<?xml version="1.0" encoding="UTF-8" standalone="no"?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:gd="http://schemas.google.com/g/2005" xmlns:georss="http://www.georss.org/georss" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-2385645531875778870</atom:id><lastBuildDate>Thu, 05 Sep 2024 00:42:26 +0000</lastBuildDate><category>Internet Tips</category><category>windows xp</category><category>maintainence tips</category><category>Funny tricks</category><category>Hackers</category><category>Shortcuts</category><category>Microsoft</category><category>Google secrets</category><category>Funny tricks.</category><category>Launguages</category><category>youtube</category><title>Da Decoders</title><description></description><link>http://dadecoders.blogspot.com/</link><managingEditor>noreply@blogger.com (naanicrazyboy)</managingEditor><generator>Blogger</generator><openSearch:totalResults>181</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><language>en-us</language><itunes:explicit>yes</itunes:explicit><itunes:keywords>hack,windows,xp,windows,vista,yahoo,google</itunes:keywords><itunes:subtitle/><itunes:owner><itunes:email>dadecoders@gmail.com</itunes:email></itunes:owner><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2385645531875778870.post-1433891764975893732</guid><pubDate>Sat, 10 May 2008 14:07:00 +0000</pubDate><atom:updated>2008-05-19T18:48:37.588+05:30</atom:updated><title>Make XP Look Like Vista</title><description>&lt;span style="color: rgb(255, 0, 0); font-family: georgia;"&gt;Introduction:&lt;/span&gt;&lt;br /&gt;Despite Windows Vista being out for a while now, not everyone is ready or willing to make the big "switch" just yet. Some people are waiting for the time to buy a new PC, some are not upgrading because their hardware isn't up to it, and some well.....just don't want to. Well there's nothing wrong with wanting to stick with XP for a while, but maybe you would like to change the "look" of XP to more of a Vista "style".&lt;br /&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;The interest in making Windows XP look like Vista has been going on for a while, but I get asked to this day what are the best ways to change the desktop to look more like Vista. Some want just the visual style changed, and some want the entire look and feel of their desktop changed to reflect Vista.&lt;br /&gt;In this article, we'll explain the quickest and safest way to change Windows XP to look more like Windows Vista.&lt;br /&gt;Changing the Visual Style&lt;br /&gt;For this you will need &lt;a href="http://www.stardock.com/products/windowblinds/"&gt;WindowBli&lt;/a&gt;&lt;a href="http://www.stardock.com/products/windowblinds/"&gt;nds 6&lt;/a&gt;. WindowBlinds 6 is available as a stand-alone application, or part of the &lt;a href="http://www.objectdesktop.com/"&gt;Object Desktop&lt;/a&gt; suite of desktop enhancements. WindowBlinds is the best and safest way to change the complete look of Windows, whether it's to make it look like Vista, or any one of the thousands of skins available.&lt;br /&gt;&lt;img id="BLOGGER_PHOTO_ID_5198752446441246290" style="margin: 0px auto 10px; display: block; text-align: center;" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhn95M7gYwwSyB00CusTQszt-zUrW4j1yHd1usSG6tduks7M6J3lSEEHK7AujGUh2ysu6V6jXxWN8Cg5YSp7EO_0EZPnsTKEnPkLuF9kbS6gLl_cem_wqiiCYsQTyk7ROjkYv7361TCtSBv/s200/1.bmp" border="0" /&gt;&lt;strong&gt;                                                            &lt;span style="color: rgb(0, 153, 0);"&gt;      &lt;span style="color: rgb(255, 204, 0);"&gt; &lt;span style="color: rgb(51, 51, 255);"&gt;WindowBlinds 6&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;WindowBlinds 6 adds &lt;a href="http://www.stardock.com/products/windowblinds/guide.asp"&gt;true glas&lt;/a&gt;&lt;a href="http://www.stardock.com/products/windowblinds/guide.asp"&gt;s effects&lt;/a&gt; including an optional blur which will give you the best results in your "transformation" from XP to Vista. It also has a "Vista-ize me" feature which sets the transparency and blurring to best resemble Windows Vista. Additionally, transparency is adjustable and you can set it to the desired levels yourself.&lt;br /&gt;&lt;img id="BLOGGER_PHOTO_ID_5198753503003201122" style="margin: 0px auto 10px; display: block; text-align: center;" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhGU1zMGn0vVSu1RSHGMPVHgQdpGh0sWFKnuanOM-CTmDFkOO6NfAtCn1hif1mas-PsiI-XfpeYdE7z2_iIToC-oq355ZVyQI99hvwNXsrXw9kK0SQNc5Bkbxp4BQYrqI5pj9AeDdv2ozkD/s200/2.bmp" border="0" /&gt;&lt;strong&gt;                                                                &lt;span style="color: rgb(51, 51, 255);"&gt;Vista-ize me" feature&lt;/span&gt;&lt;br /&gt;&lt;/strong&gt;There seems like a countless number of Vista skins are available for download, some even caught the attention of Microsoft and had to be removed. So for today's guide I am going to use a Vista skin that will give you the Vista "look" and takes advantage of WindowBlinds features. These are two of my personal favorites.&lt;br /&gt;&lt;a href="http://dadecoders.blogspot.com/"&gt;Arrow&lt;/a&gt;&lt;br /&gt;&lt;a href="http://flahorn.deviantart.com/art/Jadaero-1-4-56867320"&gt;Jadaero 1.4&lt;/a&gt;&lt;br /&gt;&lt;a href="http://v-xemnes.deviantart.com/art/Mimic-vista-V3-51688616"&gt;Mimic Vista v3&lt;/a&gt;&lt;br /&gt;There are many different variations of Vista-inspired skins available. You just need to take a browse through sites like &lt;a href="http://dadecoders.blogspot.com/"&gt;WinCustomize&lt;/a&gt; and find one that you like.&lt;br /&gt;&lt;span style="color: rgb(255, 0, 0);"&gt;Wallpapers&lt;/span&gt;&lt;br /&gt;Now that the visual style is done, lets find a nice wallpaper. While there is not a definitive wallpaper for Vista, I'm going to use one that is popular and goes with the Vista theme.&lt;br /&gt;&lt;a href="http://dadecoders.blogspot.com/"&gt;Vista Ultimate Series&lt;/a&gt;&lt;br /&gt;&lt;a href="http://dadecoders.blogspot.com/"&gt;Vista Suite Wallpaper pack&lt;/a&gt;&lt;br /&gt;&lt;a href="http://dadecoders.blogspot.com/"&gt;Vista Media&lt;/a&gt;&lt;br /&gt;&lt;a href="http://dadecoders.blogspot.com/"&gt;Vista Aurora Wallpaper Suite&lt;/a&gt; &lt;img id="BLOGGER_PHOTO_ID_5198755367019007602" style="margin: 0px auto 10px; display: block; text-align: center;" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjbjLJJXh6wLCzEUOQZhqvf2yuOIMMHYbzH1pvsDcldM6g23wLVIm1kXIl-z-kHk7jyDHW4Ix6wTRVXaKd-XwT7fGX3y-2xJVPLWZ1Aimszoz7AcHP9LbcdgB-oJQHho0V0kKju3tnWFjth/s200/3.jpg" border="0" /&gt;&lt;br /&gt;&lt;br /&gt;WindowBlinds has a built-in wallpaper changer that makes it easy to change your wallpaper, but you can also apply it like any other wallpaper. There is a huge gallery of wallpapers in the WinCustomize galleries, so you can browse there and find one that suits you best.