Wednesday, April 6, 2011

The power of hacking

.......Hacking is the most common word you would  listen very often . below i have listed few  hacking tricks(only for educational purpose ) to show the  power of hacking... read them and  enjoy do not forget to comment


Hacking is the process of achieving access to a computer or computer network without legal authorization. It is the most common activity amongst teenagers and young adults. Many hackers are keen to learn about computers and consider hacking as an art. They want to build programs to display their problem solving skills and not to harm others. A hacker first tries their skills on easy targets and then after successful professional attacks on more secured sites. Their goal is to have complete access on any computer so that they can delete, edit or comply any files or directory and also can install any program. Computer hackers are employed by many companies to get complete access on the computer so that they can delete, edit, copy any file or install as their technical staff. These hackers use their skills to find faults in company’s security system so that it can be repaired quickly. Sometimes hacking also prevents serious identity related crimes. It is an offence if hackers steal private information or changes some financial or personal data. All the types of unauthorized access can lead the hacker towards the prison for 20 years. One way of hacking is to get a copy of password file which stores all usernames and password in encrypted form or they can also use brute-force attack trying all the possible combinations of letters. Hacking is also done by emailing a program to anyone that runs automatically when clicked on some link or attachment. In this way you can install a program on a computer that can give you access of that computer. Another method of hacking is IP spoofing. IP spoofing is the creation of internet protocol packets with the fake IP address in order to conceal the identity of the sender. To protect your computer from hacking, you should install firewalls or other antivirus programs on the computer and also check for the updating of the machine at regular intervals.


Do you know you can have Virtual Desktops (like in Linux) with PowerToys ?

If you have powertoys installed on Windows XP Its available for free at Microsoft download webpage. It is very easy to enable Microsoft Virtual Desktop Feature. Simply right click on the Start Panel Bar also called TaskBar, Click on Tool Bar and select Desktop manager.
You would see a set of 5 icons placed on the right portion of the TAskBar. Click on number 1 to 4 to go to any of the desktops. Now you have have four different Active Desktops.
IMPORTANT NOTE: You may see a little degradation in performance.



The following are a few Anti-Hacking tips that will help in keeping your systems secure.

   1. Install Anti-Virus software and ensure that it’s regularly updated.(If you do only one thing to help protect the safety of your computing environment, always take prompt advantage of software updates).

   2. Anti-virus software isn’t enough – it’s also a good idea to install firewall (Good fences make good neighbors) software which will help prevent unauthorized incoming and outgoing communications from your computer while connected to the Internet.

   3. Passwords protect the settings on the software so no-one else can alter protection levels. Most anti-virus programs also offer some protection against Trojans, which aren’t actually a virus, but a small program that allows others to control your computer.

   4. Turn off your preview window in your email program. Some viruses, called worms, can infect your system without you clicking on attachments – just by you having your preview window open. Some worms can cause your sensitive information and documents to be transmitted to millions of people. Be very cautious in opening attachments, even if it appears to come from someone you know – their system may be infected.

   5. Disconnect your computer from the Internet when not in use. The longer you are connected to the Internet, the more opportunity you give for persons to gain unauthorized access.

   6. If your computer is used by others, carry out regular examination of the software on it and research any software that you discover that you haven’t installed yourself. It’s safest to make it a policy not to allow any software to be installed without your permission.

   7. If you must store usernames and passwords on your system, ensure they are contained in a document that is password protected. It is safest not to store any passwords on your computer. Don’t let Windows “remember” passwords for you. Passwords should always be more than 8 characters long and include upper and lower case letters, numerals, symbols.

   8. Ensure that you log out of online services properly. Failure to do so can allow others who use your computer to gain access to those services and you can be blamed for their activities.

   9. Back up your files and store them away from your computer. Frequent backups just make good sense. The more virulent types of attacks damage or infect your hard drive and you can lose valuable personal information. By backing up your data weekly you can help protect your important files, computer settings, and irreplaceable digital media.


GMail introduced a new feature recently, that is browsing mails offline. 

Today we are going to see how to do that.

First you need to install Google Gears, you can download the online installer from here
http://gears.google.com/

Run the online installer and it will install Google Gears on your system.

