Note: Installation should take 5-10 Min to complete. And you must have.net framework v.4 installed on your PC to run this program.

Please feel free to leave your comment or suggestion!
Read more
Tuesday, 14 January 2014
Keyboard Dancing Led Light Trick Using Notpad

Today i will be showing you an interesting trick which will let your keyboard led light to dance. Basically we will be creating a vbscript to make caps lock, numb lock and scroll lock to perform this trick. So let’s get started.

     How to do that?

1. Open Notepad and copy below codes into it.

Set wshShell =wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "{CAPSLOCK}"
wshshell.sendkeys "{NUMLOCK}"
wshshell.sendkeys "{SCROLLLOCK}"
loop
       
2. Then save this file as led.vbs (.vbs is must)
3. Open your save file and see your keyboard led blinking like disco lights.


     How to disable blinking Led ?

1. First open Task Manager [ctrl+alt+del]
2. Then Go to process tab.
3. Select wscript.exe
4. Click on End process.

Read more
View the Saved Passwords

Here is simple hacking tutorial to view the saved passwords in Mozilla Firefox.
While visiting public internet cafe, some innocent peoples click the "Remember" while Mozilla asking for remembering.   This is one of the benefits for us to hack their account in very simple way.

Follow these steps to see the saved Passwords
Click the "Tools" menu in menu bar.
Select Options
It will open a small window
Select the "security" tab in that small window
You can view "saved Passwords" button
Click that button.
It will another small window
There will be list of sites with usernames
Select One site and click the "show Password"
It will clearly show you the password
This is one of the simplest techniques to view a saved password. It works only in Mozilla firebox. Check it out, feel free to comment….


Read more
Monday, 13 January 2014
Use MS Dos In Many Colors Other Then Black

Generally MS Dos is in black color but if you want to use it in Different Colors just for a change then there is a trick For you.

Step 1: Click on Start > Run and then Type Cmd, Press enter.

Step 2: A Command Prompt will open up just like below pic.


Step 3: Now type "Color z” As shown in Above Pic and click enter.


Step 4:  Now you will see List of Color Numbers. Refer the below pic.


Step 5: Now it will ask you to press any key, Next To change The Color to Green i will type "Color 2" and Press enter, here we go, my Cmd Color has now changed to Green. you can Try any color just change the number to that respective color.


This is what i get when i type Color 2 and Enter. That’s it..feel free to comment


Read more
Windows run commands

            Many advance computer users use windows run commands to start programs. You will be also agree, to say Windows run is the easiest and shortest way to active/start an application and programs. So, Today I am posting all windows run commands to make your computing more easy.


A

ADDUSERS             Add or list users to/from a CSV file
ARP                          Address Resolution Protocol
ASSOC                    Change file extension associations
ASSOCIAT              One step file association
AT                             Schedule a command to run at a later time
ATTRIB                    Change file attributes

B

BOOTCFG               Edit Windows boot settings
BROWSTAT             Get domain, browser and PDC info

C

CACLS                     Change file permissions
CALL                        Call one batch program from another
CD                            Change Directory – move to a specific Folder
CHANGE                  Change Terminal Server Session properties
CHKDSK                  Check Disk – check and repair disk problems
CHKNTFS                Check the NTFS file system
CHOICE                   Accept keyboard input to a batch file
CIPHER                    Encrypt or Decrypt files/folders
CleanMgr                   Automated cleanup of Temp files, recycle bin
CLEARMEM            Clear memory leaks
CLIP                         Copy STDIN to the Windows clipboard.
CLS                           Clear the screen
CLUSTER                 Windows Clustering
CMD                          Start a new CMD shell
COLOR                     Change colors of the CMD window
COMP                        Compare the contents of two files or sets of files
COMPACT               Compress files or folders on an NTFS partition
COMPRESS              Compress individual files on an NTFS partition
CON2PRT                 Connect or disconnect a Printer
CONVERT                Convert a FAT drive to NTFS.
COPY                         Copy one or more files to another location
CSCcmd                     Client-side caching (Offline Files)
CSVDE                      Import or Export Active Directory data

D

DATE                         Display or set the date
DCOM                       Configuration Utility
DEFRAG                   Defragment hard drive
DEL                            Delete one or more files
DELPROF                 Delete NT user profiles
DELTREE                  Delete a folder and all subfolders
DevCon                      Device Manager Command Line Utility
DIR                             Display a list of files and folders
DIRUSE                     Display disk usage
DISKCOMP              Compare the contents of two floppy disks
DISKCOPY               Copy the contents of one floppy disk to another
DISKPART                Disk Administration
DNSSTAT                  DNS Statistics
DOSKEY                   Edit command line, recall commands, and create macros
DSADD                      Add user (computer, group..) to active       directory
DSQUERY                 List items in active directory
DSMOD                     Modify user (computer, group..) in active directory

