<?xml version="1.0" encoding="UTF-8" standalone="no"?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:gd="http://schemas.google.com/g/2005" xmlns:georss="http://www.georss.org/georss" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-8276448037780392753</atom:id><lastBuildDate>Thu, 19 Dec 2024 03:19:52 +0000</lastBuildDate><category>news</category><category>windows</category><category>tools</category><category>malware</category><category>howto</category><category>security</category><category>Tech</category><category>tips</category><category>batch</category><category>Vulnerability</category><category>hacking</category><category>Defacements</category><category>Sql injection</category><category>skin</category><category>spam</category><category>phishing</category><category>tricks</category><category>Metasploit</category><category>cmd</category><category>ebook</category><category>scripts</category><title>CrackTheSec</title><description></description><link>http://crackthesec.blogspot.com/</link><managingEditor>noreply@blogger.com (Unknown)</managingEditor><generator>Blogger</generator><openSearch:totalResults>150</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><language>en-us</language><itunes:explicit>no</itunes:explicit><itunes:subtitle/><itunes:owner><itunes:email>noreply@blogger.com</itunes:email></itunes:owner><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8276448037780392753.post-536414290529300259</guid><pubDate>Wed, 07 Nov 2012 14:38:00 +0000</pubDate><atom:updated>2012-11-07T06:38:37.533-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">cmd</category><category domain="http://www.blogger.com/atom/ns#">howto</category><category domain="http://www.blogger.com/atom/ns#">tips</category><category domain="http://www.blogger.com/atom/ns#">windows</category><title>How to export the result of ping command</title><description>&lt;h3&gt;
Step 1&lt;/h3&gt;
Open the command prompt &lt;key&gt;WINDOWS&lt;/key&gt; + &lt;key&gt;R&lt;/key&gt;
&lt;br /&gt;
&lt;h3&gt;
Step 2&lt;/h3&gt;
Type the following command &lt;cmd-box&gt;C:\&amp;gt;ping nameofwebsite.com &amp;gt;&amp;gt; c:\Test.txt -t&lt;/cmd-box&gt;
&lt;br /&gt;
For example if you want to ping google.com&lt;br /&gt;
&lt;cmd-box&gt;C:\&amp;gt;ping google.com/&amp;gt;&amp;gt; c:\Test.txt -t&lt;/cmd-box&gt;
&lt;div class="blogger-post-footer"&gt;Crackthesec&lt;/div&gt;</description><link>http://crackthesec.blogspot.com/2012/11/how-to-export-result-of-ping-command.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8276448037780392753.post-1656699513898568839</guid><pubDate>Wed, 07 Nov 2012 14:20:00 +0000</pubDate><atom:updated>2012-11-07T06:39:07.686-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">howto</category><category domain="http://www.blogger.com/atom/ns#">scripts</category><title>How to get The ip Address of your Victim</title><description>&lt;h3&gt;
Step 1&lt;/h3&gt;
Create a free hosting site from here &lt;a href="http://www.my3gb.com/" target="_blank"&gt;My3gb&lt;/a&gt;
&lt;br /&gt;
&lt;h3&gt;
Step 2&lt;/h3&gt;
Copy below php code and paste in notepad and save it as ip.php&lt;br /&gt;
&lt;pre&gt;&lt;code class="php"&gt;
&amp;lt;?php
$myFile = "ip.html";
$fh = fopen($myFile, 'a+') or die("can't open file");
$stringData ="Date:".date('Y-m-d H:i:s')."&amp;lt;br/&amp;gt;Ip:".$_SERVER['REMOTE_ADDR']."&amp;lt;br/&amp;gt;Browser:".$_SERVER['HTTP_USER_AGENT']."&amp;lt;br /&amp;gt;\n" ;
fwrite($fh, $stringData);
fclose($fh);
?&amp;gt;
&amp;lt;?php
header( 'Location: http://crackthesec.blogspot.com/' ) ;
$ip = $_SERVER['REMOTE_ADDR'];
$hostaddress = gethostbyaddr($ip);
$browser = $_SERVER['HTTP_USER_AGENT'];
$referred = $_SERVER['HTTP_REFERER']; // a quirky spelling mistake that stuck in php

