Flipkart.com

Tuesday 31 January 2012

Lock Folder With Password & Without Any Software



Hello Reader. Hope you all are fine.. In the previous post we explained you how to secure you folder with simple dos command. Today we are going to explain you all how to create a password protected folder and save it as a Control Panel shortcut. Yes, As control panel shortcut, so when some one tries to access the folder, they will land to Control Panel.. :)


Isn't it interesting.... Hmm, So lets begging how to create such a folder. For this you need to have a piece of Code.. :)  Don't worry the code is given below. You just need to copy and past it in a notepad and save as a ".Bat" file. It's always fun when it comes to coding.. :)


You have to put the password in the place where is written "YOUR_PASSWORD_GOES_HERE" just replace it with your own pass.

Saturday 28 January 2012

How a Hardware Keylogger Works


Hi, Hackers-Team Reader. Today I will explain how hardware keyloggers works. If you dont know what is "Keyloggers" please have to look to our previous post on Keylogger-Basics. However there are also hardware keyloggers which perform basically the same function except in the form of an external hardware device as opposed to an internal installation on your PC. The more recent hardware keyloggers are very small and often go undetected since they do not utilize any software or driver installation.

Hardware Keyloggers Defined

Hardware keyloggers work externally to track keystrokes, record conversations, monitor email, and track document creation. The more recent hardware keyloggers are very small

Thursday 26 January 2012

How To Lock Folder Without Any Software

Hi every one..  Sorry for not posting any content for last 2 days. We were out of town, went to "Mysore". Its a beautiful place.

Well today we are going to give demonstration on 'How to lock a folder without any software'. we will be using CMD (command prompt).


The above video gives you a practical demonstration on securing a folder.

Monday 23 January 2012

Types of Softwares

Software, by definition, is the collection of computer programs, procedures and documentation that performs different tasks on a computer system. The term 'software' was first used by John Tukey in 1958. At the very basic level, computer software consists of a machine language that consists of groups of binary values, which specify processor instructions. The processor instructions change the state of computer hardware in a predefined sequence. Briefly, computer software is the language in which a computer speaks. There are different types of computer software. What are their types? Let us see.





Types of Software's


Computer software is a general term used to describe a collection of computer programs, procedures and documentation that perform some task on a computer system. The term includes application software such as word processors which perform productive tasks for users, system software such as operating systems, which interface with hardware to provide the necessary services for application software, and middle-ware which controls and co-ordinates distributed systems.


Sunday 22 January 2012

Blue Screen of Death [Prank]

Hi every one.. most of us must have came across the blue screen error while working on windows machine.

Yes ! We know what will be your response, when it popup on screen crashing and rebooting the the system. Its like ohhhh... what to do now. If such conditions happen on your system the best solution is to re-install the Operating System.

But some time its can also be due to some pranks.. Yep!

We can play such prank to our friends with some simple scripts but without any harm to their system..

You need to just copy the below code on to a notepad and save it with any name but with an extension as "*.bat".

Code:
--------

Saturday 21 January 2012

Automatically Close Non-Responsive Programs

Normally you end tasks the non-responsive programs manually using windows task manager with (CTRL + ALT +DELETE) keys. Sometimes these non-responsive programs creates problem to run windows and others programs properly.


You can configure your computer to manage these non-responsive programs automatically. Windows has a feature that will close all non responding program automatically. If you have little knowledge about editing windows registry then you can configure your computer for this purpose. Follow the given steps to

Thursday 19 January 2012

Use Facebook Without Timeline

We all know about Facebook timeline. This application help the users to organize their page in an systematic order as they are moving towards their future.

Yes! of-course we all thought it would be a pretty good thing after viewing the video advertisement by Facebook. People who have never seen it before for them. Here is an introductory video which walks you through Facebook timelines in brief detail:




Most of us are disappointed with the new Facebook Timeline interface which Facebook rolled-out recently. The worse part is that we can not roll it back or use the Facebook without Timeline.

