Showing posts with label Tips. Show all posts

Setting Backdoor in Windows | Command Prompt On Logon Screen




 Lets assume that you have just cracked victim's windows password. or simply got access to his windows for some time.Can you make some changes in windows so that you could access the windows again even if victim changes the password ?? or Can you make any changes in your own windows so that you could access it anytime even if anybody sets/changes password ?





Simply Can we set a backdoor in windows ?
Yes we can .

Backdoor actually means maintaining access.

Okay lets do one thing first. Open your command prompt (run as administrator in win 7/vista).

Type the following command :

Syntax : net user account.name *
Example: net user administrator *
and hit enter. Set any password for that account.

Hopefully your new password must have been set. did you notice one thing ? It didn't ask you to confirm old password. Now suppose if anyhow we manage to access command prompt at logon screen (without logging in), we can easily change/clear password.

Okay lets move on.

Now press shift key five times and you must have got a dialog box "sticky keys" on screen.

Sticky keys is a feature that makes it easy for users who have physical disabilities to press multiple keys at time. This is the only feature which can be used before logging in at logon screen ( as per my knowledge). I repeat this feature can be used at logon screen by pressing shift key five times.

Whenever we start an application like paint, we are actually running mspaint.exe placed in C:\windows\system32. or command prompt, we are running cmd.exe placed in system32 directory, similary

When we press shift key 5 times or use sticky keys feature, system actually starts the executable file sethc.exe placed in system32 directory.

This means if we rename cmd.exe to sethc.exe and press shift 5 times, system would again start sethc.exe but instead of sticky keys the command prompt will be opened.

Article Written By Nishanth

Feel Free To Leave A Comment If Our Article has Helped You, Support Us By Making A Small Contribution, Thank You!

Read more

Trick To Increase Alexa Sites Linking In

Trick To Increase Alexa Site Linking
Trick To Increase Alexa Sites Linking 

What is Alexa ?

Alexa is an online tool, which tells the rank of a given particular website. 

For More Info goto here.


What is Alexa Sites Linking ?

Alexa Sites Linking is like Backlinks, in other words Link Exchange.

Lets come to our main topic, in this tutorial i'll tell you a trick on how to increase Alexa Sites Linking.


  • This mainly works on Blogger and Wordpress. To do this, goto website where you wants to make backlink. In this tutorial, i'll create backlink in devilscafe.in [Platform: Blogger].
  • Then open any post in that site, and then make a comment on that post as Name/URL.

Trick To Increase Alexa Sites Linking

  • Now you just have to write a Name in Name box and Site URL in URL box.

Trick To Increase Alexa Sites Linking


  • And then click on continue button, and make a comment.
  • Now you have successfully done.

After a few days, your Sites Linking In will be increased in Alexa's site. 


Feel Free To Leave A Comment If Our Article has Helped You, Support Us By Making A Small Contribution, Thank You!
Read more

How To Fix Blogger 404 Error | DNS Redirect

How To Fix Blogger 404 Error | DNS Redirect
How To Fix Blogger 404 Error | DNS Redirect

Hello Readers !! Today I'm gonna tell you how to fix blogger 404 error. The problems occurs when you can't able to redirect your domain from xyz.com to www.xyz.com. More than thousand of blog facing this problem with custom domain.



Procedure

  • Process is very is simple, you have to just make an account on Google Apps. You can create it from here :- www.google.com/a/signup/ 
  • After Sign Up, you will be redirected to Google Apps Dashboard.


How To Fix Blogger 404 Error | DNS Redirect
  • Now you have to go under Domain Setting section.


How To Fix Blogger 404 Error | DNS Redirect

  • Then click on Domain names tab, after that click on change redirect.


How To Fix Blogger 404 Error | DNS Redirect

  • You are almost done, after a click on change redirect, follow the Google's instruction. 



Feel Free To Leave A Comment If Our Article has Helped You, Support Us By Making A Small Contribution, Thank You!
Read more

Make File Undetectable


So, I wanted to Backdoor to One Of My Friends PC, Netcat Is a great tool, which helps in accomplishing the task.

But unfortunately, he has got Malwarebytes Installed in his PC, When I tried, smart Malwarebytes gave an alert, saying "Hacking.Backdoor"

Then he smiled and said, He keeps Malwarebytes updated to escape from Backdoor Trojans Attack. And I was silent.

Now here is what I did...

I downloaded Malwarebytes, updated it, and scanned the "nc.exe" with it. And as obvious, it gave the alert.



