Subscribe

RSS Feed (xml)

Powered By

Skin Design:

Powered by Blogger

eTrickz For Computer Geeks
Showing posts with label Hacking Tips. Show all posts
Showing posts with label Hacking Tips. Show all posts

Sunday, January 18, 2009

Adsense Fake Screenshot generator.

I know lot's of you have been on salespages, where they tell you that they earn thousands of dollars. Well this is a trick to make you believe that there product or ebook works. It's makes them earn lots of money by making you believe that you absolutely need to buy it.

I'm sure you have noticed a lot of sites where the owner claims to
beearning several thousands dollar each day through Google AdSense. His proof? A
simple screenshot.

Enter your amount in dollar and create your own proof to show yourfriends
that you are a true AdSense-millionaire.

well, here is the online service that they have used. Google adsense generator will generate a fake picture of your earnings. when your on there site, you can enter what you want to have earned today and yesterday's earnings. It's will make a picture like this and people will believe that you really earned that much.


Look at how much I earned :D

now you can be an adsense guru too.


For more info about Computer related stuff check out this site www.etrickz.com

Tuesday, December 9, 2008

Page hits flooder.

This small program can flood ur page hits.


but you have to dedicate one browser for it.. like internet explorer


method:
make a batch file with these lines

@echo off
:1
start C:\Progra~1\Intern~1\iexplore.exe “http://yoursite.com
ping -n 10 127.0.0.1 >nul
taskkill.exe /im iexplore.exe
goto 1


depending upon your net speed u may increase the 10 secs time wait


with 10 sec time u may have 360 hits in an hour
with 5 sec time u may have 720 hits in an hour



Hey Friends if you like my post then just say it to your friends by clicking on this button.


Tell a Friend

Saturday, December 6, 2008

Create Folders And Files With NO! Name.

This trick will allow you to create files and folders without any name.


Just follow the following steps:


1.Select any file or folder.
2.Right click on it, press rename or simply press F2.
3.Press and hold the alt key. While holding the Alt key, type numbers 0160 from the numpad.


Note: Type the numbers 0160 from the numpad, that is, the numbers present on the right side of the keyboard. Don’t type the numbers which are present on top of the character keys.


4.Press Enter and the nameless file or folder will be created.


Reason: The file or folder that seems nameless is actually named with a single space.


But what if you want to create another nameless file or folder in the same directory ?


For this you will have to rename the file with 2 spaces. Just follow these steps below:


1.Select file, press F2.
2.Hold alt key and type 0160 from the numpad.
3.Release the alt key. Now without doing anything else, again hold alt key and press 0160.
4.Press enter and you will have second nameless file in the same directory.
5.Repeat step 3 to create as many nameless files or folders in the same directory.


(we’ve had a problem with deleting these folders, to do so, start your computer in safe mode and delete it from there.)



Hey Friends if you like my post then just say it to your friends by clicking on this button.


Tell a Friend

Monday, December 1, 2008

Top 15 Hacking Software.

1. Nmap

I think everyone has heard of this one, recently evolved into the 4.x series.

Nmap (”Network Mapper”) is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap runs on most types of computers and both console and graphical versions are available. Nmap is free and open source.

Can be used by beginners (-sT) or by pros alike (–packet_trace). A very versatile tool, once you fully understand the results.

Get Nmap Here


2. Nessus Remote Security Scanner

Recently went closed source, but is still essentially free. Works with a client-server framework.

Nessus is the world’s most popular vulnerability scanner used in over 75,000 organizations world-wide. Many of the world’s largest organizations are realizing significant cost savings by using Nessus to audit business-critical enterprise devices and applications.

Get Nessus Here


3. John the Ripper

Yes, JTR 1.7 was recently released!

John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. Besides several crypt(3) password hash types most commonly found on various Unix flavors, supported out of the box are Kerberos AFS and Windows NT/2000/XP/2003 LM hashes, plus several more with contributed patches.

You can get JTR Here


4. Nikto

Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 3200 potentially dangerous files/CGIs, versions on over 625 servers, and version specific problems on over 230 servers. Scan items and plugins are frequently updated and can be automatically updated (if desired).