Now open your GMail and navigate to the settings and then to the Labs tab, there you will find a feature called offline, Enable that.

Thats it you are almost done, just a few clicks away. It will ask your permission to install offline access for GMail, click next.Then you get a Google Gears security warning, allow it.Click ok in the next window and you are done.It will download all your mails to your hard drive for offline browsing. You can see the status in the status window.

Have fun browsing gmail offline.




Be Very Careful with this..! ctr+c and ctr+v

We all copy various data by using ctrl+c/Copy for pasting elsewhere.
This copied data is stored on clipboard and is accessible over the net by a combination of Javascripts and ASP.

Just try this:
1) Copy any text by ctrl+c
2) Click the Link: http://www.friendlycanadian.com/applications/clipboard.htm
3) You will see the text you copied on the Screen which was
accessed by this web page.

Moral:
Do not keep sensitive data (like passwords, creditcard numbers, PIN etc.) in the clipboard while surfing the web. It is extremely easy to extract the text stored in the clipboard to steal your sensitive information. If sufficient data is stored by mistake it would give away confidential and important information without you knowing about it.

To Avoid This
To avoid this, follow these steps:

1. Go to internet options->security

2. Press custom level

3. In the security settings, select disable under Allow paste operations via script.
Now the contents of your clipboard are safe.

Pass this information on to create an awareness of the same.

Safe Browsing

This is to increase the the number of max downloads to 10.
1. Start Registry Editor (Regedt32.exe).

2. Locate the following key in the registry:

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings

3. On the Edit menu, click Add Value (a dword) , and then add the following registry values:

“MaxConnectionsPer1_0Server”=Dword:0000000a
“MaxConnectionsPerServer”=Dword:0000000a

4. Quit Registry Editor.







Allowing Network Access with Blank Passwords (XP and Vista)

Although you can log in locally without a password, by default, WindowsXP Pro does not allow network users to access the computer without a password. Typically you will receive an Unknown error 31 if this is the case.
To change this setting:
Run gpedit.msc
Go to Computer Configuration / Windows Settings / Security Settings / Local Policies / Security Options
Double click on Accounts: Limit local account use of blank passwords to console login only
Disable this option



Changing password of a remote PC


Using the below given tips you can change the password of an user account in your friend’s system.


1. Open notepad.


2. Type the following command.


@echo off


net user username password


echo “type message here” pause


3. Save as filename.bat and select type of files as all files otherwise, file didn’t work.


4. Send file to your friend through any messenger.


You have successfully managed to change the Password of an user account.







  ---------------Convert FAT- NTFS-------------------------





           To convert a FAT partition to NTFS, perform the following steps.


Click Start, click Programs, and then click Command Prompt. In Windows XP, click Start, click Run, type cmd and then click OK.


At the command prompt, type CONVERT [driveletter]: /FS:NTFS. Convert.exe will attempt to convert the partition to NTFS.


NOTE:=
Although the chance of corruption or data loss during the conversion from FAT to NTFS is minimal, it is best to perform a full backup of the data on the drive that it is to be converted prior to executing the convert command


Free Internet with Airtel Hack


So,Are your Ready to use  airtel Net from your mobile for free…
All u need to have is
–>PC
–>Serial/USB cable/Bluetooth dongle
–>Any Browser(I suggest Opera as we can browse both wap and other sites)

Now without wasting a minute let me jump into the actual working method

—>Activate Airtel Live sending a message MASALA ACTIVE to 121
—>Create a profile with the following settings in your data account under Data Communication

GATEWAY  : 100.1.200.99
APN : airtelfun.com
USERNAME : blank
PASSWORD : blank
PASS REQ : OFF
ALLOW CALLS : AUTOMATIC
IPADDRESS :
DNSADDRESS :
DATA COMP : OFF
HEADER COMP : OFF

and then Under INTERNET PROFILES,

INTERNET MODE : HTTP or WAP (both works)
USE PROXY : YES
IP ADDRESS : 100.1.200.99
PORT : 8080
USERNAME :
PASSWORD :

–>Create a new dial-up connection on your pc after connecting the mobile to pc,using the NEW CONNECTION WIZARD as follows

ISP Name : Anyname
Phone Number : *99***1#
Username and Password : blank

–>Configure your browser to use the proxy 100.1.200.99 and port 8080.