So we found some simple way to use the old Facebook. Timeline is a client side application

Wednesday 18 January 2012

Windows setup on USB Disk

In a recent blog, “10 Cool Things You Can Do with a USB Flash Drive” I presented 10 tasks that you can perform with a flash drive, including booting an operating system. However, I have since discovered a technique how you can use a USB flash drive to install Windows 7.

This technique is very cool for two reasons: First, a flash drive is much more responsive than an optical drive, since it doesn’t rely on physically moving components, so the installation procedure will be faster. Second, it provides an easy way to install Microsoft Windows 7 on a system that doesn’t have a DVD drive, such as a netbook.

Getting started

Of course, in order to employ this technique you’ll need a USB flash drive that is big enough to hold the contents of the Windows 7 DVD. The Windows 7 DVD is about 2.5GB, and you can expect that the DVD will be at least that if not more. For my test system I am using a 4GB USB flash drive.
Keep in mind that the procedure we will use will completely reformat the USB flash drive. So you want to make sure that you back up any data that you have on the drive before you begin.
The systems on which you want to install Windows 7 via the USB flash drive have to be able to be configured to boot from a USB drive. Most new systems have the capability to boot from a USB flash drive, and the operation can usually be configured in the BIOS or by simply pressing a certain key during bootup. You’ll need to check your specific hardware in order to be sure.

Using the DiskPart utility

As you may know, the DiskPart utility is a command-line version of the Disk Management snap-in and is designed to allow you to manage disks, partitions, or volumes from within scripts or directly from a command prompt. We can use the DiskPart command in Windows Vista or in Windows 7 to configure a USB flash drive to be a bootable device. (Keep in mind that Windows XP’s DiskPart command is unable to create a bootable USB flash drive.)

To begin, connect your USB flash drive to a computer on which you will be preparing the drive. For my example, I’ll be using a Windows 7 system.
Now, locate the command Prompt shortcut on the Start menu, right-click on it, and select the Run as Administrator command. Then, respond appropriately to the UAC. You can now launch the DiskPart utility by typing DiskPart on the command line. You’ll then see the DISKPART prompt, as shown in Figure A.

Figure A


DiskPart has its own command-line environment complete with a special prompt.
Now that you’re in the DiskPart environment, you’ll need to locate the USB flash drive

Tuesday 17 January 2012

10 cool things you can do with a USB

Transporting your data is probably the most common use for a USB flash drive. But there’s a world of other things you can do with these handy pocket-size drives. Here are 10 ways you can use that USB flash drive to do more than just move data.


1: Run portable applications

In addition to storing your data, you can run portable applications from a USB flash drive. For example, OpenOffice, which is a complete office suite that includes a word processor, spreadsheet, presentation tool, drawing package, and database, is available as a portable application. Mozilla Firefox and Thunderbird are also available as portable applications. When you combine the office suite with the ability to surf the Web and check email, you’ll be able to take your most vital computing applications with you wherever you go — right in your pocket.
If that’s not enough, you can choose other applications to install on your USB flash drive from PortableApps.com (Figure A). You can even install an entire prepackaged suite of applications that includes such things as an audio player, games, an antivirus utility, and a handy menu system.

Figure A


The PortableApps.com suite comes with a menu system to allow you to easily access your portable applications.

2: Boot an operating system

If you want to do more than just run your own applications, you might want to consider

Monday 16 January 2012

Unlock Mobile Phone Memory Cards


Some times it happens that you forgot the password of your memory card and you have lots of your important data in your phone. So there are two types of methods for recovering the password of your memory card with the help of nokia phone.



For Nokia phones.



1. First Install FExplorer in your phone memory.


2. Got to drive "C:", you will find a file called mmcstore

3. Send it to your pc directly and open it in notepad the file.

4. At the end of the file you will find your password.

Displaying Text Notice Before Logon


You can create a funny message or legal warnings for others just before logon to your computer. This is very useful if you want to give a message to new user about the use of computer. Edit the value of registry keys to create a banner message.