E

ECHO                       Display message on screen
ENDLOCAL             End localization of environment changes in a batch file
ERASE                      Delete one or more files
EXIT                         Quit the current script/routine and set an error level.
EXPAND                  Uncompress files
EXTRACT                Uncompress CAB files

F

FC                             Compare two files
FIND                        Search for a text string in a file
FINDSTR                  Search for strings in files
FOR /F                      Loop command: against a set of files
FOR /F                      Loop command: against the results of another command
FOR                          Loop command: all options Files, Directory, List
FORFILES                Batch process multiple files
FORMAT                  Format a disk
FREEDISK               Check free disk space (in bytes)
FSUTIL                     File and Volume utilities
FTP                            File Transfer Protocol
FTYPE                       Display or modify file types used in file extension associations

G

GLOBAL                    Display membership of global groups
GOTO                        Direct a batch program to jump to a labeled line

H

HELP                         Online Help

I

IF                               Conditionally perform a command
IFMEMBER               Is the current user in an NT Workgroup
IPCONFIG                Configure IP

K

KILL                          Remove a program from memory

L

LABEL                       Edit a disk label
LOCAL                      Display membership of local groups
LOGEVENT              Write text to the NT event viewer.
LOGOFF                   Log a user off
LOGTIME                 Log the date and time in a file

M

MAPISEND               Send email from the command line
MBSAcli                     Baseline Security Analyzer.
MEM                          Display memory usage
MD                             Create new folders
MKLINK                   Create a symbolic link (linked)
MODE                        Configure a system device
MORE                        Display output, one screen at a time
MOUNTVOL            Manage a volume mount point
MOVE                        Move files from one folder to another
MOVEUSER              Move a user from one domain to another
MSG                           Send a message
MSIEXEC                  Microsoft Windows Installer
MSINFO                    Windows NT diagnostics
MSTSC                      Terminal Server Connection (Remote Desktop Protocol)
MUNGE                     Find and Replace text within file(s)
MV                             Copy in-use files

N

NET                            Manage network resources
NETDOM                  Domain Manager
NETSH                       Configure network protocols
NETSVC                    Command-line Service Controller
NBTSTAT                   Display networking statistics (NetBIOS over TCP/IP)
NETSTAT                   Display networking statistics (TCP/IP)
NOW                          Display the current Date and Time
NSLOOKUP              Name server lookup
NTBACKUP              Backup folders to tape
NTRIGHTS                Edit user account rights

P

PATH                          Display or set a search path for executable files
PATHPING                Trace route plus network latency and packet loss
PAUSE                       Suspend processing of a batch file and display a message
PERMS                      Show permissions for a user
PERFMON                Performance Monitor
PING                          Test a network connection
POPD                         Restore the previous value of the current directory saved by PUSHD
PORTQRY                 Display the status of ports and services
PRINT                        Print a text file
PRNCNFG                 Display, configure or rename a printer
PRNMNGR                Add, delete, list printers set the default printer
PROMPT                   Change the command prompt
PsExec                        Execute process remotely
PsFile                          Show files opened remotely
PsGetSid                    Display the SID of a computer or a user
PsInfo                         List information about a system
PsKill                          Kill processes by name or process ID
PsList                          List detailed information about processes
PsLoggedOn              Who’s logged on (locally or via resource sharing)
PsLogList                   Event log records
PsPasswd                   Change account password
PsService                    View and control services
PsShutdown               Shutdown or reboot a computer
PsSuspend                  Suspend processes
PUSHD                      Save and then change the current directory

Q

QGREP                      Search file(s) for lines that match a given pattern.