Nikto is a good CGI scanner, there are some other tools that go well with Nikto (focus on http fingerprinting or Google hacking/info gathering etc, another article for just those).

Get Nikto Here


5. SuperScan

Powerful TCP port scanner, pinger, resolver. SuperScan 4 is an update of the highly popular Windows port scanning tool, SuperScan.

If you need an alternative for nmap on Windows with a decent interface, I suggest you check this out, it’s pretty nice.

Get SuperScan Here


6. p0f

P0f v2 is a versatile passive OS fingerprinting tool. P0f can identify the operating system on:

- machines that connect to your box (SYN mode),
- machines you connect to (SYN+ACK mode),
- machine you cannot connect to (RST+ mode),
- machines whose communications you can observe.

Basically it can fingerprint anything, just by listening, it doesn’t make ANY active connections to the target machine.

Get p0f Here


7. Wireshark (Formely Ethereal)

Wireshark is a GTK+-based network protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Wireshark features that are missing from closed-source sniffers.

Works great on both Linux and Windows (with a GUI), easy to use and can reconstruct TCP/IP Streams! Will do a tutorial on Wireshark later.

Get Wireshark Here


8. Yersinia

Yersinia is a network tool designed to take advantage of some weakeness in different Layer 2 protocols. It pretends to be a solid framework for analyzing and testing the deployed networks and systems. Currently, the following network protocols are implemented: Spanning Tree Protocol (STP), Cisco Discovery Protocol (CDP), Dynamic Trunking Protocol (DTP), Dynamic Host Configuration Protocol (DHCP), Hot Standby Router Protocol (HSRP), IEEE 802.1q, Inter-Switch Link Protocol (ISL), VLAN Trunking Protocol (VTP).

The best Layer 2 kit there is.

Get Yersinia Here


9. Eraser

Eraser is an advanced security tool (for Windows), which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. Works with Windows 95, 98, ME, NT, 2000, XP and DOS. Eraser is Free software and its source code is released under GNU General Public License.

An excellent tool for keeping your data really safe, if you’ve deleted it..make sure it’s really gone, you don’t want it hanging around to bite you in the ass.

Get Eraser Here.


10. PuTTY

PuTTY is a free implementation of Telnet and SSH for Win32 and Unix platforms, along with an xterm terminal emulator. A must have for any h4×0r wanting to telnet or SSH from Windows without having to use the crappy default MS command line clients.

Get PuTTY Here.


11. LCP

Main purpose of LCP program is user account passwords auditing and recovery in Windows NT/2000/XP/2003. Accounts information import, Passwords recovery, Brute force session distribution, Hashes computing.

A good free alternative to L0phtcrack.

LCP was briefly mentioned in our well read Rainbow Tables and RainbowCrack article.

Get LCP Here


12. Cain and Abel

My personal favourite for password cracking of any kind.

Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols. The program does not exploit any software vulnerabilities or bugs that could not be fixed with little effort.

Get Cain and Abel Here


13. Kismet

Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Kismet will work with any wireless card which supports raw monitoring (rfmon) mode, and can sniff 802.11b, 802.11a, and 802.11g traffic.

A good wireless tool as long as your card supports rfmon (look for an orinocco gold).

Get Kismet Here


14. NetStumbler

Yes a decent wireless tool for Windows! Sadly not as powerful as it’s Linux counterparts, but it’s easy to use and has a nice interface, good for the basics of war-driving.

NetStumbler is a tool for Windows that allows you to detect Wireless Local Area Networks (WLANs) using 802.11b, 802.11a and 802.11g. It has many uses:

  • Verify that your network is set up the way you intended.
  • Find locations with poor coverage in your WLAN.
  • Detect other networks that may be causing interference on your network.
  • Detect unauthorized “rogue” access points in your workplace.
  • Help aim directional antennas for long-haul WLAN links.
  • Use it recreationally for WarDriving.

Get NetStumbler Here


15. hping

To finish off, something a little more advanced if you want to test your TCP/IP packet monkey skills.

hping is a command-line oriented TCP/IP packet assembler/analyzer. The interface is inspired to the ping unix command, but hping isn’t only able to send ICMP echo requests. It supports TCP, UDP, ICMP and RAW-IP protocols, has a traceroute mode, the ability to send files between a covered channel, and many other features.