1. Click Start button then type regedit in Run option then press Enter for next.

2. Here locate the location to:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system

3. Here in right side panel, right click to create a new string value LegalNoticeCaption and give it a value you want to see in the menu bar

4. Now again right click to create a new string value called LegalNoticeText and change the value you want to see in the dialog box

5. Now close the registry editor and restart your computer after any changes to go into effect.

Sunday 15 January 2012

Clearing My Recent Documents History Automatically


The windows My Recent Documents Menu display all the information about last used files and programs as a history. Your co-workers, family members can trace your activities on the computer with clicking on My Recent Documents menu. If you are using internet at any public place like internet cafe then you should clear your documents menu history to safe yourself from cyber crimes.


You can clear the documents menu history manually, but automatically history clean option can be useful if one computer used by multiple people. To clear the document history automatically, edit the computer registry keys.



1. Click Start button then type regedit in Run option then press Enter for next.



2. Here locate the location to:

3. Go to HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders

4. Here in right side panel, double click on Recent and change its value of C:\RECYCLED.

5. Now set your Recycle bin, "Remove files immediately when deleted".

6. Now close the registry editor and restart your computer after any changes to go into effect.

Set Automatic Screen Refresh


When you are working on your local computer and want to refresh any changes in your system automatically. For example some times you are watching sports results, online Stock Exchange rates and any changes to your hard drive but these changes are not usually refreshed until you press the F5 key on your keyboard.



To refresh your screen automatically you should edit your system Registry. But the best technique to edit the windows registry keys, always export or backup the whole windows registry keys on backup drive before editing. Because any mistake in Registry can cause serious problem in your computer to run properly.

Follow the given steps to change the updates automatically.

1. First click on Start button then type Regedit in Run option.

2. In Registry Editor panel go to the path:

3. HKEY_LOCAL_MACHINE/System/CurrentControlSet/Control/UpdateMode

4. Here in right hand side panel edit the DWORD value to be between 1 and 5.

5. Now restart your computer after any changes to go into effect.

Saturday 14 January 2012

Hide The Desktop Icons

You can hide the Desktop Icons in Windows 2000 and Windows XP using windows registry editor.  This tip is very useful, if you want to safe your  personal data and icons of the windows desktop on a single computer.

Follow the given steps to to hide Desktop Icons:


1. Click Start button then type regedit in Run option then press Enter for next.


2. Here locate the location to:


HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer


3. Here in right side panel, right click to create a new DWORD value with name NoDesktop and type REG_DWORD then change its value data 1.


4. Now close the registry editor and restart your computer after any changes to go into effect.

Disabling Run From The Start Menu

Here is a registry trick to disable RUN from start menu.


1. Click on Start go to Run and then type Regedit press enter.

2. Go to HKEY_CURRENT_USER\Software\Microsof\Windows\Current Version\Policies\Explorer

3. Right click on the right panel and add a New DWORD value.

4. Name it NoFile or NoRun.

5. Give it a value of 1.

6. Logoff or Reboot the computer.

Friday 13 January 2012

How to Fix MBR in Windows Machines

Today the topic is "How to fix MBR in Windows XP, Vista and window 7 ?". This article will help you to understand the MBR and its easy reapir.This article is also related to Security,You may wanna ask that , How ? ... Thats Because bad hackers also make such virus,which can delete your MBR records to corrupt your window... Now you should know that How you can Repair it within 3-4 minutes.So lets start with ...




What is the MBR ?
Generally speaking the processor of your PC is yet to begin its processing once you switch it on. When your system memory is empty the processor doesn’t really have anything that it can execute. Actually your processor has no idea where it is.
The manufacturers of BIOS and other chip makers have developed a way in which you can ensure that your PC can boot regardless of the BIOS in the machine. This will allow your

Thursday 12 January 2012

How to Hack Softwares to use them Forever ?

Today we will show you that "How to Hack Software's to use them Forever ?". This is really a useful article, because we all use hundreds and thousand of software's, which of most are highly paid. :P

So, how to use them Freely ??

Most of us are familiar with many software's that run only for a specified period of time in the trial mode. Once the trial period is expired these software stop functioning and demand for a license - key purchase. But there is a way to run the softwares and make them function beyond the trial period. Isn't this interesting ?



Before we tell you how to hack the software and make it run in the trial mode forever, we have to understand the basic functioning of these software's. We'll try to explain this in brief.