Now I opened by the "nc.exe" with Hex-Editor, but why?

Generally, Antivirus and AntiMalwares checks for digital signatures, in declared Virus files and claims it as Virus. And signatures are certain blocks of code, or may be the exact copy of the virus code.

Now with that in mind, If i can somehow find the signature in "nc.exe" used by Malwarebytes to claim it as Hacktool. My work is done.

So I opened it up, though this wont apply for all Antivirus, But anyhow you get the general Idea, because my target was to prove him,

" If Someone is THE CHOSEN ONE, He is not safe even with latest updated Antivirus "

On general, this is a trail and error basis, which needs patience. You need to find the last offset from the hexdump, and divide it by 2.

Logically, thinking, you are making two parts of the code, now that I have the hexvalue of the point that divides the "nc.exe", I selected the whole part from the middle to the bottom, right click and fill with 0, save it, It will ask to save a backup, CLICK ON YES.

Now scan the nc.exe, and woops, its no more a hacktool, yeah. But here is the problem, we have now only half part of the code, which wont run. So now we know that the signature is somewhere between the mid-point hex-value to last-offset.

Keep a note of the hex-values that you are editing. Now delete the "nc.exe", in the same folder, there will be the backup of the original named, "nc.BAK" rename it to nc.exe, once again, keep selecting blocks until you find, the alert with AV Scan.

Once you get an alert, this means the last selection was the signature used by the Virus Scanner to detect it as Virus.

I usually go in this way,

1. 1/2 >> replace the second half with 0's >> Scan, If not detected, signature is here, need to find, else the signature is on the first half.

2. 1/4 >> replace with 0's the 4th half >> scan, if not detected, it here, else on the 3rd half, and I keep going.

Notice, with this method, sometimes you will find that you exhausted all the hex-num, and last hex-num you replace with 0, makes it Undetectable, it means, a minor change in the File, will make it Undetectable, which happened in the case of Malwarebytes.

You should not change any value, if you are not knowing what you are changing. Probably then we need to take help of another tool, 'Ollydbg'

Which I wont discuss in this post.

Anyways, most exe files will have a useless line, that has nothing to do with the Virus or Trojan Coding.

"!This program cannot be run in DOS mode"

I replaced the Hex-Value of  H with '00' and saved it, and scanned it again, and Voila, Malwarebytes says, No Malicious Software Found.





So this is how Virus can be Escaped and make UD from Antivirus

And Successfully Backdoored to my Friends PC, leaving a doc there, "I was there in his PC"



Hope This was Informative.

Feel Free To Leave A Comment

If Our Article has Helped You, Support Us By Making A Small Contribution, Thank You!


Read more

ILOVEYOU VIRUS

ILOVEYOU, sometimes referred to as Love Letter, was a computer worm that attacked tens of millions of Windows personal computers on and after 5 May 2000 local time in the Philippines when it started spreading as an email message with the subject line "ILOVEYOU" and the attachment "LOVE-LETTER-FOR-YOU.txt.". The first file extension 'VBS' was most often hidden by default on Windows computers of the time, leading unwitting users to think it was a normal text file. Opening the attachment activated the Visual Basic script. The worm did damage on the local machine, overwriting image files, and sent a copy of itself to the first 50 addresses in the Windows Address Book used by Microsoft Outlook.

If you receive email with a subject line with the phrase ILOVEYOU (all one word, no spaces) in it… DON'T OPEN the attachment named Love-Letter-For-You.txt.vbs.

Click here for the Source Code


Over a five-hour period, during May 4, 2000, this virus spread across Asia, Europe and the United States via e-mail messages titled "ILOVEYOU." The menace clogged Web servers, overwrote personal files and caused corporate IT managers to shut down e-mail systems.

A scan of the Visual Basic code included in the attachment reveals that the virus may be corrupting MP3 and JPEG files on users' hard drives, as well as mIRC, a version of Internet Relay Chat. It also appears to reset the default start page for Internet Explorer.

This virus arrives as e-mail with the subject line "I Love You" and an attachment named "Love-Letter-For-You.txt.vbs." Opening the attachment infects your computer. The infection first scans your PC's memory for passwords, which are sent back to the virus's creator (a Web site in the Philippines which has since been shut down). The infection then replicates itself to everyone in your Outlook address book. Finally, the infection corrupts files ending with .vbs, .vbe, .js, .css, .wsh, .sct, .hta, .jpg, .jpeg, .mp2, .mp3 by overwriting them with a copy of itself.