R

RASDIAL                  Manage RAS connections
RASPHONE              Manage RAS connections
RECOVER                Recover a damaged file from a defective disk.
REG                           Registry: Read, Set, Export, Delete keys and values
REGEDIT                 Import or export registry settings
REGSVR32               Register or unregister a DLL
REGINI                     Change Registry Permissions
REM                          Record comments (remarks) in a batch file
REN                          Rename a file or files.
REPLACE                 Replace or update one file with another
RD                             Delete folder(s)
RMTSHARE              Share a folder or a printer
ROBOCOPY              Robust File and Folder Copy
ROUTE                      Manipulate network routing tables
RUNAS                      Execute a program under a different user account
RUNDLL32               Run a DLL command (add/remove print connections)

S

SC                               Service Control
SCHTASKS               Create or Edit Scheduled Tasks
SCLIST                      Display NT Services
SET                            Display, set, or remove environment variables
SETLOCAL               Control the visibility of environment variables
SETX                         Set environment variables permanently
SHARE                      List or edit a file share or print share
SHIFT                        Shift the position of replaceable parameters in a batch file
SHORTCUT              Create a windows shortcut (.LNK file)
SHOWGRPS              List the NT Workgroups a user has joined
SHOWMBRS             List the Users who are members of a Workgroup
SHUTDOWN             Shutdown the computer
SLEEP                       Wait for x seconds
SOON                       Schedule a command to run in the near future
SORT                        Sort input
START                      Start a program or command in a separate window.
SU                             Switch User
SUBINACL                Edit file and folder Permissions, Ownership and Domain
SUBST                      Associate a path with a drive letter
SYSTEMINFO            List system configuration

T

TASKLIST                 List running applications and services
TASKKILL                 Remove a running process from memory
TIME                         Display or set the system time
TIMEOUT                  Delay processing of a batch file
TITLE                        Set the window title for a CMD.EXE session
TLIST                        Task list with full path
TOUCH                      Change file timestamps
TRACERT                  Trace route to a remote host
TREE                         Graphical display of folder structure
TYPE                         Display the contents of a text file

U

USRSTAT                   List domain usernames and last login

V

VER                           Display version information
VERIFY                      Verify that files have been saved
VOL                           Display a disk label

W

WHERE                      Locate and display files in a directory tree
WHOAMI                   Output the current UserName and domain
WINDIFF                   Compare the contents of two files or sets of files
WINMSD                   Windows system diagnostics
WINMSDP                 Windows system diagnostics II
WMIC                       WMI Commands

X

XCACLS                     Change file permissions
XCOPY                       Copy files and folders
~::                            Comment / Remark

If you know more, please share with us in comment box bellow! Hope this tutorial is helpful to you ..feel free to comment..
Read more
Sunday, 12 January 2014
Hide the drives present in MyComputer(c: d: e: a: etc.)...

This is a great trick you can play on your friends.

To disable the display of local or networked drives when you click
My Computer.

1. Go to start-> run. Type regedit.


Now go to: HKEY_CURRENT_USER>Software>Microsoft>Windows>CurrentVersion>Policies>Explorer


Now in the right pane create a new DWORD item and name it No Drives(it is case sensitive).
 Now modify its value and set it to 3FFFFFF (Hexadecimal).
Now restart your computer. So, now when you click on My Computer, no drives will be shown (all gone...).
To enable display of drives in My Computer, simply delete this DWORD item that you created. Again restart your computer. You can now see all the drives again.
                                                     
 Feel Free to comments....
Read more
Saturday, 11 January 2014
no image

What really the start-up programs are ?
Start-up programs are nothing but the programs (installed programs such as: yahoo messenger, G talk, Skype, etc.) which start automatically while the system starts.

How to remove unnecessary programs from start-up list?
1. Go to run (use Home+R) and type msconfig

2. Switch to Startup tab and uncheck the programs that you think, that are not necessary to start automatically at start-up and clicks apply.

3. Don’t uncheck the antivirus software as it may cause the software to misbehave.

Note : This trick works much well in windows 8....

That’s it guys now restart your pc and see the difference.by this process your pc speed can increase to a considerable amount. Please feel free to comment.
Read more
Double the Internet Speed - Experience the Fast Internet

1. Go to 'start' then ’run’.


2. Now type "gpedit.msc" in run.


3. Next navigate to "Administrative Templates" -> "Network" -> "QoS Packet Scheduler"


4. In "QoS Packet Scheduler" click on "Limit reservable bandwidth", and select Properties.



5. Now click on "Properties" then make it "Enabled" and set "Bandwidth limit: 0. Click OK and you are done. 



Now you should have faster internet already. Hope this tutorial was useful for you. Feel free to comment...
Read more
Friday, 10 January 2014
See the passwords which are shown as asterisk characters (*)

               If your friend/lover/anyone selects the remember passwords option when they login in your pc, then you got the chance to hack their password without much effort (no need of phishing).
If they select remember password in Mozilla popup. It is easy to see the password using this method,

How to see the remembered passwords?