print "&amp;lt;strong&amp;gt;Display IP address:&amp;lt;/strong&amp;gt;&amp;lt;br /&amp;gt;\n";
print "$ip&amp;lt;br /&amp;gt;&amp;lt;br /&amp;gt;\n";
print "&amp;lt;strong&amp;gt;More detailed host address:&amp;lt;/strong&amp;gt;&amp;lt;br /&amp;gt;\n";
print "$hostaddress&amp;lt;br /&amp;gt;&amp;lt;br /&amp;gt;\n";
print "&amp;lt;strong&amp;gt;Display browser info&amp;lt;/strong&amp;gt;:&amp;lt;br /&amp;gt;\n";
print "$browser&amp;lt;br /&amp;gt;&amp;lt;br /&amp;gt;\n";
print "&amp;lt;strong&amp;gt;Where you came from (if you clicked on a link to get here&amp;lt;/strong&amp;gt;:&amp;lt;br /&amp;gt;\n";
if ($referred == "") {
print "Page was directly requested";
}
else {
print "$referred";
}
?&amp;gt; 
&lt;/code&gt;&lt;/pre&gt;
&lt;h3&gt;
Step3&lt;/h3&gt;
upload the php script to public folder
&lt;br /&gt;
&lt;h3&gt;
Step 4&lt;/h3&gt;
Now send the link to your victim when the link is opened the IP address will displayed and stored
&lt;br /&gt;
&lt;h3&gt;
To view the IP Address&lt;/h3&gt;
Replace your php link with ip.html&lt;br /&gt;
Example :&lt;br /&gt;
This is my Demo Link &lt;br /&gt;
http://crackthesec.my3gb.com/ip.php&lt;br /&gt;
replace as http://crackthesec.my3gb.com/ip.html&lt;div class="blogger-post-footer"&gt;Crackthesec&lt;/div&gt;</description><link>http://crackthesec.blogspot.com/2012/11/how-to-get-ip-address-of-your-victim.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8276448037780392753.post-2876764799228858131</guid><pubDate>Tue, 06 Nov 2012 02:45:00 +0000</pubDate><atom:updated>2012-11-05T18:45:59.868-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">tools</category><category domain="http://www.blogger.com/atom/ns#">windows</category><title>How to View Last Activity of Your PC</title><description>&lt;span style="color: black;"&gt;LastActivityView is a tool for Windows 
operating system that collects information from various sources on a 
running system, and displays a log of actions made by the user and 
events occurred on this computer.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;img height="392" src="http://www.nirsoft.net/utils/lastactivityview.png" width="640" /&gt;&lt;br /&gt;
&lt;div style="background-color: #4d90fe; border-radius: 4px 4px 4px 4px; border: 1px solid rgb(48, 121, 237); margin: 10px 5px; padding: 10px; text-align: center; width: 200px;"&gt;
&lt;div style="padding-left: 10px; padding-right: 10px;"&gt;
&lt;a href="http://www.nirsoft.net/utils/lastactivityview.zip" style="text-decoration: none;"&gt;
          &lt;span style="color: white; display: block; font-family: Arial; font-size: 12px; font-weight: bold; text-align: center; white-space: nowrap;"&gt;
            DOWNLOAD
            &lt;/span&gt;&lt;/a&gt;
        &lt;/div&gt;
&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;Crackthesec&lt;/div&gt;</description><link>http://crackthesec.blogspot.com/2012/11/how-to-view-last-activity-of-your-pc.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total><enclosure length="88232" type="application/zip" url="http://www.nirsoft.net/utils/lastactivityview.zip"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>LastActivityView is a tool for Windows operating system that collects information from various sources on a running system, and displays a log of actions made by the user and events occurred on this computer. DOWNLOAD Crackthesec</itunes:subtitle><itunes:author>noreply@blogger.com (Unknown)</itunes:author><itunes:summary>LastActivityView is a tool for Windows operating system that collects information from various sources on a running system, and displays a log of actions made by the user and events occurred on this computer. DOWNLOAD Crackthesec</itunes:summary><itunes:keywords>tools, windows</itunes:keywords></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8276448037780392753.post-7469148854723964624</guid><pubDate>Wed, 31 Oct 2012 15:11:00 +0000</pubDate><atom:updated>2012-10-31T08:12:10.427-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">windows</category><title>How to Uninstall programs using command prompt</title><description>&lt;h3&gt;
Step 1&lt;/h3&gt;
&lt;key&gt;Windows&lt;/key&gt; + &lt;key&gt;R&lt;/key&gt; then type &lt;cmd-box&gt;wmic&lt;/cmd-box&gt;
&lt;br /&gt;
&lt;h2&gt;
or&lt;/h2&gt;
&lt;key&gt;Windows&lt;/key&gt; + &lt;key&gt;R&lt;/key&gt; then type &lt;cmd-box&gt;cmd&lt;/cmd-box&gt; &amp;amp; type &lt;cmd-box&gt;start wmic&lt;/cmd-box&gt; in the command prompt
&lt;br /&gt;
&lt;h3&gt;
Step 2&lt;/h3&gt;
Now type &lt;cmd-box&gt;product get name&lt;/cmd-box&gt; &amp;amp; Hit &lt;key&gt;Enter&lt;/key&gt;&lt;br /&gt;
&lt;br /&gt;
Now you will see a list of programs installed&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhrfgtswfo7SFxsp2v5qOHoGOIAZtfhtg1BzTmm61dOfVcOmSRl4yliT5ZxwR6FmEkWozvh5IarteBhsWw9W6z-8DdegIZtEJRwwXpwIjRGvwVHf-6C-iV9jtqRP-LTv9dHVHOzb8FJ_ks6/s1600/2.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="338" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhrfgtswfo7SFxsp2v5qOHoGOIAZtfhtg1BzTmm61dOfVcOmSRl4yliT5ZxwR6FmEkWozvh5IarteBhsWw9W6z-8DdegIZtEJRwwXpwIjRGvwVHf-6C-iV9jtqRP-LTv9dHVHOzb8FJ_ks6/s1600/2.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;h3&gt;
Step 3&lt;/h3&gt;
Now type &lt;cmd-box&gt;product where name=”&lt;red-box&gt;UR PROGRAM NAME&lt;/red-box&gt;” call uninstall&lt;/cmd-box&gt; &amp;amp; Hit &lt;key&gt;Enter&lt;/key&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;red-box&gt;Note&lt;/red-box&gt; you have to write the exact name of software you wish to uninstall from the populated list. For an&amp;nbsp;example Google App Engine.&lt;br /&gt;
&lt;br /&gt;
Example &lt;cmd-box&gt; product where name=”Google App Engine” call uninstall&lt;/cmd-box&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgD-2cPKT66hr5BqM10B5KQQedS3P2KYbArbVh8QLHZ4sI_3Bl1bySzKg_FaOcK5zq3F4zkK7WhX2Bw5weWAuL4Xd2z8RIm4BCFEENbv86osfmT4NgL62Euv1aEj596ft08qSVFNx5SNFxs/s1600/3.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="341" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgD-2cPKT66hr5BqM10B5KQQedS3P2KYbArbVh8QLHZ4sI_3Bl1bySzKg_FaOcK5zq3F4zkK7WhX2Bw5weWAuL4Xd2z8RIm4BCFEENbv86osfmT4NgL62Euv1aEj596ft08qSVFNx5SNFxs/s1600/3.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;h3&gt;
Step 4&lt;/h3&gt;
Now type &lt;cmd-box&gt;Y&lt;/cmd-box&gt; for confirming un-installation process then press Enter to uninstall the software completely.&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiIwydSI-c85v4R3deAJEpT6sG2eCZu7XooZmo6DFEayB3fP-OcBgw8AQ-z8dL1nZcmMGy5BrH33cphbQYbxs1HK7AWfabP0xcYubCKLYtpwr_19E8Crb_HKU0_Z00Gy9skODT7U_UbsLl-/s1600/4.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="344" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiIwydSI-c85v4R3deAJEpT6sG2eCZu7XooZmo6DFEayB3fP-OcBgw8AQ-z8dL1nZcmMGy5BrH33cphbQYbxs1HK7AWfabP0xcYubCKLYtpwr_19E8Crb_HKU0_Z00Gy9skODT7U_UbsLl-/s1600/4.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;Crackthesec&lt;/div&gt;</description><link>http://crackthesec.blogspot.com/2012/10/how-to-uninstall-programs-using-command_31.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhrfgtswfo7SFxsp2v5qOHoGOIAZtfhtg1BzTmm61dOfVcOmSRl4yliT5ZxwR6FmEkWozvh5IarteBhsWw9W6z-8DdegIZtEJRwwXpwIjRGvwVHf-6C-iV9jtqRP-LTv9dHVHOzb8FJ_ks6/s72-c/2.png" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8276448037780392753.post-5390955877890915208</guid><pubDate>Sun, 28 Oct 2012 17:17:00 +0000</pubDate><atom:updated>2012-10-29T06:02:09.180-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">windows</category><title>How to Change Windows Logon Background Image Manually</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;h3&gt;
Step 1&lt;/h3&gt;
&lt;key&gt;WINDOWS&lt;/key&gt; + &lt;key&gt;R&lt;/key&gt; &amp;amp; type   &lt;cmd-box&gt;regedit&lt;/cmd-box&gt;
&lt;br /&gt;
&lt;h3&gt;
Step 2&lt;/h3&gt;
Navigate to &lt;via&gt;HKEY_LOCAL_MACHINE &amp;gt; SOFTWARE &amp;gt; Microsoft &amp;gt; Windows &amp;gt; CurrentVersion &amp;gt; Authentica​tion &amp;gt; LogonUI &amp;gt; Background.&lt;/via&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhi1L5Nd3OpHvXm5X835IUFMU9skqo1HvUnc5-H0gqePR12UR2iK-g0P3t4SmXw-EYs8rHIoFQL80GIu0FBfii6kep9q1ZJqD3M6wHN46iFb2byrDksBz2uc0wAyDtMhv6-jclyKSECZfwI/s1600/reg.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="344" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhi1L5Nd3OpHvXm5X835IUFMU9skqo1HvUnc5-H0gqePR12UR2iK-g0P3t4SmXw-EYs8rHIoFQL80GIu0FBfii6kep9q1ZJqD3M6wHN46iFb2byrDksBz2uc0wAyDtMhv6-jclyKSECZfwI/s1600/reg.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;h3&gt;
Step 3&lt;/h3&gt;
Now you will see OEMBackground value if its not there create one by right clicking and choosing New &amp;gt; DWORD Value , and rename it too OEMBackground.&lt;br /&gt;
Now just double click on the OEMBackground value and replace 0 with 1.
&lt;br /&gt;
&lt;h3&gt;
Step 4&lt;/h3&gt;
Now navigate to &lt;via&gt; C: &amp;gt; Windows &amp;gt; System32 &amp;gt; oobe.&lt;/via&gt;
&lt;green-box&gt;Now create a new folder names "info" and create another sub folder in it and name it as "backgrounds"&lt;/green-box&gt;&lt;br /&gt;
Now just add your desired wallpaper in this folder and rename that image as backgrounddefault.jpg, make sure that images must be &lt;red-box&gt;less than 245KB in size.&lt;/red-box&gt;
&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;Crackthesec&lt;/div&gt;</description><link>http://crackthesec.blogspot.com/2012/10/how-to-change-windows-logon-background.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhi1L5Nd3OpHvXm5X835IUFMU9skqo1HvUnc5-H0gqePR12UR2iK-g0P3t4SmXw-EYs8rHIoFQL80GIu0FBfii6kep9q1ZJqD3M6wHN46iFb2byrDksBz2uc0wAyDtMhv6-jclyKSECZfwI/s72-c/reg.png" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8276448037780392753.post-3263154357813095229</guid><pubDate>Wed, 24 Oct 2012 15:57:00 +0000</pubDate><atom:updated>2012-10-24T09:11:21.864-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">howto</category><category domain="http://www.blogger.com/atom/ns#">tricks</category><category domain="http://www.blogger.com/atom/ns#">windows</category><title>How to hide Folder without any software using cmd </title><description>&lt;h3&gt;
Step 1&lt;/h3&gt;
Open your command promt&lt;br /&gt;
&lt;h3&gt;
Step 2 : To Hide &lt;/h3&gt;
Now type &lt;cmd-box&gt;attrib +s +h Path\Folder_Name&lt;/cmd-box&gt;&lt;br /&gt;
Eg : &lt;cmd-box&gt;attrib +s +h h:\CTS&lt;/cmd-box&gt;&lt;br /&gt;
&lt;h3&gt;
Step 3 : To UnHide &lt;/h3&gt;
Now type &lt;cmd-box&gt;attrib -s -h Path\Folder_Name&lt;/cmd-box&gt;&lt;br /&gt;
Eg : &lt;cmd-box&gt;attrib -s -h h:\CTS&lt;/cmd-box&gt;&lt;br /&gt;
&lt;red-box&gt;Note&lt;/red-box&gt; you can also view the hidden folder by&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgU02K23tpTD0MqCCkzllbihk0fkT7ZwcX10ZYTiQvubgCYLTQ3Cuiw0Gbl7YUcDKytoVwpbzDg7o6MIo552QRlFE3udpUuaRg26aJTp5-K7e-AZrtoSgcG35BRQIvYCarWNl9Xvq-tOYeI/s1600/1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgU02K23tpTD0MqCCkzllbihk0fkT7ZwcX10ZYTiQvubgCYLTQ3Cuiw0Gbl7YUcDKytoVwpbzDg7o6MIo552QRlFE3udpUuaRg26aJTp5-K7e-AZrtoSgcG35BRQIvYCarWNl9Xvq-tOYeI/s1600/1.png" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhD9n2P7F9xirfg84ul5Yr2WmWjyOm5SDHoeTLQ-XzxdTFJEftUMCbXnupekyz8zOf12lByDFHo-QOD6BQm-X0QfCYjxPDhah9QjNBq7FjRhKrxePewwyFruDhTZgTWyPYPnSst6fi6wJBn/s1600/2.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhD9n2P7F9xirfg84ul5Yr2WmWjyOm5SDHoeTLQ-XzxdTFJEftUMCbXnupekyz8zOf12lByDFHo-QOD6BQm-X0QfCYjxPDhah9QjNBq7FjRhKrxePewwyFruDhTZgTWyPYPnSst6fi6wJBn/s1600/2.png" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikkS-16A63XWGktjwzHAxCBEW4P-Iwo218HmZyuCasHzqSUWmz7RdzcOUiBjL2zV2Zcrqq2ZFkGJR_CbasO6aKk7C3cn4miyZQF5C8erB-dNg1H0ktCoERU1FClYmXnR0r_KyaUk5VMDqi/s1600/3.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikkS-16A63XWGktjwzHAxCBEW4P-Iwo218HmZyuCasHzqSUWmz7RdzcOUiBjL2zV2Zcrqq2ZFkGJR_CbasO6aKk7C3cn4miyZQF5C8erB-dNg1H0ktCoERU1FClYmXnR0r_KyaUk5VMDqi/s1600/3.png" /&gt;&lt;/a&gt;&lt;/div&gt;
Click on YES and you can now see your hidden folder&lt;br /&gt;
&lt;h3&gt;&lt;green-box&gt;You can also hide any files with their extension&lt;/green-box&gt;&lt;/h3&gt;
Eg : &lt;cmd-box&gt;attrib +s +h h:\CTS\a.jpg&lt;/cmd-box&gt;&lt;div class="blogger-post-footer"&gt;Crackthesec&lt;/div&gt;</description><link>http://crackthesec.blogspot.com/2012/10/how-to-hide-folder-without-any-software.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgU02K23tpTD0MqCCkzllbihk0fkT7ZwcX10ZYTiQvubgCYLTQ3Cuiw0Gbl7YUcDKytoVwpbzDg7o6MIo552QRlFE3udpUuaRg26aJTp5-K7e-AZrtoSgcG35BRQIvYCarWNl9Xvq-tOYeI/s72-c/1.png" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8276448037780392753.post-8502922918048792505</guid><pubDate>Wed, 24 Oct 2012 07:45:00 +0000</pubDate><atom:updated>2012-10-24T01:01:02.845-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">tricks</category><category domain="http://www.blogger.com/atom/ns#">windows</category><title>How to Shutdown, Restart or Log Off in Windows 8</title><description>&lt;pre&gt;&lt;code class="winutils"&gt;
' This script will create shortcuts in the Start Menu
' Written by Amit Agarwal - 06/03/2012
' Web: http://labnol.org/?p=20989
' Version: 0.1
'
set WshShell = WScript.CreateObject("WScript.Shell")
strStartMenu = WshShell.SpecialFolders("StartMenu")
set oShellLink = WshShell.CreateShortcut(strStartMenu &amp;amp; "\Shutdown.lnk")
oShellLink.TargetPath = "%systemroot%\System32\shutdown.exe"
oShellLink.Arguments = "-s -t 0"
oShellLink.WindowStyle = 1
oShellLink.IconLocation = "%systemroot%\System32\shell32.dll,27"
oShellLink.Description = "Shutdown Computer (Power Off)"
oShellLink.WorkingDirectory = "%systemroot%\System32\"
oShellLink.Save
Set oShellLink = Nothing
set oShellLink = WshShell.CreateShortcut(strStartMenu &amp;amp; "\Log Off.lnk")
oShellLink.TargetPath = "%systemroot%\System32\shutdown.exe"
oShellLink.Arguments = "-l"
oShellLink.WindowStyle = 1
oShellLink.IconLocation = "%systemroot%\System32\shell32.dll,44"
oShellLink.Description = "Log Off (Switch User)"
oShellLink.WorkingDirectory = "%systemroot%\System32\"
oShellLink.Save
Set oShellLink = Nothing
set oShellLink = WshShell.CreateShortcut(strStartMenu &amp;amp; "\Restart.lnk")
oShellLink.TargetPath = "%systemroot%\System32\shutdown.exe"
oShellLink.Arguments = "-r -t 0"
oShellLink.WindowStyle = 1
oShellLink.IconLocation = "%systemroot%\System32\shell32.dll,176"
oShellLink.Description = "Restart Computer (Reboot)"
oShellLink.WorkingDirectory = "%systemroot%\System32\"
oShellLink.Save
Set oShellLink = Nothing
Wscript.Echo "Created Shutdown, Restart and Log Off buttons in your Programs Menu. You can now pin them to the Start Screen of your Windows 8 computer."&lt;/code&gt;&lt;/pre&gt;
&lt;red-box&gt;Note&lt;/red-box&gt; Now copy the above code in notepad &amp;amp; save it as &lt;b&gt;&lt;cmd-box&gt;filename.vbs&amp;nbsp;&lt;/cmd-box&gt;&lt;/b&gt;&lt;br /&gt;
Here is the video demo by &lt;a href="http://www.labnol.org/"&gt;www.labnol.org&lt;/a&gt; and the tutorials is also Written by Mr.Amit Agarwal&lt;br /&gt;
&lt;iframe allowfullscreen="allowfullscreen" frameborder="0" height="360" src="http://www.youtube.com/embed/7t45YyGM9Ks?feature=player_embedded" width="640"&gt;&lt;/iframe&gt;