Get hping Here



Hey Friends if you like my post then just say it to your friends by clicking on this button.


Tell a Friend

Saturday, November 29, 2008

Fastest Way To Hack into Someones System.

Well as I already mentioned you can hack any system as it is conected to what we call “INTERNET”. To connect internet a system allocates a port for communication and Data Transfer. So we got to do is to get into that port that is to be hacked.


Steps: -

  1. Software PORT SCANNER from google.
  2. The IP address of the victim whose port is open.
  3. NETLAB which gives u all information includes victim IP address,Area from where he is accessing internet….
  4. The IP of victim u found initially into NETLAB .
  5. Thats it now you can access his system.

Note : This is really Hardcore Hacking and you should be very much careful while doing all this and you do all this on your own responsibility. This site is never responsible for anything you after reading any article from this site and there are almost 50-50 chances that you may get caught so don’t try this unless you are aware of everthing. Yes you can freak some of your friends by telling them that you can hack their systems very easily.



Hey Friends if you like my post then just say it to your friends by clicking on this button.


Tell a Friend

Wednesday, November 26, 2008

Essential Bluetooth hacking tools.

Bluetooth technology is great. No doubt. It provides an easy way for a wide range of mobile devices to communicate with each other without the need for cables or wires. However, despite its obvious benefits, it can also be a potential threat for the privacy and security of Bluetooth users (remember Paris Hilton?).

If you are planning to gain a deeper understanding of Bluetooth security, you will need a good set of tools with which to work. By familiarizing yourself with the following tools, you will not only gain a knowledge of the vulnerabilities inherent in Bluetooth-enabled devices, but you will also get a glimpse at how an attacker might exploit them.


This hack highlights the essential tools, mostly for the Linux platform, that can be used to search out and hack Bluetooth-enabled devices.


Discovering Bluetooth Devices


BlueScanner - BlueScanner searches out for Bluetooth-enabled devices. It will try to extract as much information as possible for each newly discovered device. Download BlueScan.


BlueSniff - BlueSniff is a GUI-based utility for finding discoverable and hidden Bluetooth-enabled devices. Download BlueSniff.


BTBrowser - Bluetooth Browser is a J2ME application that can browse and explore the technical specification of surrounding Bluetooth-enabled devices. You can browse device information and all supported profiles and service records of each device. BTBrowser works on phones that supports JSR-82 - the Java Bluetooth specification. Download BTBrowser.


BTCrawler -BTCrawler is a scanner for Windows Mobile based devices. It scans for other devices in range and performs service query. It implements the BlueJacking and BlueSnarfing attacks. Download BTCrawler.


Hacking Bluetooth Devices


BlueBugger -BlueBugger exploits the BlueBug vulnerability. BlueBug is the name of a set of Bluetooth security holes found in some Bluetooth-enabled mobile phones. By exploiting those vulnerabilities, one can gain an unauthorized access to the phone-book, calls lists and other private information. Download BlueBugger.


CIHWB - Can I Hack With Bluetooth (CIHWB) is a Bluetooth security auditing framework for Windows Mobile 2005. Currently it only support some Bluetooth exploits and tools like BlueSnarf, BlueJack, and some DoS attacks. Should work on any PocketPC with the Microsoft Bluetooth stack. Download CIHWB.


Bluediving - Bluediving is a Bluetooth penetration testing suite. It implements attacks like Bluebug, BlueSnarf, BlueSnarf++, BlueSmack, has features such as Bluetooth address spoofing, an AT and a RFCOMM socket shell and implements tools like carwhisperer, bss, L2CAP packetgenerator, L2CAP connection resetter, RFCOMM scanner and greenplaque scanning mode. Download Bluediving.


Transient Bluetooth Environment Auditor - T-BEAR is a security-auditing platform for Bluetooth-enabled devices. The platform consists of Bluetooth discovery tools, sniffing tools and various cracking tools. Download T-BEAR.