You can get this bug in only one way. If you receive an email with an attachment with the name Love-Letter-For-You.txt.vbs and you execute it, by double clicking on the attachment, you will get infected. Don't execute it, just delete it and you will be fine.

Click here for the source code

NOTE: Do Not Save the File with .vbs Extension, and click on it, otherwise it will create a havoc.

This is for Educational Purpose, I am Not Responsible For Any Consequences.


ILOVEYOU, sometimes referred to as Love Letter, was a computer worm that attacked tens of millions of Windows personal computers on and after 5 May 2000 local time in the Philippines when it started spreading as an email message with the subject line "ILOVEYOU" and the attachment "LOVE-LETTER-FOR-YOU.txt.". The first file extension 'VBS' was most often hidden by default on Windows computers of the time, leading unwitting users to think it was a normal text file. Opening the attachment activated the Visual Basic script. The worm did damage on the local machine, overwriting image files, and sent a copy of itself to the first 50 addresses in the Windows Address Book used by Microsoft Outlook.

If you receive email with a subject line with the phrase ILOVEYOU (all one word, no spaces) in it… DON'T OPEN the attachment named Love-Letter-For-You.txt.vbs.

Over a five-hour period, during May 4, 2000, this virus spread across Asia, Europe and the United States via e-mail messages titled "ILOVEYOU." The menace clogged Web servers, overwrote personal files and caused corporate IT managers to shut down e-mail systems.

A scan of the Visual Basic code included in the attachment reveals that the virus may be corrupting MP3 and JPEG files on users' hard drives, as well as mIRC, a version of Internet Relay Chat. It also appears to reset the default start page for Internet Explorer.

This virus arrives as e-mail with the subject line "I Love You" and an attachment named "Love-Letter-For-You.txt.vbs." Opening the attachment infects your computer. The infection first scans your PC's memory for passwords, which are sent back to the virus's creator (a Web site in the Philippines which has since been shut down). The infection then replicates itself to everyone in your Outlook address book. Finally, the infection corrupts files ending with .vbs, .vbe, .js, .css, .wsh, .sct, .hta, .jpg, .jpeg, .mp2, .mp3 by overwriting them with a copy of itself.

You can get this bug in only one way. If you receive an email with an attachment with the name Love-Letter-For-You.txt.vbs and you execute it, by double clicking on the attachment, you will get infected. Don't execute it, just delete it and you will be fine.

Feel Free To Leave A Comment

If Our Article has Helped You, Support Us By Making A Small Contribution, Thank You!

Read more

A Guide to Facebook Security

Facebook Security Guide


Facebook has (finally) released a simple to understand user security guide (pdf) to help members avoid some of the many pitfalls of using the social networking giant.

The guide was written by Symantec's former Senior Director of Internet Safety Linda McCarthy and Purdue University instructor Keith Watson, and was edited by Denise Weldon-Siviy.

The guide instructs account holders on how to:
  • Protect your Facebook account
  • Avoid the scammers
  • Use advanced security settings
  • Recover a hacked Facebook account
  • Stop imposters

The guide offers some fairly good advice and illustrative graphics on how to spot common scams and other mischief that has plagued the social network for some time.
It is written in simple enough terms that you, your kids, and your grandparents can all increase your Facebook security outlook a great deal in a matter of only a few minutes.

Click Here To Download The PDF

Dont Forget To Hit LIKE and Share For The Post, If the Information Was Not Known To You Before.

Feel Free To Leave A Comment

If Our Article has Helped You, Support Us By Making A Small Contribution, Thank You!

Read more

A Guide To Anonymity

Definition Of Anonymous:
The art of hiding identity online by using connection methods and encryption methods, is known as being Anonymous.  



What is the use of it??

To make yourself untraceable to a person, website, company, school or whatever else you are doing/connecting to.Stay hidden when attacking a website or scanning it for vulnerabilities.
Keep your browsing history/activity hidden when at work, school, library or even your family computer.
Keep your IP ( Internet Protocol Address ) hidden from victims of a RAT (Remote Administration Tool) or a botnet.
Bypassing ISPs service usage limits.


Methods:

What is a VPN ?
A VPN is an acronym for Virtual Private Network, it is a server that is used to connect to a LAN ( Local Area Network ) securely. VPNs will encrypt your connection information and hide your real IP from websites, people and it will keep your connection encrypted so you won't be able to get traced.