&lt;div class="blogger-post-footer"&gt;Crackthesec&lt;/div&gt;</description><link>http://crackthesec.blogspot.com/2012/10/how-to-shutdown-restart-or-log-off-in.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://img.youtube.com/vi/7t45YyGM9Ks/default.jpg" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8276448037780392753.post-8731210641072200571</guid><pubDate>Tue, 23 Oct 2012 07:11:00 +0000</pubDate><atom:updated>2012-10-23T03:18:24.068-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">howto</category><category domain="http://www.blogger.com/atom/ns#">tips</category><category domain="http://www.blogger.com/atom/ns#">tricks</category><category domain="http://www.blogger.com/atom/ns#">windows</category><title>An Interesting Trick to Hide the Data in Notepad.</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://kyrionhackingtutorials.com/blog/wp-content/uploads/2010/05/notepad_command_with_secret_word.jpg" rel="group-5" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;/a&gt;&lt;/div&gt;
&lt;h3&gt;
Steps to hide text in a Notepad&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt; Open your command prompt&lt;/li&gt;
&lt;li&gt; Type cd.. to move to C:\&amp;gt; drive or Type cd desktop to move to your desktop.&lt;/li&gt;
&lt;li&gt; Type the below code in your command prompt&lt;/li&gt;
&lt;/ul&gt;
&lt;cmd-box&gt;notepad filename.txt:hidden&lt;/cmd-box&gt;
&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt; Write some data and save (Ctrl+s) the file.&lt;/li&gt;
&lt;li&gt; Browse to the file location and Open filename.txt you cannot see any data in the file.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;
To retrieve the hidden data open command prompt and type the same command.&lt;/h3&gt;
&lt;cmd-box&gt;&gt;notepad filename.txt:hidden&lt;/cmd-box&gt;&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;Crackthesec&lt;/div&gt;</description><link>http://crackthesec.blogspot.com/2012/10/an-interesting-trick-to-hide-data-in.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8276448037780392753.post-4844354878259966780</guid><pubDate>Mon, 22 Oct 2012 13:15:00 +0000</pubDate><atom:updated>2012-10-22T06:41:12.397-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">howto</category><category domain="http://www.blogger.com/atom/ns#">tips</category><category domain="http://www.blogger.com/atom/ns#">windows</category><title>How to Hide your Secret Files inside an Image Without any Software</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;h3&gt;
&lt;red-box&gt;NOTE:&lt;/red-box&gt; you must need two images and your files should be Compressed into .rar or .zip or anyother extension &lt;/h3&gt;
&lt;h3&gt;
Step 1&lt;/h3&gt;
Open your command prompt&lt;br /&gt;
&lt;h3&gt;
Step 2&lt;/h3&gt;
Now Type the following commandline &lt;br /&gt;
&lt;cmd&gt;copy /b [the_image] + [rar_file_to_hide] [image_result_name]&lt;/cmd&gt;&lt;br /&gt;
e.g : copy /b a.jpg + b.rar c.jpg&lt;br /&gt;
Now your a.jpg image &amp;amp; b.rar File will be copied inside the c.jpg&lt;br /&gt;
&lt;h3&gt;
To view the hidden file open the c.jpg using winzip or winrar etc.&lt;/h3&gt;
&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;Crackthesec&lt;/div&gt;</description><link>http://crackthesec.blogspot.com/2012/10/how-to-hide-your-secret-files-inside.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8276448037780392753.post-1092629997885085546</guid><pubDate>Thu, 18 Oct 2012 08:53:00 +0000</pubDate><atom:updated>2012-10-18T01:58:48.879-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Defacements</category><category domain="http://www.blogger.com/atom/ns#">hacking</category><category domain="http://www.blogger.com/atom/ns#">howto</category><title>How to crash small websites using RDOS | DOS tutorial </title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;h3&gt;
TOOLS REQUIRED:&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Port Scanner(&lt;a href="http://crackthesec.blogspot.com/2012/04/nmap.html" target="_blank"&gt;ZenMap&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;rDOS(Google IT)&lt;/li&gt;
&lt;li&gt;Ip Hiding tool(&lt;a href="http://ultrasurf.us/" target="_blank"&gt;Ultrasur&lt;/a&gt;f)&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;
NOTE: Use At your own RISK &lt;/h4&gt;
You can Google the Tools above and download it and when you Download &lt;b&gt;rDOS &lt;/b&gt;your antivirus may or may not detect the rDOS as a thread so if it Detects and delete it then try &lt;b&gt;TURNING-OFF &lt;/b&gt;your Antivirus &amp;amp; Download it and then your &lt;b&gt;IP Hiding Tool&lt;/b&gt; not to Trace you..&lt;br /&gt;
&lt;h3&gt;
STEP 1&lt;/h3&gt;
First of all you need to know the IP address of the website you want to crash.&lt;br /&gt;
Use ping command in windows to get the ip address of the website.&lt;br /&gt;
open CMD and enter ping www.website.com&lt;br /&gt;
&lt;br /&gt;
Now you have the IP address of the website.&lt;br /&gt;
&lt;h3&gt;
STEP 2&lt;/h3&gt;
Now use Port scanner to check whether PORT 80 is open or not. If PORT 80 is not open choose another website to hack &lt;br /&gt;
otherwise you can crash this website.&lt;br /&gt;
&lt;h3&gt;
STEP 3&lt;/h3&gt;
&amp;nbsp;Now open your&amp;nbsp; rDos. Enter your victims ip that you got from step 1.&lt;br /&gt;
It will ask you for the port to attack use port 80 that’s why we scanned to make sure that 80 was open! If it is closed it will not work.
&lt;br /&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;Crackthesec&lt;/div&gt;</description><link>http://crackthesec.blogspot.com/2012/10/how-to-crash-small-websites-using-rdos.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8276448037780392753.post-7430697052482178478</guid><pubDate>Thu, 18 Oct 2012 08:17:00 +0000</pubDate><atom:updated>2012-10-18T01:58:15.489-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">howto</category><category domain="http://www.blogger.com/atom/ns#">tips</category><category domain="http://www.blogger.com/atom/ns#">tools</category><title> Free online file converter</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjyyBknqGfVZaeuhmj_K6JDxA2vP-8FeDy0_PeTKyo9EmH9oCA5qfT59lu2urthekGScr6oc1EGMNoPRzJwErTL_nlV8196rjKpGBDC1Vehuxpomtl2alHDHLGtN3xmjMoe3AWzIymZaESv/s1600/conv.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="433" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjyyBknqGfVZaeuhmj_K6JDxA2vP-8FeDy0_PeTKyo9EmH9oCA5qfT59lu2urthekGScr6oc1EGMNoPRzJwErTL_nlV8196rjKpGBDC1Vehuxpomtl2alHDHLGtN3xmjMoe3AWzIymZaESv/s640/conv.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;h3&gt;
How to Use this service&lt;/h3&gt;
Go to &lt;a href="http://www.online-convert.com/"&gt;www.online-convert.com&lt;/a&gt; and select the tool you want to use. Suppose i wish to convert an image to PNG format. Select the conversion and click on go.&lt;br /&gt;
&lt;br /&gt;
Now browse the file or enter the web URL of the image. Select the quality settings and then click on convert.&lt;br /&gt;
&lt;br /&gt;
After the conversion, you will find the download link of the converted file. &lt;br /&gt;
&lt;br /&gt;
Download the file and enjoy. This is a nice online converter file which can be used any time from any where.&lt;br /&gt;
&amp;nbsp;
&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;Crackthesec&lt;/div&gt;</description><link>http://crackthesec.blogspot.com/2012/10/free-online-file-converter.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjyyBknqGfVZaeuhmj_K6JDxA2vP-8FeDy0_PeTKyo9EmH9oCA5qfT59lu2urthekGScr6oc1EGMNoPRzJwErTL_nlV8196rjKpGBDC1Vehuxpomtl2alHDHLGtN3xmjMoe3AWzIymZaESv/s72-c/conv.png" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8276448037780392753.post-8057783227383127177</guid><pubDate>Thu, 18 Oct 2012 07:48:00 +0000</pubDate><atom:updated>2012-10-18T01:58:32.498-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">hacking</category><category domain="http://www.blogger.com/atom/ns#">howto</category><category domain="http://www.blogger.com/atom/ns#">news</category><category domain="http://www.blogger.com/atom/ns#">phishing</category><category domain="http://www.blogger.com/atom/ns#">tips</category><title>How to Regain Access to your Hacked Facebook Account Easily</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;h3&gt;
Step 1&lt;/h3&gt;
Visit &lt;a href="http://www.facebook.com/hacked"&gt;http://www.facebook.com/hacked&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;h3&gt;
Step 2 &lt;/h3&gt;
Click My Account Is Compromised as shown in below screenshot&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjS4kC2aCg5LKfwte5QpIf8ZFlyQKepTCazYj12ojElNWidFFrx60w5Yw6dkHMsvBVxJBobkIqFrmeKqFkRAmCH4FROQoCGtQJn910EBJguVzyBGJKGFOBXJeNVHXFsf0nngSsTp1_ZwslJ/s1600/2.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;/a&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgDYtKN35XGPfWTvW6TOSM282ZRT_-jgJYc-VT1uREXOyS5JWXDzZQOnTLgbMg7C3yuMz6WRytKZLPzM-EzbMtK-jsxXUCEEI59Es9MtBPJN-j8fcxuE4WqSBpAwoFbeMauL9yqtXitUL_o/s1600/1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgDYtKN35XGPfWTvW6TOSM282ZRT_-jgJYc-VT1uREXOyS5JWXDzZQOnTLgbMg7C3yuMz6WRytKZLPzM-EzbMtK-jsxXUCEEI59Es9MtBPJN-j8fcxuE4WqSBpAwoFbeMauL9yqtXitUL_o/s1600/1.png" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;h3&gt;
Step 3 &lt;/h3&gt;
Now enter your Email,Phone Or Username and Click on Search&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjS4kC2aCg5LKfwte5QpIf8ZFlyQKepTCazYj12ojElNWidFFrx60w5Yw6dkHMsvBVxJBobkIqFrmeKqFkRAmCH4FROQoCGtQJn910EBJguVzyBGJKGFOBXJeNVHXFsf0nngSsTp1_ZwslJ/s1600/2.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjS4kC2aCg5LKfwte5QpIf8ZFlyQKepTCazYj12ojElNWidFFrx60w5Yw6dkHMsvBVxJBobkIqFrmeKqFkRAmCH4FROQoCGtQJn910EBJguVzyBGJKGFOBXJeNVHXFsf0nngSsTp1_ZwslJ/s1600/2.png" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
And now identify your account &amp;amp; now click on continue 
without entering the password and then you will be redirected to another
 page as show in Step 4.&lt;br /&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEioWSj7-Yk4vVNKzADcK6t3tMWdZ3otvWqW1Ou_wqx865vnnfX0RIscBUxFDiF79jnlzVo9IqCWLWpqfmQoWVbyl3w4TzJBjQAiwUHh3xYY8Hasa5tzFxgckEDSED-u5y7RAmIkoiAcHnXF/s1600/3.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEioWSj7-Yk4vVNKzADcK6t3tMWdZ3otvWqW1Ou_wqx865vnnfX0RIscBUxFDiF79jnlzVo9IqCWLWpqfmQoWVbyl3w4TzJBjQAiwUHh3xYY8Hasa5tzFxgckEDSED-u5y7RAmIkoiAcHnXF/s1600/3.png" /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;h3&gt;
Step 4 &lt;/h3&gt;
Now choose your option to reset your password....&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiMgPg41CB2QdWPjLAA55-96bTc30r7TYSO5UWucaxtiKgYd6oWS5lrIEasuUMM4IoN59tiz0FtzMqcNuZaLgbBHQXPwucKiIfDNmB4kyxskQiHFjCA8C-FNP11fN8bHwrojrupc9i91Cc_/s1600/4.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiMgPg41CB2QdWPjLAA55-96bTc30r7TYSO5UWucaxtiKgYd6oWS5lrIEasuUMM4IoN59tiz0FtzMqcNuZaLgbBHQXPwucKiIfDNmB4kyxskQiHFjCA8C-FNP11fN8bHwrojrupc9i91Cc_/s1600/4.png" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;Crackthesec&lt;/div&gt;</description><link>http://crackthesec.blogspot.com/2012/10/how-to-regain-access-to-your-hacked.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgDYtKN35XGPfWTvW6TOSM282ZRT_-jgJYc-VT1uREXOyS5JWXDzZQOnTLgbMg7C3yuMz6WRytKZLPzM-EzbMtK-jsxXUCEEI59Es9MtBPJN-j8fcxuE4WqSBpAwoFbeMauL9yqtXitUL_o/s72-c/1.png" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8276448037780392753.post-2353373735121463465</guid><pubDate>Wed, 17 Oct 2012 20:04:00 +0000</pubDate><atom:updated>2012-10-17T13:23:28.808-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">hacking</category><category domain="http://www.blogger.com/atom/ns#">howto</category><category domain="http://www.blogger.com/atom/ns#">tips</category><category domain="http://www.blogger.com/atom/ns#">windows</category><title>How to Bypass CYBEROAM</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEitVllzbmEzBAiJdySfW4ozwhyZPK-aXGSdYv6BJlirNtJ73XGUrTl5kNgoWMGnyCSwBTTII72ESOE-EGUm4R26P_M4I6QR8_49lVLkQA7Mcbp29DcE2rVcLrQ7hfhLk5oqkoUR2KZR1jbX/s1600/Cyberoam_logo.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="262" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEitVllzbmEzBAiJdySfW4ozwhyZPK-aXGSdYv6BJlirNtJ73XGUrTl5kNgoWMGnyCSwBTTII72ESOE-EGUm4R26P_M4I6QR8_49lVLkQA7Mcbp29DcE2rVcLrQ7hfhLk5oqkoUR2KZR1jbX/s640/Cyberoam_logo.jpg" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;h1&gt;
TECHNIQUES TO BYPASS OR HACK CYBEROAM&lt;/h1&gt;
&lt;h3&gt;
USE TOR&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Download &lt;a href="https://www.torproject.org/projects/torbrowser.html.en" target="_blank"&gt;TOR Browser &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Install or Extract TOR browser in a portable USB drive.&lt;/li&gt;
&lt;li&gt;Plug your USB drive in computer and start TOR browser and start surfing on Internet, Now all websites like FACEBOOK, ORKUT, BLOGGER are accessible.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;
CACHED HACK&lt;/h3&gt;
This HACK work for all blocked websites. You can easily open blocked websites using this technique. When you search anything using google In the each search result there are two things in blue color prior to URL i.e Cached and Similar. To view that blocked Website You have to click on Cached