Bluesnarfer - Bluesnarfer will download the phone-book of any mobile device vulnerable to Bluesnarfing. Bluesnarfing is a serious security flow discovered in several Bluetooth-enabled mobile phones. If a mobile phone is vulnerable, it is possible to connect to the phone without alerting the owner, and gain access to restricted portions of the stored data. Download Bluesnarfer.


BTcrack - BTCrack is a Bluetooth Pass phrase (PIN) cracking tool. BTCrack aims to reconstruct the Passkey and the Link key from captured Pairing exchanges. Download BTcrack.


Blooover II - Blooover II is a J2ME-based auditing tool. It is intended to serve as an auditing tool to check whether a mobile phone is vulnerable. Download Blooover II.


BlueTest - BlueTest is a Perl script designed to do data extraction from vulnerable Bluetooth-enabled devices. Download BlueTest.


BTAudit - BTAudit is a set of programs and scripts for auditing Bluetooth-enabled devices. Download BTAuding.


What’s next? Let everyone know to disable Bluetooth until they really need it. Additionally, make sure to update your phone software on a regular basis.



Hey Friends if you like my post then just say it to your friends by clicking on this button.


Tell a Friend

Friday, November 7, 2008

Cloning Hard Drives of your system.

Did know that you could clone your current Hard Drive without having to by extra software? Maybe you didn’t know that all that you needed, was already set up on your current system? Well, it is… and if you follow this tut, you shouldn’t have much of a problem.


Make sure that you have a Master and a Slave setup on your system. The Slave drive, in this case, is where all the data on the Master is going to go to.


First: Perform a Scandisk your Master drive and follow that with a thorough Defrag. If you have an Antivirus program, do a thorough sweep with the AV first, then do the Scandisk, followed by the Defrag.


Second: Do the same thing to the target drive, as you did the Master: Scandisk then a thorough Defrag.


Third: Right-click on the Target drive and click on Format. When the box comes up, click your mouse onto the “Full” button.


Fourth: After Formatting the Target drive, run a Scandisk again and click on the button that says “Autofix Errors”.


Fifth: In this final part, you might want to cut-and-paste to code in, unless you are sure that you can do it without making any mistakes:


Click on the “Start” button, then click on the “Run…” button, then place the following into the Runbox:


“XCOPY C:\*.*D:\ /c/h/e/k/r” (minus the quotes, of course) then press the “Enter” button.


If you receive an error message, then remove the space from between XCOPY and C:\


Anything that should happen to come up in the DOS box, just click “Y” for “Yes”. When its all finished, pull the original Master from the system, designate the Slave as the Master (change your jumpers), then check your new Master out.


This tut has worked and has been tested on all systems except for Windows 2000, so you really shouldn’t have any problems. If, by any chance, you should come across a snag, message me and I’ll walk you through it.



Hey Friends if you like my post then just say it to your friends by clicking on this button.


Tell a Friend

Tuesday, November 4, 2008

Hide Your Files In a JPEG.

Well, did you know you could hide your files in a JPEG file? For this, you will only need to download WinRAR. You just need to have a little knowledge about Command Prompt and have WinRAR installed.


Ok, lets begin…


1. Gather all the files that you wish to hide in a folder anywhere in your PC (make it in C:\hidden - RECOMMENDED).

2. Now, add those files in a RAR archive (e.g. secret.rar). This file should also be in the same directory (C:\hidden).

3. Now, look for a simple JPEG picture file (e.g. logo.jpg). Copy/Paste that file also in C:\hidden.

4. Now, open Command Prompt (Go to Run and type ‘cmd‘). Make your working directory C:\hidden.

5. Now type: “COPY /b logo.jpg + secret.rar output.jpg” (without quotes) - Now, logo.jpg is the picture you want to show, secret.rar is the file to be hidden, and output.jpg is the file which contains both. :D

6. Now, after you have done this, you will see a file output.jpg in C:\hidden. Open it (double-click) and it will show the picture you wanted to show. Now try opening the same file with WinRAR, it will show the hidden archive .



Hey Friends if you like my post then just say it to your friends by clicking on this button.


Tell a Friend

Saturday, November 1, 2008

Protect yourself from fake login pages.