&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 0, 0);"&gt;Changing the boot screen&lt;/span&gt;&lt;br /&gt;While Windows Vista doesn't have much of a bootskin that doesn't mean you can't use one. Using the &lt;a href="http://www.stardock.com/products/bootskin/"&gt;Bootskin&lt;/a&gt; (free) application you can change the boot screen in Windows XP. Here are a couple of my favorites to add to the Vista look, but you can find thousands more in the&lt;a href="http://www.wincustomize.com/skins.aspx?libid=32"&gt; Bootskin gallery&lt;/a&gt;.&lt;br /&gt;&lt;a href="http://www.wincustomize.com/skins.aspx?skinid=8012&amp;amp;libid=32"&gt;Vista Ultimate Boot&lt;/a&gt;&lt;br /&gt;&lt;a href="http://www.wincustomize.com/skins.aspx?skinid=9345&amp;amp;libid=32"&gt;Real Vista Boot&lt;/a&gt;&lt;br /&gt;&lt;a href="http://www.wincustomize.com/skins.aspx?skinid=8358&amp;amp;libid=32"&gt;Real Vista&lt;/a&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgypt63175zoq7uVpx9K2yV0dOG7g4AbCdwFuVdlvz4nrEC4CXh_3N4OaNq7Uo-vDRB0kzMXt2U0rVrwbdPp4U_gd-1nkL0WKBrMPz74OrXSQi2kYbkWuJ5tdyLTK7pZsu02jYfIPtFJdOo/s1600-h/1.png"&gt;&lt;img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 189px; height: 200px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgypt63175zoq7uVpx9K2yV0dOG7g4AbCdwFuVdlvz4nrEC4CXh_3N4OaNq7Uo-vDRB0kzMXt2U0rVrwbdPp4U_gd-1nkL0WKBrMPz74OrXSQi2kYbkWuJ5tdyLTK7pZsu02jYfIPtFJdOo/s200/1.png" alt="" id="BLOGGER_PHOTO_ID_5202073501783575058" border="0" /&gt;&lt;/a&gt;&lt;span style="font-weight: bold;"&gt;                                                    &lt;span style="color: rgb(51, 102, 255);"&gt;                                                                         Changing the Bootskin&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 0, 0);"&gt;Changing the logon screen&lt;/span&gt;&lt;br /&gt;Once you're past the boot screen you are probably facing a logon screen now, and that's just as easy to change as well. Download &lt;a href="http://www.stardock.com/products/logonstudio/"&gt;LogonStudio&lt;/a&gt; (free) for Windows XP, load up your favorite logon and your Vista transformation is one step closer to complete.&lt;br /&gt;After you install LogonStudio, it's simply a matter of choosing from the list of logons you downloaded, and clicking "apply". Here are some logons I recommend, or search for Vista logons &lt;a href="http://www.wincustomize.com/skins.aspx?libid=26&amp;amp;search=vista"&gt;here&lt;/a&gt;.&lt;br /&gt;&lt;a href="http://www.wincustomize.com/skins.aspx?skinid=6988&amp;amp;libid=26"&gt;Vista Reaction&lt;/a&gt;&lt;br /&gt;&lt;a href="http://www.wincustomize.com/skins.aspx?skinid=7274&amp;amp;libid=26"&gt;Simple Vista dx revisited&lt;/a&gt;&lt;br /&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgPVyco660XE2NoL2x_FZnW_yTwlQDlW-GaIpsEIB0awmrDPAbJL-taffu7TVgiFZ5CiYlMy0PbBW7DwzdyAWz3oWoIqEe0M0ISIhT33XZbQd-2u-rifcrUAK_YxlDJaXUD8RnhhoTmLnnL/s1600-h/2.png"&gt;&lt;img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgPVyco660XE2NoL2x_FZnW_yTwlQDlW-GaIpsEIB0awmrDPAbJL-taffu7TVgiFZ5CiYlMy0PbBW7DwzdyAWz3oWoIqEe0M0ISIhT33XZbQd-2u-rifcrUAK_YxlDJaXUD8RnhhoTmLnnL/s200/2.png" alt="" id="BLOGGER_PHOTO_ID_5202074214748146210" border="0" /&gt;&lt;/a&gt;&lt;span style="font-weight: bold;"&gt;                                                        &lt;span style="color: rgb(51, 102, 255);"&gt;Changing the Windows Logon&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 0, 0);"&gt;Changing the Icons&lt;/span&gt;&lt;br /&gt;&lt;a href="http://www.stardock.com/products/iconpackager/"&gt;IconPackager&lt;/a&gt; gives you ability to change nearly all your Windows icons at once, and it is also easy to create your own icon packs. This is a great solution as you won't have to worry about changing individual icons, and there are hundreds of other icon packs available. I had a hard time finding an icon package that was close to what Vista really is, so I used one that I liked and thought fit well anyways.&lt;br /&gt;&lt;a href="http://www.wincustomize.com/skins.aspx?skinid=1453&amp;amp;libid=2"&gt;Aero IconPackage&lt;/a&gt;&lt;br /&gt;&lt;a href="http://www.stardock.com/products/themes/apogee/?referer=WinCustomize"&gt;Apogee Icon Suite&lt;/a&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhf1KXrOcjwa9iBOI_jzTmshfQKQaH5d0dwwnIiMIUd9GVTAJs0h930vVmMfgY7u9VAvQz2ZHTL3DmTF_OnVWRWA4VW02OmN89WJ5bHuRkejGu8XKFlykiWngdduyuoXP6TYhXYp-KhPn2d/s1600-h/3.png"&gt;&lt;img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhf1KXrOcjwa9iBOI_jzTmshfQKQaH5d0dwwnIiMIUd9GVTAJs0h930vVmMfgY7u9VAvQz2ZHTL3DmTF_OnVWRWA4VW02OmN89WJ5bHuRkejGu8XKFlykiWngdduyuoXP6TYhXYp-KhPn2d/s200/3.png" alt="" id="BLOGGER_PHOTO_ID_5202075404454087218" border="0" /&gt;&lt;/a&gt;&lt;span style="font-weight: bold;"&gt;                                                                   &lt;span style="color: rgb(51, 102, 255);"&gt;                                                                 IconPackager&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 0, 0);"&gt;Adding a Sidebar&lt;/span&gt;&lt;br /&gt;Thanks to &lt;a href="http://www.stardock.com/products/desktopx/"&gt;DesktopX&lt;/a&gt;, adding your own Vista Sidebar is easy as a few clicks. One of my favorites is the Vista Sidebar by kennhk. He also makes some stand-alone widgets that fit perfectly with your Vista desktop also. Once you have DesktopX installed it's as simple as a couple of clicks and your sidebar will be up and running. It's also very easy to configure DesktopX objects to add or remove the components you want.&lt;br /&gt;&lt;a href="http://www.wincustomize.com/skins.aspx?skinid=4288&amp;amp;libid=3"&gt;Vista Sidebar&lt;/a&gt;&lt;br /&gt;Conclusion&lt;br /&gt;We have gone over the ways you can easily change your default Windows XP desktop into a Vista-like experience. The skins and themes I used for this guide are just a small sample of the many Vista inspired skins that are out there. You don't have to make it exactly like Vista, you are free to pick and choose skins and make your desktop as personalized as you want.&lt;br /&gt;This is the XP desktop that we have transformed into a great Vista looking desktop.&lt;br /&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVxB3VBCv0hYh0UmHqm9RGoJ72U5nPtmx8yyiPjiPyuQbB55fhKHMWqGaYhrMdAcx3cTUS12w7Y0RZhG1jZNP6dZrFr8DmE5lj6LFoydL2AmdXSNTNqp9Wp_1euN-jUbZwt64qBDnQmlXT/s1600-h/3.png"&gt;&lt;img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVxB3VBCv0hYh0UmHqm9RGoJ72U5nPtmx8yyiPjiPyuQbB55fhKHMWqGaYhrMdAcx3cTUS12w7Y0RZhG1jZNP6dZrFr8DmE5lj6LFoydL2AmdXSNTNqp9Wp_1euN-jUbZwt64qBDnQmlXT/s200/3.png" alt="" id="BLOGGER_PHOTO_ID_5202076014339443266" border="0" /&gt;&lt;/a&gt;&lt;span style="font-weight: bold;"&gt;                                            &lt;span style="color: rgb(153, 0, 0);"&gt;XP desktop now looks like Vista&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;If you need some more information on some of these programs work and how they change your desktop then I'd like to recommend reading the &lt;a href="http://www.wincustomize.com/articles.aspx?aid=148571"&gt;"Change Your Desktop Theme"&lt;/a&gt; articles. I would also recommend taking a look at &lt;a href="http://www.stardock.com/products/odnt/"&gt;Object Desktop&lt;/a&gt;, which includes many of the applications used to create our Vista desktop.