Click on CACHED to access blocked websites.
&lt;br /&gt;
&lt;h3&gt;
PING HACK&lt;/h3&gt;
There are millions of Proxy websites available on Internet. Find non popular proxy websites to open blocked websites. Then follow these steps
&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Start Command Prompt.&lt;/li&gt;
&lt;li&gt;Type Ping www.proxywebsite.com&lt;/li&gt;
&lt;li&gt;Copy IP address of that proxy website and paste into on you browser.&lt;/li&gt;
&lt;li&gt;Your blocked website will be unblocked.&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;
Note : Try to find non popular proxy website, there are lots of proxy websites available on Internet and not be able to cyberoam block all proxy websites from Internet so this hack will surely work if you find non popular proxy website which make fool to cyberoam.&lt;/h4&gt;
&lt;h4&gt;
HTTPS HACK&lt;/h4&gt;
Try to find proxy website that uses https i.e. SSL proxies are also not blocked by any Cyberoam.&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;Crackthesec&lt;/div&gt;</description><link>http://crackthesec.blogspot.com/2012/10/how-to-bypass-cyberoam.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEitVllzbmEzBAiJdySfW4ozwhyZPK-aXGSdYv6BJlirNtJ73XGUrTl5kNgoWMGnyCSwBTTII72ESOE-EGUm4R26P_M4I6QR8_49lVLkQA7Mcbp29DcE2rVcLrQ7hfhLk5oqkoUR2KZR1jbX/s72-c/Cyberoam_logo.jpg" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8276448037780392753.post-3542173304513870767</guid><pubDate>Tue, 16 Oct 2012 15:16:00 +0000</pubDate><atom:updated>2012-10-17T13:23:50.192-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Tech</category><category domain="http://www.blogger.com/atom/ns#">tips</category><title>What is Denial Of Service (DoS) Attacks ?</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;h3&gt;
Denial Of Service (DoS) Attacks &lt;/h3&gt;
A denial of service (DoS) attack is an attack that clogs up so much memory on the target system that it can not serve it’s users, or it causes the target system to crash, reboot, or otherwise deny services to legitimate users.There are several different kinds of dos attacks as discussed below:-&lt;br /&gt;
&lt;br /&gt;
&lt;h3&gt;
 Ping Of Death &lt;/h3&gt;
The ping of death attack sends oversized ICMP datagrams (encapsulated in IP packets) to the victim.The Ping command makes use of the ICMP echo request and echo reply messages and it’s commonly used to determine whether the remote host is alive. In a ping of death attack, however, ping causes the remote system to hang, reboot or crash. To do so the attacker uses, the ping command in conjuction with -l argument (used to specify the size of the packet sent) to ping the target system that exceeds the maximum bytes allowed by TCP/IP (65,536).&lt;br /&gt;
example:- c:/&amp;gt;ping -l 65540 hostname&lt;br /&gt;
Fortunately, nearly all operating systems these days are not vulnerable to the ping of death attack.&lt;br /&gt;
&lt;br /&gt;
&lt;h3&gt;
 Teardrop Attack &lt;/h3&gt;
Whenever data is sent over the internet, it is broken into fragments at the source system and reassembled at the destination system. For example you need to send 3,000 bytes of data from one system to another. Rather than sending the entire chunk in asingle packet, the data is broken down into smaller packets as given below:&lt;br /&gt;
* packet 1 will carry bytes 1-1000.&lt;br /&gt;
* packet 2 will carry bytes 1001-2000.&lt;br /&gt;
* packet 3 will carry bytes 2001-3000.&lt;br /&gt;
In teardrop attack, however, the data packets sent to the target computer contais bytes that overlaps with each other.&lt;br /&gt;
(bytes 1-1500) (bytes 1001-2000) (bytes 1500-2500)&lt;br /&gt;
When the target system receives such a series of packets, it can not reassemble the data and therefore will crash, hang, or reboot.&lt;br /&gt;
Old Linux systems, Windows NT/95 are vulnerable.&lt;br /&gt;
&lt;br /&gt;
&lt;h3&gt;
 SYN – Flood Attack &lt;/h3&gt;
In SYN flooding attack, several SYN packets are sent to the target host, all with an invalid source IP address. When the target system receives these SYN packets, it tries to respond to each one with a SYN/ACK packet but as all the source IP addresses are invalid the target system goes into wait state for ACK message to receive from source. Eventually, due to large number of connection requests, the target systems’ memory is consumed. In order to actually affect the target system, a large number of SYN packets with invalid IP addresses must be sent.&lt;br /&gt;
&lt;br /&gt;
&lt;h3&gt;
 Land Attack &lt;/h3&gt;
A land attack is similar to SYN attack, the only difference being that instead of including an invalid IP address, the SYN packet include the IP address of the target sysetm itself. As a result an infinite loop is created within the target system, which ultimately hangs and crashes.Windows NT before Service Pack 4 are vulnerable to this attack.&lt;br /&gt;
&lt;br /&gt;
&lt;h3&gt;
 Smurf Attack &lt;/h3&gt;
There are 3 players in the smurf attack–the attacker,the intermediary (which can also be a victim) and the victim. In most scenarios the attacker spoofs the IP source address as the IP of the intended victim to the intermediary network broadcast address. Every host on the intermediary network replies, flooding the victim and the intermediary network with network traffic.&lt;br /&gt;
Result:- Performance may be degraded such that the victim, the victim and intermediary networks become congested and unusable, i.e. clogging the network and preventing legitimate users from obtaining network services.&lt;br /&gt;
&lt;br /&gt;
&lt;h3&gt;
 UDP – Flood Attack &lt;/h3&gt;
Two UDP services: echo (which echos back any character received) and chargen (which generates character) were used in the past for network testing and are enabled by default on most systems. These services can be used to launch a DOS by connecting the chargen to echo ports on the same or another machine and generating large amounts of network traffic.&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;Crackthesec&lt;/div&gt;</description><link>http://crackthesec.blogspot.com/2012/10/what-is-denial-of-service-dos-attacks.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8276448037780392753.post-4214606075731972011</guid><pubDate>Tue, 16 Oct 2012 14:59:00 +0000</pubDate><atom:updated>2012-10-16T08:14:07.828-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">howto</category><category domain="http://www.blogger.com/atom/ns#">windows</category><title>How to Hide text behind images </title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;h3&gt;
Step 1&lt;/h3&gt;
Copy an image file to &lt;b&gt;(any Directory or Folder)&lt;/b&gt; of your computer.&lt;br /&gt;
&lt;h3&gt;
Step2&lt;/h3&gt;
Open&amp;nbsp; Command Prompt.&lt;br /&gt;
&lt;h3&gt;
Step3&lt;/h3&gt;
&lt;h4&gt;
Note : Navigate to the Directory of your "image" stored. (Example : The image is in H:Directory then navigate to H: and then type&lt;/h4&gt;
H:\&amp;gt;echo “your text to hide” &amp;gt;&amp;gt; “image.jpg”.&lt;br /&gt;
&lt;h3&gt;
Step4&lt;/h3&gt;
Now right click on image.jpg — Open with — Notepad. You can see your hidden text at the end of your image file contents.&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;Crackthesec&lt;/div&gt;</description><link>http://crackthesec.blogspot.com/2012/10/how-to-hide-text-behind-images.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8276448037780392753.post-1669380281568707389</guid><pubDate>Sat, 06 Oct 2012 12:23:00 +0000</pubDate><atom:updated>2012-10-06T05:28:17.746-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">windows</category><title>Keyboard Tricks in Windows 7</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;pre&gt;[Windows] + [D]-Show or Hide the desktop