List of Free Good VPNs:
Cyberghost VPN:You must create an account.
Download Link

Pro XPN: Create an account.
Download Link

Open VPN
Downloads.
Open VPN requires configuration files. You add them to C:\Program Files\OpenVPN\config

HSS is OpenVPN based, you download the client and it will hide your IP.Hot Spot Shield

Paid VPNs:

Why are paid VPNs better than free ?
They are more secure and keep no logs. When free ones will keep logs and aren't as securely encrypted as a paid.

BlackShades VPN
Pretty much the best product line on HackForums, you can never go wrong with a BlackShades product.

nVPN ( OpenVPN based )
Amazing speeds and panel controls and really simple set up.

iPredator
Not known around HackersForum as much, but it's good.

What is SOCKS 4/5 ?
SOCKS is the internet protocol that makes it easier for packets to be routed between the client/server via a proxy server. The SOCKS protocol has a designated port, but is not limited to that port. This port number is 1080.

Socks will let you get by the network firewall, usually with schools or workplaces, they will have a block on the browsing you are allowed to do.

What is HTTP Proxy ?
A HTTP ( Hypertext Transfer Protocol ) proxy is kind of the same thing as a SOCKS 5, except the fact it using the HTTP protocol instead of the SOCKS protocol. When a browser is configured with a HTTP proxy, it just hooks through the proxy server and bypasses any firewall put in place on the LAN ( Local Area Network )

Web proxies and Proxy client/managers Proxies:


Link to Proxy Filter ( By Omniscient )

Link to Hide my ass

Link to Proxify

Link to FoxyProxy ( Firefox addon )


Proxy Manager
Tor
Download the client.
READ THE PAGE. Tor isn't as safe as people think it is.

What is SSH and SSH Tunneling ?
SSH is the acronym for Secure Shell, it is an network protocol used to connect to Linux&Unix based machines. This will let you access the shell (Terminal) via a remote connection to the machine/server. The default port for SSH connection is 22.

SSH tunneling is using the SSH protocol to hook through the machine/server as you send a command through your internet, say loading Google, your machine will send the data through the "SSH Tunnel" and your IP will be hidden from the website. As your data is going through the "tunnel" it is encrypted using a Public-Key encryption.


What is MAC Address and MAC Address Spoofing ?

MAC address is the acronym for Media Access Control address it's the unique identifier for a network interface. The Hardware Address of your Machine

MAC address spoofing is using a program (You can do it manually but program is much easier.) to change your MAC address so it doesn't leave behind your networks "fingerprint." Without doing this, you will never be FULLY anonymous.


MAC Address Spoofers:

SMAC
Download link.

NMAP
Download Link
–spoof-mac is the command you use to spoof your MAC with NMAP.

NOTE: Still You Are Not 100% Anonymous, But You Are Around 90% Anonymous, To Add More To Your Anonymity Use A Dedicated System, And Always Delete Cookies, History, Saved Passwords, Temp Folders, Recycle Bin, Prefetch Folder. And Disconnect the PC from Internet After Work is Done. You Are Now Around 99% Anonymous!

Thank You!

Dont Forget To Hit LIKE on the Left Hand Side for this Post And Share, If You Plan To use The Steps, For The Coming Tutorials.


Follow My Blog(By Clicking on Join This Site) To Get Updates.


Feel Free To Leave A Comment

If Our Article has Helped You, Support Us By Making A Small Contribution, Thank You!

Read more

The Art Of HacKing Human Mind

Social Engineering

The first book to reveal and dissect the technical aspect of many social engineering maneuvers

From elicitation, pretexting, influence and manipulation, all aspects of social engineering are picked apart, discussed and explained by using real world examples, personal experience and the science behind them to unraveled the mystery in social engineering.

Kevin Mitnick, one of the most famous social engineers in the world, popularized the term "social engineering". He explained that it is much easier to trick someone into revealing a password for a system than to exert the effort of hacking into the system. Mitnick claims that this social engineering tactic was the single-most effective method in his arsenal. This indispensable book examines a variety of maneuvers that are aimed at deceiving unsuspecting victims, while it also addresses ways to prevent social engineering threats.
Examines social engineering, the science of influencing a target to perform a desired task or divulge information.
Arms you with invaluable information about the many methods of trickery that hackers use in order to gather information with the intent of executing identity theft, fraud, or gaining computer system access.
Reveals vital steps for preventing social engineering threats.

Click Here To Download The Book

Dont Forget To Hit LIKE on the Left Hand Side and Follow My Blog To Get The Updates.

Feel Free To Leave A Comment

If Our Article has Helped You, Support Us By Making A Small Contribution, Thank You!