So, When these software's are installed for the first time, they make an entry into the

Wednesday 11 January 2012

What is USB malware and how to fix it.

As the use of USB or Pendrive has become more and more widespread, so malware has began to use them as a way to spread from machine to machine. While this is a problem for end users, the real danger is with IT professionals, who might use the same USB stick in dozens of computers in a single day, will often be logged in with administrative privileges, and will have access to important machines.



This articles is aimed at those professionals, and how they can minimize the risk of passing an infection onto other machines.

How it Works ?

Malware uses two main techniques to spread through Pendrive (USB). The first, and less serious, is infecting executable files on the Pendrive (USB), so that when they are run on another machine, the infection moves with them.

The more common, and more dangerous, is to spread via the `autorun.inf` file, which Windows automatically executes when the drive is connected, meaning that no user interaction is needed. Conficker has been getting a lot of attention recently, and this was

Tuesday 10 January 2012

Can You Make Folder Named 'CON' ?



Nobody can create a FOLDER anywhere on the computer which can be named as “CON”. 



This is something pretty cool…and unbelievable… At Microsoft the whole Team couldn't answer why this happened!

TRY IT NOW !!



"Why we can't create a folder with name 'CON' " ?, and I’m sure most of us also try to make folder "CON" just now after reading the title of article ! if no, then go and 1st try it . If you try creating a folder named CON,  it’ll get renamed automatically to New Folder. But there is no mystery behind this, and the team at Microsoft very well knows the reason for this. :-)

Why is it not possible to create a folder named CON ? Before we proceed further, let me tell you a small secret you can’t even create a folder named CON, NUL, PRN and AUX and many others. The reason you can’t create a folder with these names is because these are reserved keywords used by DOS. The below screen-shot showing a list of reserved keywords in DOS.


If you try creating a folder with any of these names, the name automatically changes back to the default “New Folder”. And this is what has caused the confusion. Instead of automatically renaming the folder, had an explanatory warning message popped up.

You can actually create a folder named CON !!
There is actually a way to create a folder named CON, or any other name from the above

Monday 9 January 2012

Why Hackers Make Virus.. ?

With the development of computer technology, developing the technology and sophistication a virus. Even now the spread of the virus can occur more quickly to the world through the internet access more extensive. Now we will try to actually find out why and what cause someone is always working to create a new virus to spread throughout the world each day. We got 9 reasons to explain:







1. Used as a research objects
In an online interview. Dark Avenger, a virus maker from Bulgaria said: “I make a computer virus because I just heard of a computer virus and want to know about it, but

Sunday 8 January 2012

Linux and Windows : Who Better ?


Microsoft Windows is a family of operating systems by Microsoft. They can run on several types of platforms such as servers, embedded devices and, most typically, on personal computers. Microsoft first introduced an operating environment named Windows in November 1985 as an add-on to MS-DOS in response to the growing trend of graphical user interfaces (GUI) popularized by the Macintosh. Microsoft Windows eventually came to dominate the world's personal computer market.



Linux is a free Open Source Operating System, based on UNIX. It is available from many vendors with optional paid for support and provides an increasingly viable alternative to the Win 32 platform. C++ and C# compilers are all available on the Linux platform.


Many a times Windows users talk about what Windows can do but Linux can’t. To be fair, they also need to know what Linux can do but Windows can’t.






Reasons why Linux is better than Windows



· Linux doesn't have the virus problems : Even Microsoft’s CEO Steve Balmer couldn’t clean Windows Viruses. Still not convinced? Its not that there aren’t any viruses for Linux

Saturday 7 January 2012

What is a Proxy Server and How to use it for Security


Hi Everyone,
Today we are going to see What Is A Proxy Server And How To Use It for Security ?




Lets start, Proxies are store-and-forward caches. When you configure your web browser to use a proxy, it never connects to the URL. Instead, it always connects to the proxy server, and asks it to get the URL for you.

Proxies can be used as a sort of firewall, because it isolates you from connecting to the Internet. When you use a proxy server, your computer will send a request to the proxy

What are Torrents and its working ?