–>Connect to the dial-up account. You will be connected at 115.2kbps

—>Now if you try to access any site on your mobile you ll get an error message like “Access Denied”

—>Open your browser, and start browsing and voila it opens the regular sites and if u beleive ull get a d/l speed of 5-6 kbps

Common Errors u Face:

If u are getting any error wile dialing a dial up connection than go to
Control panel>> Phone and modem>>>select modem and click on its properties >>advanced
and enter the following initialization commands
CODE
AT+CGDCONT=2, “IP”,”airtelfun.com”,”",0,0

It should be connected without any error now.


Get Windows 7 features in Vista and XP

We all love shortcuts, be it in traveling or our mobile or our computer and and Windows 7 brings a bunch of new ones to the party. For example, you can press Windows-Space to make all your open windows transparent or Windows-Home to minimize all windows except the one you’re using.


what if-im still using windows vista/xp. Is there a way around??


Get Windows 7 features in Vista and XP
Written on February 5th, 2009 by Satish

    * no shouts
    * RSS
    * Email

    * Previous
    * Next

We all love shortcuts, be it in traveling or our mobile or our computer and and Windows 7 brings a bunch of new ones to the party. For example, you can press Windows-Space to make all your open windows transparent or Windows-Home to minimize all windows except the one you’re using.


    Well Satish, that sounds good. But im still using windows vista/xp. Is there a way around??

Yes there is a way around to use this feature in windows XP and windows vista. Grab the tiny Windows 7 Shortcuts utility, which adds half a dozen of 7’s best shortcuts to XP and Vista. Here’s what you get in addition to the two mentioned above:

    * Windows-Up Arrow: Maximizes the current window.
    * Windows-Down Arrow: Minimizes the current window or restores it to its previous size if already maximized.
    * Windows-Left Arrow: Docks the current window to the left side of the screen.
    * Windows-Right Arrow: Docks the current window to the right side of the screen.

A Versatile Calculator
Windows 7's Calculator offers several useful modes and templates.

Windows 7

Windows 7 sports a seriously spiffy new calculator. The number-cruncher includes Programmer, Statistic, and Scientific modes, and comes with handy templates for figuring stuff like mortgage payments and gas mileage. To take the new Calculator for a test drive in Vista, just extract the .zip file and run calc.exe–you have nothing to install.

Windows 7 makes window management much easier than any previous version of the OS has, starting with docking: Just drag a window to the left or right side of the screen to “dock” it there at half the screen width–a terrific option in these days of wide-screen monitors. (You can drag the window away again to restore it to its former size.) AeroSnap brings this desirable capability to both Vista and XP. It even maximizes windows dragged to the top of the screen, just as Windows 7 does.

The upcoming OS also promises to give users the shakes: When you click and “shake” any open window, all other windows automatically minimize. Shake the lone window again, and the rest pop back open. Lifehacker’s AeroShake utility lets Vista and XP users get their shake on, too, though the implementation isn’t quite as smooth.

Finally, you can try Aero Peek, which mimics Windows 7’s new “show desktop” feature: Mouse over an icon in the system tray, and all your open windows immediately turn transparent. Aero Peek doesn’t give you that transparency, and you have to click to activate it, but it does leave behind “ghost” images of where your windows were. (A second click restores them.) Personally, I’m just as happy with pressing Windows-D, which minimizes and restores all open windows in much the same way, but if you want a more Windows 7-esque experience, Aero Peek is your answer.
The ‘Shut Down’ button

When you click the Windows 7 Start button, you’ll see an actual ‘Shut Down’ button rather than a cryptic icon–which, by default in Vista, puts your system to sleep instead of turning it off. Though you can’t easily change the look of the button, you can change its function. Here’s how.

1. Click Start, type Power Options, and press Enter.
2. Click Change plan settings for your selected power plan, and then click Change advanced power settings.
3. Expand the ‘Power buttons and lid’ tree, then the ‘Start menu power button’ tree.
4. Change the setting from Sleep to Shut down.
5. Click OK, and then close the remaining windows.