Read more

How To Make a Phishing Page

In this Article I will share how to make any Phishing Page. Phishing is a fraudulent attempt, usually made through email, to steal your personal information. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public. Phishing is typically carried out by e-mail spoofing or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.

Let us try to make a phishing page for Facebook

Since we are creating for Facebook, we need to go to Facebook Login Page(In case you try for other sites like orkut, myspace, gmail, etc etc. you need to go to respective page)

Step1:
So lets go to facebook login page by clicking here: http://www.facebook.com/login.php

Step2:
Right Click anywhere on the Page, and click on View Source; a windows would pop-up, click on File>>Save as>>phisher.html(Save the file to Desktop)

Step3 :
Open the html file with notepad.


Step4 :
Hit Ctrl+F and then search for form method="POST" and replace it with form method="GET"

Step5 :
And next is replacing action="https://login.facebook.com/login.php?login_attempt=1" with action="test.php"

Step6 :
Now we need to make a php file, open a notepad and type following as it is.

NOW save this as test.php

Now Create an Account With: http://www.my3gb.com/

Then Go to My Files and Upload The “phisher.html” and “test.php” Check the Link For your “phisher.html

Copy the link in a notepad.

Facebook will not allow you to post links from my3gb.com sites, now we need to hide the URL so that we can post it in Facebook.

Now go to,  Click Here to Register(www.dot.tk)

Enter any attractive name, so that the Link name can fool people, ex: 3Dfacebookapp.tk, click on GO, next page enter the Link for your phishing page, Registration Length period as You wish and click on continue without signup.

And once you are done, the link for your Phishing page is “3Dfacebookapp.tk “

Now You can post This Link to Facebook to Trap Your Friends.

Anyone Clicking on Your Link Would get Facebook Login Page, now when he enters the Facebook ID and Password, It will redirect him to Facebook Page, but will leave a copy of the Facebook Id and Password on you’re my 3gb.com account, under hacked.txt file, you can open up your account, and check the hacked.txt file to get the victims email address and password.

So, This Should Give You an Idea how to create a Phishing Page!

NOTE: This is just for Educational Purpose, For Any Damage or Misuse, I Shall Not Be Held Responsible for any consequences.

Hit LIKE on the Left Hand Side if  This helped you to Learn.

If You Have Any Problem Creating Facebook Phishing Page, you can click here to Download it:

Click Here To Download Phisher HTML


Click Here To Download test.php File

Leave a Comment For Any Doubts.....
Feel Free To Leave A Comment

If Our Article has Helped You, Support Us By Making A Small Contribution, Thank You!


Read more

Block Survey Sites



Many a times some hoax sites forces us to take Annoying Surveys. And if we take those surveys our inbox are spammed by useless mails. So here is a Trick which shows how to avoid them.

Method 1:

Disable Javascript in browser, this might cause a few inconvenience, but it’s a good option if you don’t have administrative rights to edit windows hosts file.

Method 2:

Open notepad(choose to run as administrator), edit this file:
notepad %windir%\system32\drivers\etc\hosts
Hosts is a file without extension, add the following lines:
127.0.0.1 cpalead.com
127.0.0.1 tracking1o1.com

and that’s it.

If you don’t want to visit some other survey ads, you can block other survey ad sites, by adding the following:

127.0.0.1 adultaccessnow.com
127.0.0.1 adscendmedia.com
127.0.0.1 oocee.com
127.0.0.1 perfecttracking.com
127.0.0.1 cpalock.com
127.0.0.1 dollarade.com
127.0.0.1 blackhatcodebreaker.com
127.0.0.1 instantdollarz.com
127.0.0.1 leadbolt.net
127.0.0.1 pointclicktrack.com

Save the File and You Are Done!!

Hit LIKE for This Post and Share it, If this Helps!

Thank You!

Many a times contents of some sites are being blocked by Annoying Surveys. And if we take those surveys our inbox are spammed by useless mails. So here is a Trick which shows how to bypass annoying surveys.

Method 1. Disable Javascript in browser, this might cause a few inconveniences, but it’s a good option if you don’t have administrative rights to edit windows hosts file.Many a times contents of some sites are being blocked by Annoying Surveys. And if we take those surveys our inbox are spammed by useless mails. So here is a Trick which shows how to bypass annoying surveys.

Method 1. Disable Javascript in browser, this might cause a few inconveniences, but it’s a good option if you don’t have administrative rights to edit windows hosts file.

Feel Free To Leave A Comment

If Our Article has Helped You, Support Us By Making A Small Contribution, Thank You!