Torrents have become very popular way to download everything for free of cost like Movies, Games, Software, Music, Scripts etc. Torrents are everywhere on the internet with some advantages and disadvantages, here we will briefly try to explain what actually torrents are and how they work.


Torrent actually itself is a small file having *.torrent extension, that you can say it contains a link to the file to be downloaded. But here in this case, files to be downloaded are not hosted on web servers instead these files are downloaded from other computers (just like yours) connected with internet.

In simpler words, if you have downloading a file from torrent, same you are providing to

Friday 6 January 2012

Trojan Horse | Configure and Use

This tutorial is about configuring and using a trojan. There are many trojans available on internet for free. Some popular ones are Beast, Pro Rat, Netbus , Back Orifice, Girlfriend, Sub 7. I will be using Pro Rat in this tutorial.



If you don't know what is trojan. Then Click here for basic understanding of Trojan.



Requirements

-----------------


1. Prorat -  Click here to download Trojan Prorat.

2. Hostname  -  Your IP address would probably be dynamic that it keeps changing everytime you disconnect and reconnect. You need a host name which always

Wednesday 4 January 2012

Trojan Horse (Basics)

Have your wallpaper ever changed automatically ? Have the programs ever started without your initiation ? Have the browser opened unexpected websites automatically ? Simply have you ever felt that someone else is controlling your computer ? NO ?


Congrats, you probably haven't been a victim of trojan yet.








A trojan horse is a remote administration tool (RAT). This is some thing extremely

Tuesday 3 January 2012

Keyloggers - Basics

What is Key-logger ?

Keylogger as clear form the name , is something that records the keystrokes. In simple words, it records evrything you type and keeps saving the data recorded it in a text file. A keylogger is meant to be used for positive purposes like spying on your own computer or on your childern's computer.  But these are mostly used for malicious purposes by attackers to steal sensitive data of victims. This sensitive data might be anything that victim types like his email ID,password,banking details etc.


Make Cookie Stealer PHP Script



How does a cookie stealer work. There are two components in a cookie stealer: the sender and the receiver.

The sender can take many forms. In essense, it's just a link to the receiver with the cookie somehow attached. It can sometimes be difficult to find a way to implement the sender.

The receiver, as the name suggests, is a device which receives the cookie from the sender. It can also take several forms, but the most common is that of a PHP document, most commonly found residing on some obscure webserver.

Php Coding a receiver is the part. Only two things are needed to make a receiver : a 

Monday 2 January 2012

Email Spamming

Basics of working of Email


Email stands for Electronic Mail. Email sending and receiving is controlled by the Email servers.Email service providers configure Email Server before anyone can Sign into his or her account and start communicating digitally.Users from across the world register in to these Email servers and setup an Email account.


Email Travelling Path :


Let’s say we have two Email providers, one is gmail.com and other is yahoo.com, ABC is a registered user in gmail.com and XYZ is a registered user in yahoo.com.

• ABC signs in to his Email account in gmail.com, he then writes a mail to the 

  xyz@yahoo.com and sends the message.
• But what happens behind the curtains, the Email from the computer of abc@gmail.com 

  is forwarded to the Email server of gmail.com. Server of gmail.com then looks for 
  yahoo.com on the internet and forwards the Email of the yahoo.com for the account of 
  XYZ@yahoo.com. Yahoo server puts that email in that account.
• XYZ then sits on computer and signs in to her Email account.Now she has the message in 

  her Email inbox.






What is Email Spamming and Email Bombing ?


Email Bombing as clear from the name is sending the mass emails that is large number of emails to a email ID in a single click. Email spamming is like sending an email to large

Sunday 1 January 2012

Steal Someone's IP Address


Most of you may be curious to know how to find the IP address of your friend’s computer or to find the IP address of the person with whom you are chatting in facebook or gtalk. Finding out someone's IP address is like finding their phone number.

An IP address can be used to find the general location where that person lives.
In this post I’ll show you how to find IP address of someones computer using script.

Using this method for hacking someones ip address is very easy and effectively, so just follow the steps bellow.




IHT