&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description><link>http://dadecoders.blogspot.com/2008/05/despite-windows-vista-being-out-for.html</link><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhn95M7gYwwSyB00CusTQszt-zUrW4j1yHd1usSG6tduks7M6J3lSEEHK7AujGUh2ysu6V6jXxWN8Cg5YSp7EO_0EZPnsTKEnPkLuF9kbS6gLl_cem_wqiiCYsQTyk7ROjkYv7361TCtSBv/s72-c/1.bmp" width="72"/><thr:total>1</thr:total><author>dadecoders@gmail.com (naanicrazyboy)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2385645531875778870.post-1857587826402034817</guid><pubDate>Sat, 10 May 2008 08:26:00 +0000</pubDate><atom:updated>2008-12-25T11:38:50.864+05:30</atom:updated><title>REMOTE ACCESS METHOD</title><description>ust Control Another Computer Remotely.&lt;br /&gt;&lt;br /&gt;Things to Need&lt;br /&gt;Remote Pc's Account Username And &lt;a href="http://dadecoders.blogspot.com/2007/08/recover-lost-administrators-password-in.html"&gt;Password&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;-- Method --&gt;&lt;br /&gt;&lt;br /&gt;1. Go tO Command Prompt(press Windows+R and type cmd)&lt;br /&gt;2. type cd\ (to go to main root Of C:)&lt;br /&gt;3. type the command&lt;br /&gt;  c:\net use \\(Rempote PC's Username i.e Adrian)\ipc$ /u:Administrator&lt;br /&gt;  c:\net use \\Adrian\ipc$ /u:Administrator(press Enter)&lt;br /&gt;  (Results of the above Command)&lt;br /&gt;  The Password Or Username Is Invalid For \\Adrian\ipc$.&lt;br /&gt;  Enter The PassWord For "Administrator" tp connect to 'Adrian':*****&lt;br /&gt;  The Command COmpleted Successfuly.&lt;br /&gt;4. Press Window+R Write regedit To Enter RegsitryEditor.&lt;br /&gt;5. Press Alt+F Then C.&lt;br /&gt;6. Write Down The "Object's Name".Adrian(Computer's Username)then Press Enter.&lt;br /&gt;  (New Computer's Registry Is Successsfully Accessed).&lt;br /&gt;7. Just GO TO&lt;br /&gt;  Adrian\HKEY_LOCAL_MACHINE\SFTWARE\Microsoft\Windows\TelnetServer\1.0&lt;br /&gt;  On The Right Hand Double Click On The Key Named As "NTLM"(New BOx Appear)&lt;br /&gt;  Value Name:NTLM&lt;br /&gt;  Value Data:(Replace 2 with 0)&lt;br /&gt;  Base :HexaDecimal&lt;br /&gt;  Press OK.&lt;br /&gt;  Get Out Of registry Editor.&lt;br /&gt;8. Again Press Windows+R And Write mmc.(Consol1 Will Open)&lt;br /&gt;9. Press Alt+F then M(New Windows Will Appear)&lt;br /&gt;10.Press Alt+D Then Double Click On "Computer Management"&lt;br /&gt;11.Select "another Computer" and write its Account Login(Adrian).&lt;br /&gt;12.Press Finish And Then Close The "Add StandALone Snap-in"Dialogue Box.&lt;br /&gt;13.Now Press OK Of "Add/Remove Snap-in".&lt;br /&gt;14.On The Left Hand Expand Computer Management&gt;Select Services And    &lt;br /&gt;   Applications&gt;Services&lt;br /&gt;15.On The Right Hand Scroll down And Right CLick At "Telnet"And Select Restart &lt;br /&gt;   Option.&lt;br /&gt;16.Leave It As It is&lt;br /&gt;17.Turn To Command Promt Write&lt;br /&gt;  c:\telnet Adrian(Press Enter)&lt;br /&gt;  it Will Require Login And PassWord&lt;br /&gt;  Login:Administrator&lt;br /&gt;  PassWord:********(Enter)&lt;br /&gt; *-----------------------------------------------------------&lt;br /&gt; Welcome TO Microsoft Telnet SErver&lt;br /&gt; C:dir(Enter)&lt;br /&gt;&lt;br /&gt; Thats It!&lt;br /&gt;  Enjoy With DADECODERS!!!</description><link>http://dadecoders.blogspot.com/2008/05/remote-access-method.html</link><thr:total>0</thr:total><author>dadecoders@gmail.com (naanicrazyboy)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2385645531875778870.post-5807630300985147941</guid><pubDate>Sat, 10 May 2008 08:25:00 +0000</pubDate><atom:updated>2008-12-25T11:35:47.231+05:30</atom:updated><title>HACKING THROUGH YAHOO</title><description>&lt;span style="color: rgb(255, 0, 0);"&gt;Hack a Yahoo Account While Chatting:&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;This is only for education purpose. So who ever try this is at his risk.&lt;br /&gt;I am not sure that this will work 100 %. But yes will work almost 70 percent of the times.&lt;br /&gt;But before that you need to know some few things of yahoo chat protocol leave a comment here after u see the post lemme know if it does works or not or u having a problem..&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight:bold;"&gt;Following are the features :&lt;/span&gt; -&lt;br /&gt;1) When we chat on yahoo every thing goes through the server.Only when we chat thats messages.&lt;br /&gt;2) When we send files yahoo has two options &lt;br /&gt;  a) Either it uplo--- the file and then the other client has to down load it.&lt;br /&gt;  b) Either it connects to the client directly and gets the files&lt;br /&gt;3) When we use video or audio:-&lt;br /&gt;  a) It either goes thru the server.&lt;br /&gt;  b) Or it has client to client connection And when we have client to client                    connection the opponents &lt;a href="http://dadecoders.blogspot.com/2007/08/tracing-ip.html"&gt;IP&lt;/a&gt; is revealed.On the 5051 port.So how do we exploit the Chat user when he gets a direct connection. And how do we go about it.&lt;br /&gt;&lt;br /&gt;Remember i am here to &lt;a href="http://dadecoders.blogspot.com/search/label/Hackers"&gt;hack a system&lt;/a&gt; with out using a TOOL only by simple net commands and yahoo chat techniques. Thats what makes a difference between a real hacker and new bies. So lets ----ye&lt;br /&gt;&lt;br /&gt;1) Its impossible to get a Attackers IP address when you only chat.&lt;br /&gt;2) There are 50 % chances of getting a IP address when you send files&lt;br /&gt;3) Again 50 % chances of getting IP when you use video or audio.&lt;br /&gt;   So why to wait lets exploit those 50 % chances.&lt;br /&gt;&lt;br /&gt;I will explain only for files here which lies same for Video or audio&lt;br /&gt;&lt;span style="font-weight:bold;"&gt;1)&lt;/span&gt; Go to dostype -&gt;netstat -n 3 You will get the following output.&lt;br /&gt;Just do not care and be cool Active Connections&lt;br /&gt;&lt;br /&gt;Proto Local Address Foreign Address State TCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHEDTCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHEDTCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHEDTCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHED&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight:bold;"&gt;Active Connections&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Proto Local Address Foreign Address StateTCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHEDTCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHEDTCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHEDTCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHED.&lt;br /&gt;&lt;br /&gt;Just i will explain what the out put is in general.In left hand side is your IP address.And in right hand side is the IP address of the foreign machine.And the port to which is connected.Ok now so what next -&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight:bold;"&gt;2)&lt;/span&gt; Try sending a file to the Target .if the files comes from server.Thats the file is uploaded leave it You will not get the ip.But if a direct connection is established HMMMM then the first attacker first phase is over This is the output in your netstat.The 5101 number port is where the Attacker is connected.Active Connections&lt;br /&gt;Proto Local Address Foreign Address StateTCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHEDTCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHEDTCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHEDTCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHEDTCP 194.30.209.15:5101 194.30.209.14:3290 ESTABLISHED&lt;br /&gt;Thats what is highlighted in RED. So what next&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight:bold;"&gt;3)&lt;/span&gt; Hmmm Ok so make a &lt;a href="http://dadecoders.blogspot.com/2008/05/dos-hacking.html"&gt;DOS&lt;/a&gt; attack now Go to dos prompt and Just donbtstat -A Attackers IPaddress.Can happen that if system is not protected then you can see the whole network.C:\&gt;nbtstat -A 194.30.209.14&lt;br /&gt;Local Area Connection: Node IpAddress: [194.30.209.15] Scope Id: []&lt;br /&gt;Net BIOS Remote Machine Name Table&lt;br /&gt;Name Type Status---------------------------------------------EDP12 &lt;00&gt; UNIQUE RegisteredSHIV &lt;00&gt; GROUP RegisteredSHIV &lt;20&gt; UNIQUE RegisteredSHIVCOMP1 &lt;1e&gt; GROUP Registered&lt;br /&gt;MAC Address = 00-C0-W0-D5-EF-9A&lt;br /&gt;Ok so you will ask now what next.No you find what you can do with this network than me explaining everything.&lt;br /&gt;&lt;br /&gt;So the conclusion is never exchange files , video or audio till you know that the user with whom you are chatting is not going to harm you.</description><link>http://dadecoders.blogspot.com/2008/05/hacking-through-yahoo.html</link><thr:total>1</thr:total><author>dadecoders@gmail.com (naanicrazyboy)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2385645531875778870.post-5521549198472597661</guid><pubDate>Sat, 10 May 2008 08:25:00 +0000</pubDate><atom:updated>2008-12-25T11:25:48.731+05:30</atom:updated><title>HACKING DSL ROUTER</title><description>&lt;div class="post-body entry-content"&gt; &lt;p&gt;This tutorial will explain to you how to hack someone's internet account thru his router.This hack is based on a secuirty exploit of the router's default password and the stupidity of the user.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight:bold;"&gt;Explanation: &lt;/span&gt;when somebody buy's a xDSL/Cabel router, the router is set to manufactory defaults like &lt;a href="http://dadecoders.blogspot.com/2007/08/how-to-change-ip-in-less-than-minute.html"&gt;IP range&lt;/a&gt;, user accounts, router table, and most important the security level. The last one we will exploit.Most routers will have a user friendly setup menu running on port 23 (telnet) and sometimes port 80 (http) or both.This is what we are looking for.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight:bold;"&gt;Step 1.&lt;/span&gt;&lt;br /&gt;Get a multie IP range scanner like superscanner (superscanner is fast and easy to use, get it here).Get a xDSL/Cabel user IP range.&lt;br /&gt;This is a single user IP 212.129.169.196 so the ip range of this Internet provider is 212.129.xxx.xxx most likely it will be from 212.129.1.1 to 212.129.255.255 .&lt;br /&gt;To keep your scanning range not to big it's smart to scan from 212.129.1.1 to 212.129.1.255 it also depends of your bandwidth how fast the scan will be finished.The &lt;a href="http://dadecoders.blogspot.com/2007/08/how-to-change-ip-in-less-than-minute.html"&gt;IP adres&lt;/a&gt; above is just a example any IP range from a xDSL/Cabel provider can be used for this hack.&lt;br /&gt;before you start scanning specify the TCP/IP ports. You know that we are looking for TCP port 23 (telnet) and TCP port 80 (http) so edit the list and select only port 23 and port 80.Now start scanning and wait for the results.When finished scanning look for a IP that has a open port 23 and 80. Write them down or remember them.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight:bold;"&gt;Step 2.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight:bold;"&gt;Way 1&lt;/span&gt;&lt;br /&gt;This is important: Most routers have connection log capability so the last thing you want to do is making a connection with your own &lt;a href="http://dadecoders.blogspot.com/2007/08/hack-your-broadband-dudes.html"&gt;broadband &lt;/a&gt;connection so use a anonymouse proxy server or dailup connection with a fake name and address (56.9 modem for example) when connection to the victim's router.&lt;br /&gt;Now get a telnet program. Windows has a standard telnet program just go to start, select run and type down "telnet" without the ", click or enter OK.Select "connect" than "Remote system" enter IP adres of the victim in the "host name" field press OK.&lt;br /&gt;wait for your computer to make a connection. This way only works when the router has a open telnet port service running.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight:bold;"&gt;Way 2&lt;/span&gt;&lt;br /&gt;This is important: Most routers have connection log capability so the last thing you want to do is making a connection with your own broadband connection so use a anonymouse proxy server or dailup connection with a fake name and adres (56.9 modem for example) when connection to the victim's router.Open a Internet explorer windows enter the IP address of the victim after the http:// in the address bar.This way only works when the router has a open hyper text transfer protocol (http) service running.