Read more

Turn Windows PC to iPad

If You LIKE This Post, Please Hit The Floating LIKE Button on the Left Hand Side, Share it with your Friends in Twitter and Facebook!

Time to Turn your Windows PC into iPad. You can experience, feel how the iPad interface will look, test the interface from your Windows on the desktop of our PC.

iPad is one of the best Tablet delivered by Apple which runs on the iOS. We all are inspired to use the iPad because of its features and Software. iPadian brings you the environment of the iPad to your desktop (iPad Simulator for windows).

iPadian is a simple emulator that runs as an executable. Its Useful for an Apple Fan boy who can’t buy an iPad.

The iPadian includes a large collection of applications already preinstalled, among which are some of the most popular and used in iOS devices.

The only drawback of iPadian is that, it doesn’t support app store and you cannot install any new applications on it.

Features of iPadian simulator for Windows :

* Standalone Adobe air application
* Full Screen preview
* Custom App Store
* Games
* Free music & videos
* Webkit browser
* Support Facebook notification & messages
* Social Chat

Click Here To Download

Thanks To My Friend Rose, Who Helped Me With This.

If You Have LIKE This Post, Please Hit The Floating LIKE Button on the Left Hand Side, Share it with your Friends in Twitter and Facebook!

Turn your Windows PC into iPad. You can experience, feel how the iPad interface will look, test the interface from your Windows on the desktop of our PC.

iPad is one of the best Tablet delivered by Apple which runs on the iOS. We all are inspired to use the iPad because of its features and Software. iPadian brings you the environment of the iPad to your desktop (iPad Simulator for windows).

iPadian is a simple emulator that runs as an executable. Its Useful for an Apple Fan boy who can’t buy an iPad.

The iPadian includes a large collection of applications already preinstalled, among which are some of the most popular and used in iOS devices.

The only drawback of iPadian is that, it doesn’t support app store and you cannot install any new applications on it.

Features of iPadian simulator for Windows :

Standalone Adobe air application
Full Screen preview
Custom App Store
Games
Free music & videos
Webkit browser
Support Facebook notification & messages
Social Chat

Feel Free To Leave A Comment

If Our Article has Helped You, Support Us By Making A Small Contribution, Thank You!




Read more

Facebook Chat Symbols

If You Like This Post Please Hit the Floating Like Button on the Left Hand Side.


All Facebook Chat Lovers....


Want to add some spice to your new Facebook chat conversations?




Here are the obvious (and maybe not so obvious) smilies/emoticons/emotes that you can use in your Facebook chats!

Okay you must be thinking, common who does not know to make emoticons on chat, to answer this, Friends these are not the regular emoticons, its unique!




Click Here To Download the Chat Codes.

If You Like This Post Please Hit the Floating Like Button and the +1 Button on the Left Hand Side

Enjoy Chatting!

Feel Free To Leave A Comment

If Our Article has Helped You, Support Us By Making A Small Contribution, Thank You!

Read more

Block Websites without Software

Many times we need to unblock certain websites to gain access to some important stuffs. We all know many ways to do that. But how about actually learning to block one without any software?
 
Here is a Trick to Block Websites without any Software...

1.) Open “Run” from the start menu (or press WinKey + r). Just copy paste the following path and hit ENTER.

notepad %windir%\system32\drivers\etc\hosts

Alternately, go to C:\Windows\System32\Drivers\Etc and find the file “hosts”. Open that file in Notepad.

2.) When this hosts file is opened in Notepad, at the end of the file you will see something like “127.0.0.1 localhost”.

3.) Under “127.0.0.1 localhost” just add another website URL that you want to block.

For Example:-

127.0.0.1 localhost

127.0.0.2 www.facebook.com

127.0.0.3 www.gmail.com

4.) Make sure every time you add another website, the last digit of the address 127.0.0.x should not be the same.

5.) Save the file and exit.

So, here you go. Restart your browser if it is opened and changes will take place immediately.

The good thing is that no message, no pop ups nothing will be displayed when someone tries to open a blocked website. Your browser will just fail to open those websites without any error messages.

If you like this post, please hit the Floating Like Button on the Left Hand Side, Share it with your friends on Facebook and Twitter!

Thank You!

Feel Free To Leave A Comment

If Our Article has Helped You, Support Us By Making A Small Contribution, Thank You!

Read more

Beware to Upload Self Photos

People are very much crazy now-a-days, to upload self photos on Internet, specially on Community Sites like Facebook, Twitter, MySpace, etc. I know it is very good to get comments from friends, but have you ever thought out of the box??