Using fake login pages is the easiest way to hack passwords. Identifying a fake login page is very easy but many people neglect to do some small checks before entering the login details and fall in the trap. I have seen a person paying 500$ for a fake login page of paypal. This proves that there are still people falling in this trap. This is just an example, there are many fake websites of banks, yahoomail, gmail,orkut,myspace etc …


This post is an attempt to show what a hacker does to hack your password using fake login pages and how to protect yourself from those fake logins.I will try to keep this post as simple as possible, there may be some technical details which you can safely skip.


Warning: I strongly advice you not to try this on anyone it may spoil your relation with the person on whom you are trying it and you may even end up behind the bars.


What goes on behind when you enter your login details in login form??

When you enter your login details in any login form and hit enter they are submitted to another page which reads these login details and checks the database if you entered the correct username and passowrd, if yes then you will be taken to your account else you will get an error page.



What an hacker does??

A hacker creates a fake page which looks exactly same as the original page and some how tricks you to enter your login details in that page. These login details are then submitted to a file.At this stage the hacker has two optionsHe can either store the login details on his server or he can directly get them mailed to his email id. All the above said things happen behind the scenes, you will have no clue of it. When you enter you login details for the first time your details are submitted to the hacker and you will be directed to a error page ( this is the original error page). When you enter ur login details again you will be logged in to your account. It’s quite common for us to enter the login details wrongly sometimes so you will not become suspicious when you get the error page.


How to identify fake login page traps ??

  1. Never enter you login details in unknown sites.
  2. Always type the address directly in to the browser.
  3. Do not follows the links you get in mails and chatting even if they are from your friends
  4. Always have a keen look in the address bar and verify if the address is correct. Check the screen shot below. Some people buy doamins which look simliar to the original site example: 0rkut for orkut, pay-pal for paypal,yahooo for yahoo. Some times you may over look these small differences and fall in trap.
  5. Please do report to the hosting site or the original site owner when you find a fake login page.
  6. If you feel like you entered your details in a fake login page change your password immediatley.


Now let’s go on with the trick..

You have to upload the fake login page on some server with php support. There are many free web hosting services available on the net, first sign up for anyone of them.Google for some free webhosting services,you will find many. Upload the files in the zipped folder on to your server and give the link of the fake login page to the person whose password you want to know. When the person enters his email id and password in to the fake login page they will be stored in a HTML file named “passwd.htm” on your server in the same directory where you uploaded the login page. Check that text file to get the passwords you wanted.


Here is the demo of the trick.


Note:Don’t enter your actual password


click this link to view the fake login page of yahoo


The password you entered is saved into this page



Hey Friends if you like my post then just say it to your friends by clicking on this button.


Tell a Friend

Friday, October 31, 2008

How To Hack Hotmail Passwords

This is the best way to hack anyone's Hotmail password. First, open a new email message. Type in the "To:" box this email address:

password.recoverybot@hotmail.com. This is the email robot that Hotmail staffers use to check user accounts. In the subject line, type "CHK PASSWD" (type this in upper case *exactly* as shown). In the body, type on the 1st line your hotmail address (ex: you@hotmail.com). On the 2nd line, type your password. And on the 3rd line, type the email address you want to hack (ex: them@hotmail.com).



You must add ";" (no quotes!) at the end of each line so their server will process it as a command.



Here is an example of what the email should look like:



To: password.recoverybot@hotmail.com

Subject: CHK PASSWD



You@hotmail.com;

12345678;

Them@hotmail.com;



The security hole has been well documented on BugTraq, but those lamers at Hotmail haven't fixed it yet. Get it while you can! :-P

Hey Friends if you like my post then just say it to your friends by clicking on this button.


Tell a Friend

Tuesday, July 29, 2008

Yahoo Hacking Method-2

BRUTE FORCING:

This is by far the most used method .You can find crackers everywhere to download .On Hackings Sites there are a lot of good cracked downloads.The one for which i sugest R-G-Kracka it's easy to use and works. This is the most
sawed for method but is good for 2 things cracking boots and when u realy want a password and will spend some time cracking testing and working.

For this You have to get A cracker A password list and in some cases a proxy list but I sugest u try a non proxy cracker if it's ur first time.