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight:bold;"&gt;Step 3&lt;/span&gt;&lt;br /&gt;Entering the userfriendly setup menu. 9 out of 10 times the menu is protected by a loginname and password. When the user doesn't change any security value's the default password stay's usable.So the only thing you have to do is find out what type of router the victim uses. I use this tool: GFILanguard Network Security Scanner. (get it here) is good. When you find out the type of router that's been used get the wright login name and password from this list (get it here. not every router is on the list)&lt;br /&gt;&lt;a href="http://dadecoders.blogspot.com/2007/08/xdsl-cabel-router-hacking.html"&gt;Default router password&lt;/a&gt; list&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight:bold;"&gt;Step 4&lt;/span&gt;&lt;br /&gt;When you have a connection in telnet or internet expolorer you need to look for user accounts.PPP, PPtP, PPeP, PPoP, or such connection protocol. If this is not correct look for anything that maybe contains any info about the ISP account of the user.go to this option and open it. Most likely you will see a overview of user setup options.Now look for the username and password.In most case the username will be freely displayed so just write it down or what ever....The password is a different story. Allmost always the password is protected by ********* (stars) in the telnet way there is noway around it (goto another victim) but when you have a port 80 connection (http). Internet connection way open click right mouse key and select "View source" now look for the field where the star are at. most likely you can read it because in the source code the star are converted to normal ASCII text.If not get a "******** to text" convertor like snadboy's revelation V.2 (get it here) move the cursor over the ****** and....It's a miracle you can read the password.Now you have the username and password. There a million fun thing to do with that but more about that next time.check the tutorial page frequently.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-style:italic;"&gt;Tips.&lt;/span&gt;&lt;br /&gt;Beware on most routers only one person can be &lt;a href="http://dadecoders.blogspot.com/2007/08/xdsl-cabel-router-hacking.html"&gt;loget&lt;/a&gt; on simultaneous in the router setupmenu.Don't change anything in the router if you don't know what you are doing.&lt;/p&gt;  &lt;/div&gt;</description><link>http://dadecoders.blogspot.com/2008/05/hacking-dsl-router.html</link><thr:total>2</thr:total><author>dadecoders@gmail.com (naanicrazyboy)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2385645531875778870.post-5723314884841100527</guid><pubDate>Sat, 10 May 2008 08:23:00 +0000</pubDate><atom:updated>2008-05-10T13:54:53.696+05:30</atom:updated><title>DOS HACKING</title><description>&lt;p&gt;******************************************************&lt;br /&gt;In this Guide you will learn how to: * Use telnet from Windows * Download web pages via telnet * Get finger information via telnet * Telnet from the DOS command-line * Use netcat * Break into Windows Computers from the Internet Protecting Yourself What can they do The command-line approach The GUI approach Final Words ************************************************************&lt;br /&gt;How to Use Telnet on a Windows Computer Telnet is great little program for doing a couple of interesting things. In fact, if you want to call yourself a hacker, you absolutely MUST be able to telnet! In this lesson you will find out a few of the cool things a hacker can do with telnet. If you are using Win95, you can find telnet in the c:\windows directory, and on NT, in the c:\winnt\system32 directory. There isn't a lot of online help concerning the usage of the program, so my goal is to provide some information for new users. First off, telnet isn't so much an application as it is a protocol. Telnet is protocol that runs over TCP/IP, and was used for connecting to remote computers. It provides a login interface, and you can run command-line programs by typing the commands on your keyboard, and the programs use the resources of the remote machine. The results are displayed in the terminal window on your machine, but the memory and CPU cycles consumed by the program are located on the remote machine. Therefore, telnet functions as a terminal emulation program, emulating a terminal on the remote machine. Now, telnet runs on your Win95 box as a GUI application...that is to say that you can type "telnet" at the command prompt (in Windows 95 this is the MS-DOS prompt), and assuming that your PATH is set correctly, a window titled "telnet" will open. This differs from your ftp program in that all commands are entered in the DOS window. Let's begin by opening telnet. Simply open a DOS window by clicking "start", then "programs", then "MS-DOS", and at the command prompt, type: c:\telnet The window for telnet will open, and you can browse the features of the program from the menu bar. ***************************************************&lt;br /&gt;NEWBIE NOTE: In this text file, I am referring only to the telnet program that ships with Win95/NT. If you type "telnet" at the command prompt and you don't get the telnet window, make sure that the program is on your hard drive using the Start -&gt; Find -&gt; Files or Folders command. Also make sure that your path statement includes the Windows directory. There are many other programs available that provide similar functionality, with a lot of other bells and whistles, from any number of software sites. *************************************************&lt;br /&gt;To learn a bit more about telnet, choose Help -&gt; Contents, or Help -&gt; Search for help on... from the menu bar. Read through the files in order to find more detailed explanations of things you may wish to do. For example, in this explanation, I will primarily be covering how to use the application and what it can be used for, but now how to customize the colors for the application. Now, if you choose Connect -&gt; Remote System, you will be presented with a dialog window that will ask you for the remote host, the port and the terminal type. ****************************************************&lt;br /&gt;NEWBIE NOTE: For most purposes, you can leave the terminal type on VT100. ****************************************************&lt;br /&gt;In the Connect dialog box, you can enter in the host to which you wish to connect, and there is a list box of several ports you can connect to: daytime: May give you the current time on the server. echo: May echo back whatever you type in, and will tell you that the computer you have connected to is alive nd running on the Internet. qotd: May provide you with a quote of the day. chargen: May display a continuous stream of characters, useful for spotting network problems, but may crash your telnet program. telnet: May present you with a login screen. These will only work if the server to which you are trying to connect is running these services. However, you are not limited to just those ports...you can type in any port number you wish. (For more on fun ports, see the GTMHH, "Port Surf's Up.") You will only successfully connect to the port if the service in question is available. What occurs