I came across a news post, where a girl had to commit suicide. Do you know why?? Just because she uploaded her Self photo on Facebook.


Yes Friends, you upload photos to get good comments, but imagine getting unwanted comments. Comments made on Facebook or MySpace can be viewed by everyone be it good or bad. Its not like getting comments while walking down the street, where a few people comes to know who commented and what was the comment.


There are some crazy people who tries to make money in a short span of time at the cost of anything. Photos, atleast the Profile Picture can be downloaded by anyone or everyone. Some people who are good at Photo Editing Softwares like Photoshop, can bring you down to your knees. The Face part of the photo can be merged with a Porn Photo, and can be sold on Internet or porn sites without your knowledge. And people doing this crime is very hard to trace because anything to be traced on internet, is done with the help of IP Address, and they will hide their IP Address.


And by the time you come to know about it, everything is already spoiled, so i would really recommend anyone reading this blog to remove their pics(especially girls) from Facebook or MySpace or any other sites where you might have uploaded them. Because you never know who is looking at your profile, or who is downloading your profile photo, and also you never know what's running on their mind and their intention. (Remember, one doesn't have to be in friend list to be able to do this crime)


"A Stitch in time saves nine!", and Ohh by the way, "Prevention is always better than cure!!!"


Thank You!

If Our Article Has Helped You, Consider Supporting Us, By Making A Small Contribution, Thank You








Read more

Want your Old Facebook Style??


Hey Friends..

Most of my friend commented that they dint like the Facebook’s Developers idea of suddenly changing the interface of Facebook.

Well, here I used a trick to get back to the old one…though not completely but the most irritating part of the Facebook, i.e the Live Ticker window is gone now.

Actually, I found there are more than one ways to do that.

First, by installing the latest extension from better facebook.net..

1.      Goto www.betterfacebook.net
2.      Click on the browser that you are using from the list here
3.      It will take a few seconds to install the extension.
4.      Now login to your facebook account.
5.      It will pop out a windows from betterfacebook, choose the recommended settings, and finish the setup.(Note: You can customize your facebook)
6.      Once you are done, click on the options tab at the top from betterfacebook, now click on chat, check off “Turn off the chat sidebar on the far right (if it exists) and go back to popup chat list
7.      Click on save, now you have a chat box as you used to have before, but the Live ticker window, still stays there at the top right panel.
8.      Now just place the cursor on the Live ticker window, click on its head, select hide this window.
9.      Voila!!! Here you have the old chat interface back, without the Live Ticker!

Note: Installing the betterfacebook.net will make the browser slow, but you can customize a lot of things through betterfacebook.

Well, I dint like the idea of making the browser slow. Here I present you with an alternate solution.

Second, just installing an extension will switch back to old chat window style without the Live Ticker

You need to do just two steps,

1.  Disabling the Live-Ticker, Clickhere

2.  Switching back to Old Chat window:
For Firefox, click here
For GoogleChrome, click here
For Opera, click here

Note: After installing the extension, you just have to logout and login to facebook once, and you have your Old Chat box Window back without the Live Ticker. And this doesn’t slows the browser.

Enjoy your Facebook now and Feel Free to Comment J

If Our Article Has Helped You, Consider Supporting Us, By Making A Small Contribution, Thank You










Read more

Are you safe??



Hey Friends….

Did u know that, the passwords that you are saving in Firefox and Chrome, is actually making the life of a Hacker easy To hack your accounts??

This is how, you are in danger…the passwords that you are saving in these browsers are saved in the browser which can be easily accessible. Be careful, while using it in Cybercafe or even at your home computer.

Do u want to see the Passwords??

For Firefox:

Open Firefox, goto Tools, click on Option, it opens up the Option window, here in this windows click on Security, now click on Saved Passwords, it opens up the Saved passwords window, now click on Show Passwords tab. OMG!!! It shows all the passwords.

For Chrome:

Open Chrome, click on Settings, click on Options, click on Personal Stuff, click on Manage Saved Passwords, it opens up the Passwords windows, now click on a Website that you want to see the password for, click on show! OMG!! Even this shows the password.
So, Friends please beware of this, I suggest the Browser Internet Explorer is better than any browser. Use it and save yourself. J

Feel Free to comment.

Wait for my next post until I find something really cool. Thanks!

If Our Article Has Helped You, Consider Supporting Us, By Making A Small Contribution, Thank You










Read more

Desktop Trick..