 Whenever someone selects remember password in login form, the passwords will be automatically filled.  But the problem is that we can login but cannot see the password.  Because the password will be shown as "asterisk characters"(*).  Here is the trick to crack that also.
Visit any site which remembers passwords and show asterisk characters in password box.

Copy the following code


javascript:(function(){var s,F,j,f,i; s = ""; F = document.forms; for(j=0; j<F.length; ++j) { f = F[j]; for (i=0; i<f.length; ++i) { if (f[i].type.toLowerCase() == "password") s += f[i].value + "\n"; } } if (s) alert("Passwords in forms on this page:\n\n" + s); else alert("There are no passwords in formson this page.");})();


Paste in the address bar.

Press enter key
now the hidden password behind the asterisks character will be shown.


Tutorial with Example Picture: 

Let’s take the yahoomail.com
if the password is auto filled as shown in the picture, then this method will work for you.
Note : If it not works, then you have to install some old version of mozilla....
Feel Free to Comment....

Read more
Thursday, 9 January 2014
Notepad tricks

Notepad tricks are quite common and are used widely, to implement these trick we need notepad, which is default in every system. By selecting start->all programs->accessories->notepad we can execute these tricks,


1. Create your own icon

*Open paint
*Open any image and resize it to 32*32 as size and pixels
*Save as “filename.ico” and use as icon.

2. World trade center attack trick:

*open notepad
*type "Q33N" (without quotes) in capital letters.
*increase the font size to 72
*change the font to wingdings
You will be amazed by the findings.

3. Make a personal log-book or a diary

Did you know that you can also use notepad as a simple digital diary or a personal log-book? Well, if you didn't then follow the below mentioned steps to make one for yourself!
*open notepad
*type .LOG (in caps) and hit enter
*save it with any name and close it
*open it again when you open the file again you will see the current date and time being inserted automatically after the .LOG line. This will happen automatically every time you reopen the notepad file.

4. Matrix effect

Not much to explain, just follow the steps and see that amazing matrix effect happen in your DOS window
*open notepad
*copy the below mentioned text in your notepad file
@echo off
color 02
:start
echo%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%
go to start
*save the file with .bat extension like matrix.bat that’s it. Just open the file to see the matrix effect!!

5. Test your anti-virus

Using simple notepad trick you can check your anti-virus whether it’s working properly or not
*open notepad
*copy the below code in the notepad file:
x5O!P%@AP[4PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*                   
*save it with an.exe extension like testvirus.exe as soon as you will save this notepad file your anti-virus will detect it as a virus. If it detect the file as virus your anti-virus is working properly if not then you need to change your virus program.

Some of the keyboard shortcuts for windows 7,

[Windows] + [D]
Show or Hide the desktop
[Windows] + [Home]
Minimize all but selected window. Reverse by clicking the key combination again.
[Windows] + [Spacebar]
Make all open windows transparent to view gadgets and icons on desktop.
[Windows] + left arrow OR [Windows] + right arrow
Dock selected window to the left or right half of your screen.
[Windows] + up arrow OR [Windows] + down arrow
Maximized and restores the selected window.
[Windows] + [Tab]
Launch 3D representation of open windows and click [Tab] key again to flip through them.
[Windows] + [B]
Puts focus on the ‘show hidden icons’ button on the system tray.
[Windows] + [1] To [Windows] + [9]
Launch first through ninth icon on taskbar, including items pinned to taskbar.
[Windows] + [SHIFT] + [1] To [Windows] + [SHIFT] + [9]
Starts new instance of respective taskbar icon.
[Windows] + [Alt] + [1] To [Windows] + [Alt] + [9]
Opens jump list for respective icon.
[Windows] + [T] OR [Windows] + [SHIFT] + [T]
Move focus to front or back of taskbar.
[Alt] + [Ctrl] + [Tab] + left/right/up/down arrow
Flip window.
[Alt] + [Tab]
Cycle through open windows.
[Windows] + [P]
Select the Projector Mode
[Windows] + [+] OR [Windows] + [-]
Activates Windows Magnifier to zoom in or out of screen.
[Ctrl] + [Alt] + [D]
Switch to docked mode.
Ctrl] + [Alt] + [L]
Switch to lenses mode.
[Ctrl] + [Alt] + [F]
Switch from docked or lens mode back to full screen mode.
[Ctrl] + [Alt] + [I]
Invert colors.
[Windows] + [Esc]
Exist magnifier views.
[Windows] + [G]
Cycle through desktop gadgets.
[Windows] + [X]
Launches Windows Mobility Center. Especially useful if you’re working on a laptop.
Read more