after you connect depends upon the protocol for that particular service. When you are using telnet to connect to the telnet service on a server, you will (in most cases) be presented with a banner and a login prompt. [Note from Carolyn Meinel: Many people have written saying their telnet program fails to connect no matter what host they try to reach. Here's a way to fix your problem. First -- make sure you are already connected to the Internet. If your telnet program still cannot connect to anything, here's how to fix your problem. Click "start" then "settings" then "control panel." Then click "Internet" then "connection." This screen will have two boxes that may or may not be checked. The top one says "connect to the Internet as needed." If that box is checked, uncheck it -- but only uncheck it if you already have been having problems connecting. The bottom box says "connect through a proxy server." If that box is checked, you probably are on a local area network and your systems administrator doesn't allow you to use telnet.] *********************************************&lt;br /&gt;NEWBIE NOTE: It's not a good idea to connect to a host on which you don't have a valid account. In your attempts to guess a username and password, all you will do is fill the log files on that host. From there, you can very easily be traced, and your online service provider will probably cancel your account.&lt;br /&gt;**********************************************&lt;br /&gt;Now, you can also use telnet to connect to other ports, such as ftp (21), smtp (25), pop3 (110), and even http (80). When you connect to ftp, smtp, and pop3, you will be presented with a banner, or a line of text that displays some information about the service. This will give you a clue as to the operating system running on the host computer, or it may come right out and tell you what the operating system is...for instance, AIX, Linux, Solaris, or NT. If you successfully connect to port 80, you will see a blank screen. This indicates, again, that you have successfully completed the TCP negotiation and you have a connection. Now, what you do from there is up to you. You can simply disconnect with the knowledge that, yes, there is a service running on port 80, or you can use your knowledge of the HTTP protocol to retrieve the HTML source for web pages on the server. How to Download Web Pages Via Telnet To retrieve a web page for a server using telnet, you need to connect to that server on port 80, generally. Some servers may use a different port number, such as 8080, but most web servers run on port 80. The first thing you need to do is click on Terminal -&gt; Preferences and make sure that there is a check in the Local Echo box. Then, since most web pages will generally take up more than a single screen, enable logging by clicking Terminal -&gt; Start Logging... and select a location and filename. Keep in mind that as long as logging is on, and the same file is being logged to, all new information will be appended to the file, rather than overwriting the original file. This is useful if you want to record several sessions, and edit out the extraneous information using Notepad. Now, connect the remote host, and if your connection is successful, type in: GET / HTTP/1.0 and hit enter twice. **************************************************&lt;br /&gt;NEWBIE NOTE: Make sure that you hit enter twice...this is part of the HTTP protocol. The single / after GET tells the server to return the default index file, which is generally "index.html". However, you can enter other filenames, as well. *************************************************&lt;br /&gt;You should have seen a bunch of text scroll by on the screen. Now you can open the log file in Notepad, and you will see the HTML code for the page, just as though you had chosen the View Source option from your web browser. You will also get some additional information...the headers for the file will contain some information about the server. For example: HTTP/1.0 200 Document follows Date: Thu, 04 Jun 1998 14:46:46 GMT Server: NCSA/1.5.2 Last-modified: Thu, 19 Feb 1998 17:44:13 GMT Content-type: text/html Content-length: 3196 One particularly interesting piece of information is the server name. This refers to the web server software that is running and serving web pages. You may see other names in this field, such as versions of Microsoft IIS, Purveyor, WebSite, etc. This will give you a clue as to the underlying operating system running on the server.&lt;br /&gt;************************************************* SYSADMIN NOTE: This technique, used in conjunction with a database of exploits on web servers, can be particularly annoying. Make sure you keep up on exploits and the appropriate security patches from your web server and operating system vendors.&lt;br /&gt;*************************************************&lt;br /&gt;*************************************************&lt;br /&gt;NEWBIE NOTE: This technique of gathering web pages is perfectly legal. You aren't attempting to compromise the target system, you are simply doing by hand what your web browser does for you automatically. Of course, this technique will not load images and Java applets for you. ************************************************&lt;br /&gt;Getting Finger Information Via Telnet By now, you've probably heard or read a lot about finger. It doesn't seem like a very useful service, and many sysadmins disable the service because it provides information on a particular user, information an evil hacker can take advantage of. Win95 doesn't ship with a finger client, but NT does. You can download finger clients for Win95 from any number of software sites. But why do that when you have a readily available client in telnet? The finger daemon or server runs on port 79, so connect to a remote host on that port. If the service is running, you will be presented with a blank screen. ****************************************************&lt;br /&gt;NEWBIE NOTE: NT doesn't ship with a finger daemon (A daemon is a program on the remote computer which waits for people like you to connect to it), so generally speaking, and server that you find running finger will be a Unix box. I say "generally" because there are third-party finger daemons available and someone may want to run one on their NT computer. ****************************************************&lt;br /&gt;The blank screen indicates that the finger daemon is waiting for input. If you have a particular user that you are interested in, type in the username and hit enter. A response will be provided, and the daemon will disconnect the client. If you don't know a particular username, you can start by simply hitting enter. In some cases, you may get a response such as "No one logged on." Or