[Windows] + [Home]-Minimize all but selected window. Reverse by clicking the key combination again.

[Windows] + [Spacebar]- Make all open windows transparent to view gadgets and icons on desktop.

[Windows] + left arrow OR [Windows] + right arrow-Dock selected window to the left or right half of your screen.

&amp;nbsp;[Windows] + up arrow OR [Windows] + down arrow- Maximized and restores the selected window.

[Windows] + [Tab]-Launch 3D representation of open windows and click [Tab] key again to flip through them.

&amp;nbsp;[Windows] + [B]-Puts focus on the ‘show hidden icons’ button on the system tray.

&amp;nbsp;[Windows] + [1] To [Windows] + [9]- Launch first through ninth icon on taskbar, including items pinned to taskbar.

&amp;nbsp;[Windows] + [SHIFT] + [1] To [Windows] + [SHIFT] + [9]-Starts new instance of respective taskbar icon.

&amp;nbsp;[Windows] + [Alt] + [1] To [Windows] + [Alt] + [9]-Opens jump list for respective icon.

[Windows] + [T] OR [Windows] + [SHIFT] + [T]-Move focus to front or back of taskbar.

&amp;nbsp;[Alt] + [Ctrl] + [Tab] + left/right/up/down arrowFlip window.

&amp;nbsp;[Alt] + [Tab]Cycle through open windows.

&amp;nbsp;[Windows] + [P]-Select the Projector Mode

&amp;nbsp;[Windows] + [+] OR [Windows] + [-]-Activates Windows Magnifier to zoom in or out of screen.

[Ctrl] + [Alt] + [D]-Switch to docked mode.

[Ctrl] + [Alt] + [L] -Switch to lense mode.

[Ctrl] + [Alt] + [F]-Switch from docked or lens mode back to full screen mode.

&amp;nbsp;[Ctrl] + [Alt] + [I]-Invert colors.

&amp;nbsp;[Windows] + [Esc]-Exist magnifier views.

&amp;nbsp;[Windows] + [G]-Cycle through desktop gadgets.

&amp;nbsp;[Windows] + [X]-Launches Windows Mobility Center. Especially useful if you’re working on a laptop.
&lt;/pre&gt;
&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;Crackthesec&lt;/div&gt;</description><link>http://crackthesec.blogspot.com/2012/10/keyboard-tricks-in-windows-7.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8276448037780392753.post-848972142302955204</guid><pubDate>Sat, 06 Oct 2012 12:23:00 +0000</pubDate><atom:updated>2012-10-06T05:23:00.091-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">howto</category><category domain="http://www.blogger.com/atom/ns#">windows</category><title>Change View Mode of Magnifier in Windows 7</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
Windows 7/Vista has a very nice feature of MAGNIFIER (to Use press ‘WinKey’ and ‘+’) some times when we change the view mode to &lt;strong&gt;Docked, &lt;/strong&gt;other views mode get disabled and in this tut I am going to let you know that how to enable those options.
&lt;br /&gt;
1) Go into the Registry &lt;strong&gt;(Start -&amp;gt; Run -&amp;gt; type in Regedit and then click OK).&lt;/strong&gt;&lt;br /&gt;

2) Navigate to the following key: &lt;strong&gt;HKEY_CURRENT_USER\Software\Microsoft\ScreenMagnifier&lt;/strong&gt;&lt;br /&gt;

3) Under the &lt;strong&gt;MagnificationMode&lt;/strong&gt; DWORD value, change that to either &lt;strong&gt;2 or 3&lt;/strong&gt;.&lt;br /&gt;

4) Close Registry Editor&lt;br /&gt;