Fake Blank Desktop Screen
If you like this article, please hit the Floating Like Button on the Left Hand Side, Share it with your friends on Facebook and Twitter!


I was busy with my work, when my little sister wanted to play games; she has a craze for Need For Speed. Her exams knocking door, and I dint like the idea to let her play game at this time…
Asked her to study, rather than playing game..But she was arrogant. And I dint want to indulge in more conversation with her, I know how to stop her.

Here I played a cool trick . . .

Before she could start her game….i did a simple trick, and she was wondering what the hell is going on . . .when she was clicking on the icon for NFS, the computer sat idle, looking back at her, as if nothing happened…Poor Little Sister, tired of clicking on the NFS icon, sat to study.

1.       I closed all the applications running on the computer…
2.       Took a print-screen(simply pressing the PrintScreen on the keyboard) of the screen with all the icons.
3.       Opened the MS-Paint, pasted the print-screen on it(Simply pressing Ctrl+V)
4.       Saved it in My Documents with name Desktop.jpg(You can choose any folder to save this)
5.       Closed the MS-Paint.
6.       Now I right-clicked on the desktop, selected Arrange Icons By, and then unchecked the option, Show Desktop Items.
7.       Now all the Desktop Items were hidden.
8.       Then opened My Documents, where I saved the Desktop.jpg, selected the file, right-clicked on it, and clicked on Set as Desktop Background.
9.       Now my Screen looked as if there are icons on the desktop, but actually these were not icons, that’s just an image file.
10.  So she could see the NFS icon on the screen(which wasn’t really an icon), and clicking on it gave no response.

 This is a Cool trick, which you can play with your friends. Though Simple, but it will make them think for hours, and you can take the pride of enjoying the moments seeing them frustrated.

Good luck.

If you have liked this article, please hit the Floating Like Button on the Left Hand Side, Share it with your friends on Facebook and Twitter!

If Our Article Has Helped You, Consider Supporting Us, By Making A Small Contribution, Thank You










Read more

Windows XP Activation….


Activation – Troubleshooting

Blank Activate Windows in the WPA Wizard..
Service Pack 1 changes to product Activation             
Windows XP prompts you to Re-Activate after you restore your computer.

Activation Explained:

Windows XP will typically remind you to activate the Product (Most users will have 30 days to re-activate the product)
To Activate XP manually, you can use start menu shortcut in the system tools accessories folder.
At the Command Prompt, type: oobe/msoobe /a        
Or
Start>All Program>Accessories>System Tools>Activate Windows..
       TIP: msoobe stands for Microsoft Out of box Experience
          TIP: Windows Product Activation

Activation –Workaround
If you are doing a repair reinstall of the XP on the same Hardware, you can back up the activation status and then restore it after you run the repair install of the OS. To save the activation status, back up the WPA.DBL file from the %windir%\system32\ to a storage device.
After the repair install of the OS is complete, start in Minimal Safe mode.
Open the %windir%\system32 folder. Rename WPA.DBL to WPA.NOACT. Copy the backed up WPA.DBL to the system32 folder. Reboot the system.

(This isn’t a hack to avoid activating installation and will work only on the same hardware for an XP installation that you have already activated.)

If Our Article Has Helped You, Consider Supporting Us, By Making A Small Contribution, Thank You










Read more

HAL.DLL is missing “Cannot find \Windows\System32\HAL.DLL”



 HAL is Microsoft's abbreviation for the Hardware Abstraction Layer, the technology and drivers that let the Windows NT, 2000, and XP operating systems communicate with your PC's hardware. HAL is one of several features--along with the NT file system (NTFS) that replaced the much less secure MS-DOS--that make NT-based operating systems more secure and reliable than Windows 95, 98, and Me.

HAL prevents applications from directly accessing your PC's system memory, CPU, or hardware devices (such as video and sound cards)--a method that can prevent many device conflicts and crashes. Unfortunately, HAL sometimes also slows or stops DOS games and programs, which need to load their own memory managers or control hardware directly for better performance.

Resolution:

Insert the XP disk, and restart the PC, and press any key to boot from CD.
Press R for Repair Option.
If you have a dual-boot or multiple-boot system, choose the installation that you need to access from the Recovery Console.
When prompted, type the Administrator password. (if you didn't create one try pressing enter).
At the system Prompt type:
Copy X:\i386\hal.dl_  c:\windows\sysem32\hal.dll
Substitue X for the drive letter of the cd.

Restart the computer and you should be good to go now.

If Our Article Has Helped You, Consider Supporting Us, By Making A Small Contribution, Thank You









Read more