you may get information of all currently logged on users. It all depends on whether or not the sysadmin has chosen to enable certain features of the daemon. You can also try other names, such as "root", "daemon", "ftp", "bin", etc. Another neat trick to try out is something that I have seen referred to as "finger forwarding". To try this out, you need two hosts that run finger. Connect to the first host, host1.com, and enter the username that you are interested in. Then go to the second host, and enter: &lt;a href="mailto:user@host1.com"&gt;user@host1.com&lt;/a&gt; You should see the same information! Again, this all depends upon the configuration of the finger daemon. Using Telnet from the Command Line Now, if you want to show your friends that you a "real man" because "real men don't need no stinkin' GUIs", well just open up a DOS window and type: c:\&gt;telnet and the program will automatically attempt to connect to the host on the designated port for you. Using Netcat Let me start by giving a mighty big thanks to Weld Pond from L0pht for producing the netcat program for Windows NT. To get a copy of this program, which comes with source code, simply go to: &lt;a href="http://www.l0pht.com/%7Eweld"&gt;http://www.l0pht.com/~weld&lt;/a&gt; NOTE: The first character of "l0pht: is the letter "l". The second character is a zero, not an "o". I know that the program is supposed to run on NT, but I have seen it run on Win95. It's a great little program that can be used to do some of the same things as telnet. However, there are advantages to using netcat...for one, it's a command-line program, and it can be included in a batch file. In fact, you can automate multiple calls to netcat in a batch file, saving the results to a text file.&lt;br /&gt;**************************************************&lt;br /&gt;NOTE: For more information on batch files, see previous versions of the Guide To (mostly) Harmless Hacking, Getting Serious with Windows series ...one of them dealt with basic batch file programming.&lt;br /&gt;**************************************************&lt;br /&gt;Before using netcat, take a look at the readme.txt file provided in the zipped archive you downloaded. It goes over the instructions on how to download web pages using netcat, similar to what I described earlier using telnet. There are two ways to go about getting finger information using netcat. The first is in interactive mode. Simply type: c:\&gt;nc 79 If the daemon is running, you won't get a command prompt back. If this is the case, type in the username and hit enter. Or use the automatic mode by first creating a text file containing the username of interest. For example, I typed: c:\&gt;edit root and entered the username "root", without the quotes. Then from the command prompt, type: c:\&gt;nc 79 &lt;&gt;nc 79 &lt;&gt; nc.log to create the file nc.log, or: c:\&gt;nc 79 &lt;&gt;&gt; nc.log to append the response to the end of nc.log. NOTE: Make sure that you use spaces between the redirection operators.&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;host&gt;&lt;port&gt;&lt;host&gt;&lt;host&gt;&lt;host&gt;&lt;host&gt;How to Break into a Windows 95 machine Connected to the Internet Disclaimer The intent of this file is NOT to provide a step-by-step guide to accessing a Win95 computer while it is connected to the Internet. The intent is show you how to protect yourself. There are no special tools needed to access a remote Win95 machine...everything you need is right there on your Win95 system! Two methods will be described...the command-line approach and the GUI approach. Protecting Yourself First, the method of protecting yourself needs to be made perfectly clear. DON'T SHARE FILES!! I can't stress that enough. If you are a home user, and you are connecting a Win95 computer to the Internet via some dial-up method, disable sharing. If you must share, use a strong password...8 characters minimum, a mix of upper and lower case letters and numbers, change the password every now and again. If you need to transmit the password to someone, do so over the phone or by written letter. To disable sharing, click on My Computer -&gt; Control Panel -&gt; Network -&gt; File and Print Sharing. In the dialog box that appears, uncheck both boxes. It's that easy. What Can They Do? What can someone do? Well, lots of stuff, but it largely depends on what shares are available. If someone is able to share a printer from your machine, they can send you annoying letters and messages. This consumes time, your printer ink/toner, and your paper. If they are able to share a disk share, what they can do largely depends upon what's in that share. The share appears as another directory on the attacker's machine, so any programs they run will be consuming their own resources...memory, cpu cycles, etc. But if the attacker has read and write access to those disk shares, then you're in trouble. If you take work home, your files may be vulnerable. Initialization and configuration files can be searched for passwords. Files can be modified and deleted. A particularly nasty thing to do is adding a line to your autoexec.bat file so that the next time your computer is booted, the hard drive is formatted without any prompting from the user. Bad ju-ju, indeed. ** The command-line approach ** Okay, now for the part that should probably be titled "How they do it". All that is needed is the IP address of the remote machine. Now open up a DOS window, and at the command prompt, type: c:\&gt;nbtstat -A [ip_addr] If the remote machine is connected to the Internet and the ports used for sharing are not blocked, you should see something like: NetBIOS Remote Machine Name Table Name Type Status --------------------------------------------- NAME &lt;00&gt; UNIQUE Registered DOMAIN &lt;00&gt; GROUP Registered NAME &lt;03&gt; UNIQUE Registered USERNAME &lt;03&gt; UNIQUE Registered MAC Address = 00-00-00-00-00-00 This machine name table shows the machine and domain names, a logged-on username, and the address of the Ethernet adapter (the information has been obfuscated for instructional purposes). **Note: This machine, if unpatched and not protected with a firewall or packet-filter router, may be vulnerable to a range of denial of service attacks, which seem to be fairly popular, largely because they require no skill or knowledge to perpetrate. The key piece of information that you are looking for is in the Type column. A machine that has sharing enabled will have a hex code of "&lt;20&gt;". **Note: With the right tools, it is fairly simple for a sysadmin to write a batch file that combs a subnet or her entire network, looking for client machines with sharing enabled. This batch file can then be run at specific times...every day at 2:00 am, only on Friday evenings or weekends, etc. If