5) Restart the Computer&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;Crackthesec&lt;/div&gt;</description><link>http://crackthesec.blogspot.com/2012/10/change-view-mode-of-magnifier-in.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8276448037780392753.post-4570642253188497640</guid><pubDate>Sat, 06 Oct 2012 12:16:00 +0000</pubDate><atom:updated>2012-10-06T05:18:06.136-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">howto</category><category domain="http://www.blogger.com/atom/ns#">tips</category><title>Resetting Ubuntu 11.10 Password</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
If you’ve forgotten your Ubuntu 11.10 Password you can reset it 
within minutes. I will tell you two methods to reset your Ubuntu 
Password. The first one is by booting it in recovery mode and second one
 is by using any Live OS.&lt;br /&gt;
&lt;br /&gt;
Let’s start with the recovery mode first as it takes less time and easy to do in comparison to the second one method:&lt;br /&gt;
&lt;br /&gt;
Boot up your Ubuntu. Press and Hold &lt;b&gt;‘Shift’&lt;/b&gt; Key while the machine is booting. You will get the GRUB Menu like this:&lt;br /&gt;
&lt;br /&gt;
&lt;img alt="" class="aligncenter" height="159" src="http://kyrionhackingtutorials.com/wp-content/uploads/2012/02/1.jpg" title="Step 1" width="613" /&gt;&lt;br /&gt;
&lt;br /&gt;
Select the second option which is &lt;b&gt;‘Recovery Mode’&lt;/b&gt; and press Enter. After pressing enter system will start booting and you will get a list of options like this:&lt;br /&gt;
&lt;br /&gt;
&lt;img alt="" class="aligncenter" height="246" src="http://kyrionhackingtutorials.com/wp-content/uploads/2012/02/2.jpg" title="Step 2" width="633" /&gt;&lt;br /&gt;
&lt;br /&gt;
After that we need to make the filesystem writable so that we can change the password. To make it writable select the 3&lt;sup&gt;rd&lt;/sup&gt; option &lt;b&gt;‘remount’&lt;/b&gt; and press Enter. After pressing enter you will get the following:&lt;br /&gt;
&lt;br /&gt;
&lt;img alt="" class="aligncenter" height="130" src="http://kyrionhackingtutorials.com/wp-content/uploads/2012/02/3.jpg" title="Step 3" width="721" /&gt;&lt;br /&gt;
&lt;br /&gt;
Press Enter here and you will get recovery menu with a list of options again:&lt;br /&gt;
&lt;br /&gt;
&lt;img alt="" class="aligncenter" height="250" src="http://kyrionhackingtutorials.com/wp-content/uploads/2012/02/4.jpg" title="Step 4" width="636" /&gt;&lt;br /&gt;
&lt;br /&gt;
Select the last option &lt;b&gt;‘root’&lt;/b&gt; and press enter. If the root account password is not set then you will get a shell prompt like this:&lt;br /&gt;
&lt;br /&gt;
&lt;img alt="" class="aligncenter" height="17" src="http://kyrionhackingtutorials.com/wp-content/uploads/2012/02/5.jpg" title="Step 5" width="714" /&gt;&lt;br /&gt;
&lt;br /&gt;
Now you can enter commands to reset the password of any account.&lt;br /&gt;
&lt;b&gt;#passwd &amp;lt;username&amp;gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;img alt="" class="aligncenter" height="17" src="http://kyrionhackingtutorials.com/wp-content/uploads/2012/02/6.jpg" title="Step 6" width="713" /&gt;&lt;br /&gt;
&lt;br /&gt;
Enter the new password and confirm it by entering again.&lt;br /&gt;
Now enter command &lt;b&gt;‘sync’&lt;/b&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;img alt="" class="aligncenter" height="79" src="http://kyrionhackingtutorials.com/wp-content/uploads/2012/02/7.jpg" title="Step 7" width="719" /&gt;&lt;br /&gt;
&lt;br /&gt;
Now Enter the command &lt;b&gt;‘reboot –f’&lt;/b&gt; to reboot.&lt;br /&gt;
&lt;br /&gt;
&lt;img alt="" class="aligncenter" height="96" src="http://kyrionhackingtutorials.com/wp-content/uploads/2012/02/8.jpg" title="Step 8" width="723" /&gt;&lt;br /&gt;
&lt;br /&gt;
Now you can login with your new password.&lt;br /&gt;
&lt;br /&gt;
Now if the root account is having a password then you will not get 
the shell at recovery mode. In this case you need to boot your ubuntu 
machine with any Live OS. I will be booting it again with Ubuntu 11.10.&lt;br /&gt;
&lt;br /&gt;
Boot your machine with Ubuntu 11.10. You will get a screen asking to just try this as a live cd or install it on your machine:&lt;br /&gt;
&lt;br /&gt;
&lt;img alt="" class="aligncenter" height="318" src="http://kyrionhackingtutorials.com/wp-content/uploads/2012/02/9.jpg" width="514" /&gt;&lt;br /&gt;
&lt;br /&gt;
Click on &lt;b&gt;‘Try Ubuntu’&lt;/b&gt; &amp;nbsp;to use it as a LIVE OS.&lt;br /&gt;
&lt;br /&gt;
You will get desktop a live user.&amp;nbsp; Now you need to mount the file 
system to change the password. First we need to know the device name of 
the filesystem to mount. To get the name of device enter the command &lt;b&gt;‘sudo fdisk –l’&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://kyrionhackingtutorials.com/?attachment_id=2002" rel="attachment wp-att-2002"&gt;&lt;img alt="" class="aligncenter size-full wp-image-2002" height="292" src="http://kyrionhackingtutorials.com/wp-content/uploads/2012/02/10.jpg" title="10" width="731" /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Now as you can see the system type of &lt;b&gt;/dev/sda1&lt;/b&gt; is &lt;b&gt;Linux&lt;/b&gt;.&lt;br /&gt;
So we need to mount the device &lt;b&gt;‘/dev/sda1’.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
To mount this device enters the following command.&lt;br /&gt;
&lt;b&gt;#sudo mount /dev/sda1 /tmp&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://kyrionhackingtutorials.com/2012/02/resetting-ubuntu-11-10-password/11-2/" rel="attachment wp-att-2003"&gt;&lt;img alt="" class="aligncenter size-full wp-image-2003" height="75" src="http://kyrionhackingtutorials.com/wp-content/uploads/2012/02/11.jpg" title="11" width="724" /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Now we need to enter the command &lt;b&gt;‘sudo chroot /tmp’&amp;nbsp; &lt;/b&gt;to get the shell on your filesystem:&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://kyrionhackingtutorials.com/2012/02/resetting-ubuntu-11-10-password/12-2/" rel="attachment wp-att-2004"&gt;&lt;img alt="" class="aligncenter size-full wp-image-2004" height="90" src="http://kyrionhackingtutorials.com/wp-content/uploads/2012/02/12.jpg" title="12" width="719" /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Now we’ve got the shell we can change the password of any user by entering the command &lt;b&gt;‘passwd &amp;lt;username&amp;gt;’&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Now restart the machine by entering the command &lt;b&gt;‘reboot’&lt;/b&gt; and you will be able to login with your new password.&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;Crackthesec&lt;/div&gt;</description><link>http://crackthesec.blogspot.com/2012/10/resetting-ubuntu-1110-password.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8276448037780392753.post-5835999379683425502</guid><pubDate>Sat, 06 Oct 2012 12:10:00 +0000</pubDate><atom:updated>2012-10-06T05:10:58.565-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">howto</category><category domain="http://www.blogger.com/atom/ns#">windows</category><title>How to Create your own Run Command ?</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;b&gt;Step 1:&lt;/b&gt; Go to “Start,” “Run,” (told you we use it a lot) and type regedit.&lt;br /&gt;
&lt;b&gt;Step 2:&lt;/b&gt; Navigate to the following:&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Apps Path&lt;br /&gt;
&lt;b&gt;Step 3:&lt;/b&gt; Create a new folder/key under Apps Path. (Right-Click Apps Path and click “New,” “Key.”)&lt;br /&gt;
&lt;b&gt;Step 4:&lt;/b&gt; Title the new folder/key the name of the application, e.g. firefox.exe.&lt;br /&gt;
&lt;b&gt;Step 5:&lt;/b&gt; Right-Click the default string value (the thing automatically created in your new folder) and click Modify.&lt;br /&gt;
&lt;b&gt;Step 6:&lt;/b&gt; Change the value to the path of the executable you are 
attempting to run. E.g. C:\Program Files\Mozilla Firefox\firefox.exe.&lt;br /&gt;
&lt;b&gt;Step 7:&lt;/b&gt; Create a new “String Value” by right-clicking under the 
default value (the thing we just edited) and select “New,” “String 
Value.” Name it Path and enter the value as the same path you previously
 entered.&lt;br /&gt;
&lt;b&gt;Step 8&lt;/b&gt;: Done! Now, all you need to do is go to “Start,” “Run,” and type the name of your command!&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;Crackthesec&lt;/div&gt;</description><link>http://crackthesec.blogspot.com/2012/10/how-to-create-your-own-run-command.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8276448037780392753.post-8530712221188006506</guid><pubDate>Sat, 06 Oct 2012 12:08:00 +0000</pubDate><atom:updated>2012-10-06T05:08:43.295-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">howto</category><category domain="http://www.blogger.com/atom/ns#">windows</category><title>How to Send Data on a Right Click to Your Desired Folder?</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
Whenever you attach a removable disk and want to send some items in 
it, you have option either you select the required files and do a CTRL 
–C, open the removable disk and do a CTRL-V or you select the required 
files right click on it and there you find “Send To” option. In “Send 
To” you find the name of removable disk and you simply send the items 
into it. Well, What if i get the name of my own desired folder there 
which I use frequently for keeping my stuff.&lt;br /&gt;

&lt;br /&gt;