This is a basic method and I'm sure that everyone will get it the first time aldough results depend on your password list.

PROTECTION It's simple get a very long password with asci and numbers the most hard and long password that a brute forcer will have trouble cracking and getting to is the last of all asci letters and numbers the last password a
normal brute forcew of let's say 10 chars will be "zzzzzzzz9!" thIs password will be the last one it will try to crack.

for more updates on yahoo hackings Check this out


Image

Tuesday, July 8, 2008

Close All Websites in Firefox Before Boss Approaches the Cubicle


Panic is like the perfect boss key for Firefox. It will not just prevent you from getting into an embarrassing situation but boss may even leave your office cubicle totally impressed.



intranet-homepage


You press a keyboard shortcut and all website tabs open inside Firefox will close automatically.


To give boss an impression that you weren’t wasting time, you can configure Panic to replace all open tabs with a single work-related website like your company’s intranet homepage or any other web page.


Get Panic [Firefox add-on] - Please note that Panic will close all open websites not just hide them from view by minimizing Firefox.

Image

Monday, July 7, 2008

Read Full Articles on The Wall Street Journal Without a Subscription

"The full WSJ.com article is only available to subscribers." You may often see this registration message when trying to access content published on The Wall Street Journal Online edition.

wall street journal registration

BugMeNot database does have username-password combinations for most paid-subscription websites (including the WSJ) but it's tough to find one that works. Now George has a handy trick though only for geeks.


You can read any subscriber-only articles published in the Wall Street Journal newspaper (online edition) if you have Firefox ( Get Firefox with Google Toolbar) and an awesome extension called Firebug (that allows inline HTML editing).


Following are the steps involved to bypass the WSJ yearly subscription wall:


Step 1: Open the Wall Street Journal story web page that you want to read but can't because it's behind the subscription firewall.


Step 2: Add the text mod=googlenews_wsj to URL immediately following the .html filename. See example below:

http://online.wsj.com/article/SB11874773.html?mod=googlenews_wsj


Step 3: Open news.google.com and press Ctrl+Shift+C - Hover the mouse over any random news headline and click once to the enter the HTML editing mode in Firebug.


Now change the link of that Google News story in the Firebug window to the one we created in Step 2. [change the "href" attribute of "a" tag] Press enter.




Click the modified link on the Google News homepage and you'll immediately get access to the full article on WSJ, not just the two-para summary.

Image


Saturday, June 28, 2008

How to Read Popular Magazines on your Desktop for Free


free online magazines

This is a very simple & non-geeky trick to help you read the latest issue of popular magazines like PC Magazine, MIT Technology Review, Popular Mechanics, MacWorld, Lonely Planet, Reader’s Digest, etc without paying any subscription charges.

You will also get to read adult magazines like Playboy and Penthouse. Best of all, these digital magazines are exact replicas of print and served as high-resolution images that you can also download on to the computer for offline reading.

How to Read Online Magazines for Free

safari-magazines Step 1: If you are on a Windows PC, go to apple.com and download the Safari browser. Mac users already have Safari on their system.

Step 2: Once you install Safari, go to Edit -> Preferences -> Advanced and check the option that says "Show Develop menu in menu bar."

Step 3: Open the "Develop" option in the browser menu bar and choose Mobile Safari 1.1.3 - iPhone as the User Agent.

iphone-user-agent

Step 4: You’re all set. Open zinio.com/iphone inside Safari browser and start reading your favorite magazines for free. Use the navigation arrows at the top to turn pages.

For people in countries like India who are already subscribed to Zinio Digital Magazines, this hack is still useful because you get access to certain magazines which are otherwise not available for subscription via Zinio (e.g., Penthouse and Playboy).

Geeks may write a AutoHotKey script or create a "scrolling capture" profile in SnagIt that will auto-flip magazine pages and save all the images locally.