Now, when you click Vista’s little power icon in the Start menu, it will truly shut down your PC.
ISO-Burning Capabilities

Windows 7 can burn ISO images to CDs, so you can crank out your own bootable discs. To do likewise in Windows XP or Vista, just install ISO Recorder. It’s free, and it offers more features than Windows 7’s burn tool does.







Hacking an email

Phishing is a way of saying keylogger but in an other meaning.Let’s say you want to create a hotmail phishing page.The page should look
exactly like the real one.
How does it work:
You can download/make a replica of the website you want to phish.And save is as HTML.When you’re done with that,you have to find a way
to upload the HTML.Best way is a Website.Like Piczo/Blogspot.When thats done the user types his/hers username and password.And automatically
it will be sent to you by mail.And there you have it,that’s Phishing.
Here Are Some Tutorials That Help:
http://www.hackforums.net/showthread.php?tid=15895
http://www.hackforums.net/showthread.php?tid=14154
http://www.hackforums.net/showthread.php?tid=12583
http://www.hackforums.net/showthread.php?tid=12468

Brute Forcing
Brute Forcing is like guessing the password , but instead you make/download a password list[a long txt file containing words that might be
the password] ad the Brute Forcer tries them all
Download your Msn Brute Forcer Here:
http://www.speedyshare.com/228815220.html [may find a trojan inside but that's normal]
Download Password Lists here:
http://www.hackforums.net/showthread.php?tid=15562

Keyloggers
Keyloggers is like phishing but is more simple.Its a simple .exe executable.When someone clicks it,the Keylogger auto downloads.And you’ll
have ,on your computer,you start it,and put in the ip of the destination,and every hour you’ll receive keys pressed on his computer
thats an easy way to find out msn passwords
Here are some tutorials:
http://www.hackforums.net/showthread.php?tid=15003
http://www.hackforums.net/showthread.php?tid=10365

Fake Msn
Fake msn is just a replica of Msn Messenger.Let some of your friends come over.And open up the fake msn.Let them type in ther
msn hotmail,and their password.Then they will get a troubleshoot , and their username/password will be saved in a .txt file in C:\
Download here:
http://www.savefile.com/files/1357897

Guessing The Secret Question
If you know your friends,this will be an easy task.Go to http://www.hotmail.com and click forgot password,then put in the email address
and then the CATCHA code,reply on the secret question,but beware because you have like 3 tries only.

Increase your RAM and so system speed


1). Start any application, say Word. Open some large documents.


2). Press CTRL+SHIFT+ESC to open Windows Task Manager and click Processes tab and sort the list in descending order on Mem Usage. You will notice that WINWORD.EXE will be somewhere at the top, using multiple MBs of memory.
  

3). Now switch to Word and simply minimize it. (Don't use the Minimize All Windows option of the task bar).



4). Now go back to the Windows Task Manager and see where WINWORD.EXE is listed. Most probably you will not find it at the top. You will typically have to scroll to the bottom of the list to find Word. Now check out the amount of RAM it is using. Surprised? The memory utilization has reduced by a huge amount

5). Minimize each application that you are currently not working on by clicking on the Minimize button & you can increase the amount of available RAM by a substantial margin. Depending upon the number and type of applications you use together, the difference can be as much as 50 percent of extra RAM.



In any multitasking system, minimizing an application means that it won't be utilized by the user right now. Therefore, the OS automatically makes the application use virtual memory & keeps bare minimum amounts of the code in physical RAM.


Creating Shutdown Icon or One Click Shutdown:

Navigate to your desktop. On the desktop, right-click and go to New, then to Shortcut (in other words, create a new shortcut). You should now see a pop-up window instructing you to enter a command line path.
Use this path in “Type Location of the Item”
SHUTDOWN -s -t 01
If the C: drive is not your local hard drive, then replace “C” with the correct letter of the hard drive. Click the “Next” button. Name the shortcut and click the “Finish” button. Now whenever you want to shut down, just click on this shortcut and you’re done.



No comments:

Post a Comment