Now in this post I will be telling you how you can create your own 
folder with in any name in “Send To” option so that whenever you will 
copy any files or folders, you will simply send them to your folder 
instead of using CTRL-C and CTRL-V.&lt;br /&gt;

&lt;br /&gt;

1)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Firstly you’ll have to access hidden files. So change your view settings to make all hidden files visible.&lt;br /&gt;

Tools -&amp;gt; folder options -&amp;gt; view (tab) and select the show hidden files and folders.&lt;br /&gt;

&lt;br /&gt;

2)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; In Windows 7 also you will have to unmark “hide system 
protected files and folder”. After that you can see all the hidden 
system protection file, now go to&lt;br /&gt;

&lt;strong&gt;C:\Users\UserName\SendTo&lt;/strong&gt; folder.&lt;br /&gt;

&lt;br /&gt;

3)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Open up &lt;strong&gt;my computer&lt;/strong&gt; and locate your most used folders let us take “Fun”. Create a shortcut of the most used folders (Fun) in&lt;br /&gt;

&lt;strong&gt;C:\Users\UserName\SendTo&lt;/strong&gt; folder.&lt;br /&gt;

&lt;br /&gt;

4)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; You can do this in a number of ways.&lt;br /&gt;

Right click -&amp;gt; send to desktop (create shortcut) and move the shortcut from the desktop to the &lt;strong&gt;C:\Users\UserName\SendTo&lt;/strong&gt; folder.&lt;br /&gt;

Copy the most used folder and go to &lt;strong&gt;C:\Users\UserName\SendTo&lt;/strong&gt; folder and right click -&amp;gt; paste shortcut.&lt;br /&gt;

&lt;br /&gt;

5)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Now your customized “Send To” option is ready to go.&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;Crackthesec&lt;/div&gt;</description><link>http://crackthesec.blogspot.com/2012/10/how-to-send-data-on-right-click-to-your.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8276448037780392753.post-5730528921592448457</guid><pubDate>Sat, 06 Oct 2012 12:06:00 +0000</pubDate><atom:updated>2012-10-06T05:06:43.500-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">howto</category><category domain="http://www.blogger.com/atom/ns#">windows</category><title>Secure your Computer by Sticky Key Attack</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;strong&gt;Windows XP:&lt;/strong&gt;&lt;br /&gt;

&lt;ol&gt;&lt;a href="https://encrypted-tbn1.gstatic.com/images?q=tbn:ANd9GcQKfyYRINbwRKQM2XSiuAPc4xFWFjrd1Cqdcr_pCHE_EceONQjo-A" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img alt="" border="0" class="rg_hi uh_hi" data-height="215" data-width="234" height="215" id="rg_hi" src="https://encrypted-tbn1.gstatic.com/images?q=tbn:ANd9GcQKfyYRINbwRKQM2XSiuAPc4xFWFjrd1Cqdcr_pCHE_EceONQjo-A" style="height: 215px; width: 234px;" width="234" /&gt;&lt;/a&gt;
&lt;li&gt;Check for sticky key backdoor “By pressing sticky key&amp;nbsp; 5 times on login screen ”&amp;nbsp; whenever&amp;nbsp; you turn on the computer.&lt;/li&gt;
&lt;li&gt;Turn off the sticky Keys .&lt;/li&gt;
&lt;li&gt;Or you can use this step to disable the ‘net user’ command, so that 
if anybody make a backdoor&amp;nbsp; in your system but he can’t change your 
password .
&lt;ol&gt;
&lt;li&gt;Open the folder &lt;strong&gt;c:\windows\system32&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&amp;nbsp;Search for ‘Net.exe’ over there and replace it with ‘cmd.exe’ or with any other ‘.exe’ file.&lt;/li&gt;
&lt;li&gt;Open the file by inserting this address &lt;strong&gt;c:\windows\system32\dllcache&lt;/strong&gt; on file browser manually and change the ‘net.exe’ with ‘cmd.exe’ or any other ‘.exe’ file.&lt;/li&gt;
&lt;/ol&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;strong&gt;Windows 7:&lt;/strong&gt;&lt;br /&gt;

&lt;ol&gt;
&lt;li&gt;Check for sticky key backdoor “By pressing sticky key&amp;nbsp; 5 times on login screen ”&amp;nbsp; whenever&amp;nbsp; you turn on the computer .&lt;/li&gt;
&lt;li&gt;Turn off the sticky Keys .&lt;/li&gt;
&lt;li&gt;Or you can use this step to disable the ‘net user’ command, so that 
if anybody make a backdoor&amp;nbsp; in your system but he can’t change your 
password .
&lt;ol&gt;
&lt;li&gt;Open the folder &lt;strong&gt;c:\windows\system32&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Search for ‘Net.exe’ over there and replace it with ‘cmd.exe’ or with any other ‘.exe’ file.&lt;/li&gt;
&lt;li&gt;Open the file by inserting this &lt;strong&gt;C:\Windows\winsxs\x86_microsoft-windows-net-command-line-tool_31bf3856ad364e35_6.1.7600.16385_none_5208a7a3d3caa54c&lt;/strong&gt; on file browser manually and change the ‘net.exe’ with ‘cmd.exe’ or any other ‘.exe’ file.&lt;/li&gt;
&lt;/ol&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;Crackthesec&lt;/div&gt;</description><link>http://crackthesec.blogspot.com/2012/10/secure-your-computer-by-sticky-key.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8276448037780392753.post-6734565165282478450</guid><pubDate>Sat, 06 Oct 2012 11:51:00 +0000</pubDate><atom:updated>2012-10-06T04:57:27.853-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">howto</category><category domain="http://www.blogger.com/atom/ns#">news</category><category domain="http://www.blogger.com/atom/ns#">tips</category><category domain="http://www.blogger.com/atom/ns#">windows</category><title>How to Hide a folder without any third party Software</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;b style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img alt="" class="rg_hi uh_hi" data-height="215" data-width="234" height="215" id="rg_hi" src="https://encrypted-tbn1.gstatic.com/images?q=tbn:ANd9GcQKfyYRINbwRKQM2XSiuAPc4xFWFjrd1Cqdcr_pCHE_EceONQjo-A" style="height: 215px; width: 234px;" width="234" /&gt; &lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;To Hide:&lt;/b&gt;&lt;br /&gt;
Rename any folder with extension&lt;b&gt; &lt;/b&gt;&lt;br /&gt;
&lt;pre&gt;&lt;b&gt;{645FF040-5081-101B-9F08-00AA002F954E}&lt;/b&gt;&lt;/pre&gt;
&lt;b&gt;
&lt;/b&gt;For eg,&lt;br /&gt;
If u’ve a folder with name “abc”&lt;br /&gt;
press F2,&lt;br /&gt;
then type, &lt;br /&gt;
&lt;pre&gt;abc.{645FF040-5081-101B-9F08-00AA002F954E}&lt;/pre&gt;
and Press Enter.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;To get back to its original form :&lt;/b&gt;&lt;br /&gt;
Make a new batch file with any name and type&lt;br /&gt;
&lt;pre&gt;ren abc.{645FF040-5081-101B-9F08-00AA002F954E} abc&lt;/pre&gt;
and save it as abc.bat 