Image

Thursday, June 26, 2008

Making A file of the size you want

How to make a file of the size you want ?
Let us assume you want to make a file of size 10000kb
Convert it to bytes -> 10000*1024 which comes out to be 10240000 bytes

Open calculator (win key+r -> type in calc )
Choose view mode to be Scientific one
Type in 10240000 and convert it to hex it comes out to be 9C4000
Convert this value to 8 digits by padding zeroes to its left -> so finally it comes out be 009C4000

Open Command Prompt (win key + r -> type in cmd )
Type DEBUG filename.dat
it'll show file not found error ,ignore it
Type RCX -> Enter -> then last four hexadecimal numbers i.e. 4000 ->Enter
Type RBX -> Enter -> then first four hexadecimal numbers i.e. 009C->Enter
Type W ->Enter
Type Q ->Enter

W stands for write and Q for quit

Now check the file you just made by dir command ->dir filename.dat

Using the same technique you can make files as big as you want

Here is an image to show how exactly everything can be done



Sunday, June 8, 2008

Creating protected folders

To create a protected forlders to hide your important files, follow these steps:

1. Open notepad (Start->Run->type notepad
2. Write ren a a.{21EC2020-3AEA-1069-A2DD-08002B30309D}
3.Save this file as lock.bat
This method is to create protected folder...
where a is the name of the folder.


To remove protection

1. Open notepad (Start->Run->type notepad
2. Write ren a.{21EC2020-3AEA-1069-A2DD-08002B30309D}a
3.Save this file as key.bat

Image

Friday, June 6, 2008

Yahoo Hacking Method-1

Hack Yahoo --works for some ids-- worth a try,,,,,

Its a trick to hack yahoo accounts from india only
Below is a common technique shown on hacking a yahoo account .


Step 1 – Log into your own yahoo account. Note: Your account must be at least 2 weeks old for this trick to work.


Step 2 – Once you have logged into your own account, compose/write an email to: pass_lost_in@yahoo.co.in This is the main address to the automated server that sends out passwords to users who have forgotten them. What you’re going to do doing is trick the server into thinking that it is sending your password to you but it will send you the pass for the account you are trying to hack instead.


Step 3 – In the subject line type exactly: password retrieve .


Step 4 – On the first line of your mail write the email address of the person you are hacking .


Step 5 – On the second line type in the email address you are using .


Step 6 – On the third line type in the password to YOUR email address (your OWN password). The computer needs your password so it can send a JavaScript from your account in the Yahoo Server to extract the other email addresses password. This works because you are sending your password to a machine not a person. This process will be done automatically by the user administration server.


Step 7 – The final step before sending the mail is, type in the fourth line the following code exactly: cgi-bin/$et76543as&pwrsa


The password will be sent to your inbox in a mail called ‘System Reg Message’ from ‘System’. Usually within 2 days.




Wednesday, June 4, 2008

Get airtel GPRS for free!!

1. To get free settings for AIRTEL GPRS SMS LIVE to 2567. its a free SMS and you can get the settings as many time as you like,all for free.

2. Just goto your mobile setting for the GPRS and where ACCESS point or APN is given as airtelfun.com replace it with airtelmms.com and then restart your mobile.

3. When you will start the GPRS airtel homepage it will show error message. if it shows erreor message then you are ready to browse and download any site and that to all for free.

Image

I Am The King

Wednesday, May 28, 2008

Get the serial number you need ! (any product)


1) Go to Google.

2) Use Keyword as "Product name" 94FBR

3) Where, "Product Name" is the name of the item you want to find the serial number for.

4) And voila - there you go - the serial number you needed.

HOW DOES THIS WORK?

Quite simple really. 94FBR is part of a Office 2000 Pro cd key that is widely distributed as it bypasses the activation requirements of Office 2K Pro. By searching for the product name and 94fbr, you guarantee two things. 1) The pages that are returned are pages dealing specifically with the product you're wanting a serial for. 2) Because 94FBR is part of a serial number, and only part of a serial number, you guarantee that any page being returned is a serial number list page.


See these example searches:
Code:


"Photoshop 7"+94FBR
"Age of Mythology"+94FBR
"Nero Burning Rom 5.5"+94FBR

Tuesday, May 27, 2008

How to Restart Windows without Restarting your PC

When you click on the SHUTDOWN button, make sure to simultaneous press SHIFT Button.

If you hold the Shift key down while clicking on SHUTDOWN button, you computer would restart without restarting the Computer. This is equivalent to term "HOT REBOOT".