&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;Crackthesec&lt;/div&gt;</description><link>http://crackthesec.blogspot.com/2012/10/how-to-hide-folder-without-any-third.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8276448037780392753.post-9053916601539443602</guid><pubDate>Sat, 06 Oct 2012 11:17:00 +0000</pubDate><atom:updated>2012-10-06T04:47:33.962-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">howto</category><category domain="http://www.blogger.com/atom/ns#">news</category><category domain="http://www.blogger.com/atom/ns#">tips</category><title>How to access blocked sites or country restricted sites</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div style="margin-left: 1em; margin-right: 1em;"&gt;
&lt;/div&gt;
&lt;div style="margin-left: 1em; margin-right: 1em;"&gt;
&lt;/div&gt;
&lt;div style="margin-left: 1em; margin-right: 1em;"&gt;
&lt;/div&gt;
&lt;div style="margin-left: 1em; margin-right: 1em;"&gt;
&lt;/div&gt;
&lt;div style="margin-left: 1em; margin-right: 1em; text-align: left;"&gt;
Stealthy allows you to instantaneously get and setup a working proxy from a click of a button.&lt;/div&gt;
&lt;div style="margin-left: 1em; margin-right: 1em;"&gt;
&lt;/div&gt;
&lt;div style="margin-left: 1em; margin-right: 1em;"&gt;
&lt;/div&gt;
&lt;div style="margin-left: 1em; margin-right: 1em;"&gt;
&lt;img border="0" src="https://sites.google.com/site/stealthyextension/_/rsrc/1297503195030/home/stealth.jpg" /&gt; &lt;/div&gt;
If you are worried about the permissions required by the extension check out this certificate: http://www.softpedia.com/progClean/Stealthy-for-Chrome-Clean-215173.html&lt;br /&gt;
Does your country/company blocks you out of facebook, youtube or others?&lt;br /&gt;
&lt;span lang="en-us"&gt;
&lt;br /&gt;
Stealthy is the solution for you.&lt;/span&gt;&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Hide your IP address for your privacy online.&lt;br /&gt;
&lt;/li&gt;
&lt;li&gt;Access all content privately without censorship; bypass firewalls.&lt;/li&gt;
&lt;/ul&gt;
It provide the proxies, so you don't have to bother searching for lists that usually don't work. The extension automatically selects and sets up tested proxies from the cloud.&lt;br /&gt;
&lt;br /&gt;
The term Stealthy refers to military aircraft that can penetrate into enemy territory undetected by radar. In a way, that’s what this browser extension does.&lt;br /&gt;
&lt;br /&gt;
Some organizations and governments block access to web pages, and certain online services are not available in all countries. With Stealthy, users can make themselves undetectable, and thereby able to bypass the censorship.&lt;br /&gt;
&lt;br /&gt;
This can be tremendously important in countries like China or Iran, where regimes censor the Internet. But even in countries like Germany, many people cannot watch music videos on YouTube because of a licensing dispute with GEMA. With Stealthy installed, this is not an issue, as you can get a foreign IP address and play the videos without issue.&lt;br /&gt;
&lt;br /&gt;
Once installed, a small stealth aircraft icon will be appear in your navigation bar. The color is red by default, indicating Stealthy is off. After clicking on it, Stealthy automatically searches for an appropriate proxy, sets up your browser, and turns the icon green, meaning you are now in Stealth mode.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;How does it works:&lt;/b&gt;&lt;br /&gt;
The extension works by placing an icon on the upper right part of your 
browser, after installation Stealthy will be off by&amp;nbsp;default, you will 
need to turn it on.   With the click it switches between ON (green icon)
 and OFF (red icon), in the (unlikely) case that the proxy assigned to 
you doesn't work or is too slow you should turn Stealthy off and on 
again in order to get a new one.&lt;br /&gt;
&lt;img border="0" src="https://sites.google.com/site/stealthyextension/_/rsrc/1315390370603/home/stealthy.png" style="display: block; margin-left: auto; margin-right: auto; text-align: center;" /&gt;&lt;b&gt;Configuration:&lt;/b&gt;&lt;br /&gt;
&lt;span style="border-collapse: separate;"&gt;This is the preferences window, you access there by clicking on the small arrow in the&amp;nbsp;right&amp;nbsp;side of Stealthy's icon.&lt;br /&gt;
&lt;br /&gt;
Yo can chose between uses:&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;ul&gt;&lt;span style="border-collapse: separate;"&gt;
&lt;li&gt;Normal use for achieve&amp;nbsp;anonymity&lt;/li&gt;
&lt;li&gt;Pretend that you are in the US&lt;/li&gt;
&lt;li&gt;Use a service that&amp;nbsp;requires&amp;nbsp;you to be in an&amp;nbsp;specific&amp;nbsp;country by&amp;nbsp;providing&amp;nbsp;the &lt;a href="http://en.wikipedia.org/wiki/ISO_3166-1_alpha-2" rel="nofollow" target="_blank"&gt;country code.&lt;/a&gt;&lt;/li&gt;
&lt;/span&gt;&lt;/ul&gt;
&lt;span style="border-collapse: separate;"&gt;
&lt;/span&gt;
&lt;div&gt;
&lt;span style="border-collapse: separate;"&gt;You can also chose the&amp;nbsp;behavior&amp;nbsp;on start-up:&lt;/span&gt;&lt;/div&gt;
&lt;span style="border-collapse: separate;"&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li&gt;Leave it as it was previously set&lt;/li&gt;
&lt;li&gt;Automatically set it Off&lt;/li&gt;
&lt;li&gt;Automatically set it On.&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
The last option cleanup your network settings in case you lost connectivity to internet, or Stealthy refuses to work&lt;/div&gt;
&lt;/div&gt;
&lt;/span&gt;&lt;b&gt;&amp;nbsp;
&lt;/b&gt;&lt;/div&gt;
&lt;b&gt;
&lt;/b&gt;
&amp;nbsp;&lt;img border="0" src="https://sites.google.com/site/stealthyextension/_/rsrc/1298143812537/home/screen-capture-13.png" /&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class="sites-layout-tile sites-tile-name-header"&gt;
&lt;div dir="ltr"&gt;
&lt;div style="text-align: left;"&gt;
&lt;span style="font-family: Verdana,sans-serif;"&gt;&lt;b&gt;&lt;span style="font-size: medium; line-height: 22px;"&gt;Stealthy for Chrome (recommended):&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;pre&gt;&lt;code class="php"&gt;&lt;a href="http://chrome.google.com/webstore/detail/ieaebnkibonmpbhdaanjkmedikadnoje" style="font-size: large; line-height: 22px;" target="_blank"&gt;http://chrome.google.com/webstore/detail/ieaebnkibonmpbhdaanjkmedikadnoje&lt;/a&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;/div&gt;
&lt;span style="font-family: Verdana,sans-serif;"&gt;&lt;b&gt;&lt;span style="font-size: medium;"&gt;&lt;span style="line-height: 22px;"&gt;Stealthy for Firefox:&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;pre&gt;&lt;span style="font-size: medium;"&gt;&lt;span style="line-height: 22px;"&gt;&lt;a href="http://addons.mozilla.org/en-us/firefox/addon/stealthy/" rel="nofollow" target="_blank"&gt;http://addons.mozilla.org/en-us/firefox/addon/stealthy/&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/pre&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;Crackthesec&lt;/div&gt;</description><link>http://crackthesec.blogspot.com/2012/10/how-to-access-blocked-sites-or-country.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8276448037780392753.post-2395360973115036058</guid><pubDate>Fri, 05 Oct 2012 15:12:00 +0000</pubDate><atom:updated>2012-10-05T10:29:10.338-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">news</category><category domain="http://www.blogger.com/atom/ns#">windows</category><title>How to Access Data of a Password Protected User in Windows XP</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;b&gt;Steps :&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;pre&gt;&lt;code class="doc"&gt;
1. Boot the machine from Windows XP bootable CD.

2. At the setup screen, select R to repair using Recovery Console.

3. Now the console program will prompt you to select the Windows folder 
(eg. C:\WINDOWS) where the Windows is installed (you need to enter a 
number from the list of folders shown to you).

4. Type 'HELP' (without single quotes) and press enter for available 
commands. This is like a DOS program, but some features are not 
available

5. Change the current directory to the user's directory where you want to backup.

6. Type 'CD "C:\Documents and Settings\USERNAME"' (without single quotes) and press enter. 

7. Now the current directory will change to "C:\Documents and Settings\USERNAME".

8. Now change the directory to Desktop by entering 'CD Desktop' (without
 single quotes) and press enter to go to the desktop folder.

9. Type 'DIR' (Without single quotes) and press enter, you will be liwted all the available files in Desktop.

10. Type 'COPY a.doc D:\BACKUP' (without quotes) and press enter, where 
a.doc is a file available in Desktop and the folder D:\BACKUP available 
to copy the files.

11. As in step 7,8,9,10 you can backup other folders like "My Documents", "My Music", etc.

12. Note that you cannot use wildcards for COPY, i.e. you cannot copy 
all the files in a folder at once. You must copy one file by one.&lt;/code&gt;&lt;/pre&gt;


  &lt;div class="alert-message error"&gt;
    &lt;p&gt;&lt;strong&gt;Any data which has not backed up will be permanently deleted when you re-format the hard drive, so make sure you back up any thing you want to keep.&lt;/strong&gt;&lt;/p&gt;

  &lt;/div&gt;

&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;Crackthesec&lt;/div&gt;</description><link>http://crackthesec.blogspot.com/2012/10/how-to-access-data-of-password.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8276448037780392753.post-838842394419825039</guid><pubDate>Tue, 02 Oct 2012 08:41:00 +0000</pubDate><atom:updated>2012-10-02T02:04:10.429-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">news</category><title>Destroy Websites with Asteroids Shooting Game JavaScript</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhxZj5ZQEDZTMLVq8N7EWdU21ufxS2_T_0v8CCuohEUgDRtNVjoM0yQBaPehNZ6N7NXgJqMLXayG1fc-f2C4HzyvT57y2QD3TIPBqR9HzoEJ0vQWOYEdpkYwnbYq-Vcw7QjwMY5B8aS4o-L/s1600/Untitled.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="302" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhxZj5ZQEDZTMLVq8N7EWdU21ufxS2_T_0v8CCuohEUgDRtNVjoM0yQBaPehNZ6N7NXgJqMLXayG1fc-f2C4HzyvT57y2QD3TIPBqR9HzoEJ0vQWOYEdpkYwnbYq-Vcw7QjwMY5B8aS4o-L/s640/Untitled.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;ol&gt;
&lt;li&gt;Simply Drag tthe below image to your bookmarks bar for using it on any website anytime&lt;/li&gt;
&lt;li&gt;Now just visit any website which you wanna play with and click the link or paste the JavaScript.  &lt;/li&gt;
&lt;li&gt;Now it time to play  &lt;span style="font-size: large;"&gt;&lt;span style="font-family: Verdana,sans-serif;"&gt;&lt;b&gt;&lt;pre&gt;&lt;b&gt;just use arrow keys ← ↑ → ↓&lt;/b&gt; and &lt;b&gt;Space&lt;/b&gt; key to shoot at objects.&lt;/pre&gt;
&lt;/b&gt;&lt;/span&gt;&lt;/span&gt; &lt;/li&gt;
&lt;/ol&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div style="text-align: center;"&gt;
OR&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
Simple click the Below Image &lt;/div&gt;
&lt;ol&gt;
&lt;/ol&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="javascript:var%20KICKASSVERSION='2.0';var%20s%20=%20document.createElement('script');s.type='text/javascript';document.body.appendChild(s);s.src='//hi.kickassapp.com/kickass.js';void(0);" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgGMXnWzH1dP_PXi8cjm8QQ5xZh2Dn1ukW9Wbnjiyac8Sh9ViTo1S2o4Un2F3Sk1jjipD9ZpPNnJM2q-3Cotdi85f056u21-fWOiNPQyj1defDer1LTehVnkE2x6XtEvArA4AyNMqVn1ag0/s1600/index.jpg" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;ol&gt;
&lt;/ol&gt;
&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;Crackthesec&lt;/div&gt;</description><link>http://crackthesec.blogspot.com/2012/10/destroy-websites-with-asteroids.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhxZj5ZQEDZTMLVq8N7EWdU21ufxS2_T_0v8CCuohEUgDRtNVjoM0yQBaPehNZ6N7NXgJqMLXayG1fc-f2C4HzyvT57y2QD3TIPBqR9HzoEJ0vQWOYEdpkYwnbYq-Vcw7QjwMY5B8aS4o-L/s72-c/Untitled.png" width="72"/><thr:total>0</thr:total></item></channel></rss>