you find a machine with sharing enabled, the next thing to do is type the following command: c:\&gt;net view &lt;a href="file://%5bip_addr/"&gt;\\[ip_addr&lt;/a&gt;] Now, your response may be varied. You may find that there are no shares on the list, or that there are several shares available. Choose which share you would like to connect to, and type the command: c:\&gt;net use g: &lt;a href="file:////%5Bip_addr%5D/%5Bshare_name"&gt;\\[ip_addr]\[share_name&lt;/a&gt;] You will likely get a response that the command was completed successfully. If that is the case, type: c:\&gt;cd g: or which ever device name you decided to use. You can now view what exists on that share using the dir commands, etc. Now, you may be presented with a password prompt when you ssue the above command. If that is the case, typical "hacker" (I shudder at that term) methods may be used. ** The GUI approach ** After issuing the nbtstat command, you can opt for the GUI approach to accessing the shares on that machine. To do so, make sure that you leave the DOS window open, or minimized...don't close it. Now, use Notepad to open this file: c:\windows\lmhosts.sam Read over the file, and then open create another file in Notepad, called simply "Lmhosts", without an extension. The file should contain the IP address of the host, the NetBIOS name of the host (from the nbtstat command), and #PRE, separated by tabs. Once you have added this information, save it, and minimize the window. In the DOS command window, type: c:\&gt;nbtstat -R This command reloads the cache from the Lmhosts file you just created. Now, click on Start -&gt; Find -&gt; Computer, and type in the NetBIOS name of the computer...the same one you added to the lmhosts file. If your attempt to connect to the machine is successful, you should be presented with a window containing the available shares. You may be presented with a password prompt window, but again, typical "hacker" (again, that term grates on me like fingernails on a chalk board, but today, it seems that it's all folks understand) techniques may be used to break the password.&lt;br /&gt;&lt;/host&gt;&lt;/host&gt;&lt;/host&gt;&lt;/host&gt;&lt;/port&gt;&lt;/host&gt;&lt;/p&gt;&lt;p&gt;&lt;host&gt;&lt;port&gt;&lt;host&gt;&lt;host&gt;&lt;host&gt;&lt;host&gt;************************************************&lt;br /&gt;&lt;/host&gt;&lt;/host&gt;&lt;/host&gt;&lt;/host&gt;&lt;/port&gt;&lt;/host&gt;&lt;/p&gt;&lt;p&gt;&lt;host&gt;&lt;port&gt;&lt;host&gt;&lt;host&gt;&lt;host&gt;&lt;host&gt;Note from Carolyn Meinel: Want to try this stuff without winding up in jail or getting expelled from school? Get a friend to give you permission to try to break in. First, you will need his or her IP address. Usually this will be different every time your friend logs on. You friend can learn his or her IP address by going to the DOS prompt while online and giving the command "netstat -r". Something like this should show up: C:\WINDOWS&gt;netstat -r Route Table Active Routes: Network Address Netmask Gateway Address Interface Metric 0.0.0.0 0.0.0.0 198.999.176.84 198.999.176.84 1 127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1 198.999.176.0 255.255.255.0 198.999.176.84 198.999.176.84 1 198.999.176.84 255.255.255.255 127.0.0.1 127.0.0.1 1 198.999.176.255 255.255.255.255 198.999.176.84 198.999.176.84 1 224.0.0.0 224.0.0.0 198.999.176.84 198.999.176.84 1 255.255.255.255 255.255.255.255 198.999.176.84 0.0.0.0 1 Your friend's IP address should be under "Gateway Address." Ignore the 127.0.0.1 as this will show up for everyone and simply means "locahost" or "my own computer." If in doubt, break the Internet connection and then get online again. The number that changes is the IP address of your friend's computer.&lt;br /&gt;&lt;/host&gt;&lt;/host&gt;&lt;/host&gt;&lt;/host&gt;&lt;/port&gt;&lt;/host&gt;&lt;/p&gt;&lt;p&gt;&lt;host&gt;&lt;port&gt;&lt;host&gt;&lt;host&gt;&lt;host&gt;&lt;host&gt;&lt;br /&gt;&lt;/host&gt;&lt;/host&gt;&lt;/host&gt;&lt;/host&gt;&lt;/port&gt;&lt;/host&gt;&lt;/p&gt;&lt;p&gt;&lt;host&gt;&lt;port&gt;&lt;host&gt;&lt;host&gt;&lt;host&gt;&lt;host&gt;***************************************************&lt;/host&gt;&lt;/host&gt;&lt;/host&gt;&lt;/host&gt;&lt;/port&gt;&lt;/host&gt;&lt;/p&gt;&lt;p&gt;&lt;host&gt;&lt;port&gt;&lt;host&gt;&lt;host&gt;&lt;host&gt;&lt;host&gt; **************************************************&lt;/host&gt;&lt;/host&gt;&lt;/host&gt;&lt;/host&gt;&lt;/port&gt;&lt;/host&gt;&lt;/p&gt;&lt;p&gt;&lt;host&gt;&lt;port&gt;&lt;host&gt;&lt;host&gt;&lt;host&gt;&lt;host&gt; Evil Genius tip: Here is something really scary. In your shell account give the "netstat" command. If your ISP allows you to use it, you might be able to get the dynamically assigned IP addresses of people from all over the world -- everyone who is browsing a Web site hosted by your ISP, everyone using ftp, spammers you might catch red-handed in the act of forging email on your ISP, guys up at 2AM playing on multiuser dungeons, IRC users, in fact you will see everyone who is connected to your ISP! **************************************************** ***************************************************&lt;br /&gt;&lt;/host&gt;&lt;/host&gt;&lt;/host&gt;&lt;/host&gt;&lt;/port&gt;&lt;/host&gt;&lt;/p&gt;&lt;p&gt;&lt;host&gt;&lt;port&gt;&lt;host&gt;&lt;host&gt;&lt;host&gt;&lt;host&gt;YOU CAN GO TO JAIL WARNING: If you find a Windows 95 box on the Internet with file sharing enabled and no password protection, you can still get in big trouble for exploiting it. It's just like finding a house whose owner forgot to lock the door -- you still are in trouble if someone catches you inside. Tell temptation to take a hike! ************************************************&lt;br /&gt;&lt;/host&gt;&lt;/host&gt;&lt;/host&gt;&lt;/host&gt;&lt;/port&gt;&lt;/host&gt;&lt;/p&gt;&lt;p&gt;&lt;host&gt;&lt;port&gt;&lt;host&gt;&lt;host&gt;&lt;host&gt;&lt;host&gt;Final Words Please remember that this Guide is for instructional purposes only and is meant to educate the sysadmin and user alike. If someone uses this information to gain access to a system which they have no permission or business messing with, I (keydet) cannot be responsible for the outcome. If you are intending to try this information out, do so with the consent and permission of a friend. If there are questions, comments or any doubts then feel free to ask me heregreetz,&lt;/host&gt;&lt;/host&gt;&lt;/host&gt;&lt;/host&gt;&lt;/port&gt;&lt;/host&gt;&lt;/p&gt;</description><link>http://dadecoders.blogspot.com/2008/05/dos-hacking.html</link><thr:total>0</thr:total><author>dadecoders@gmail.com (naanicrazyboy)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2385645531875778870.post-5801465858759582490</guid><pubDate>Fri, 09 May 2008 15:09:00 +0000</pubDate><atom:updated>2008-12-25T11:16:25.886+05:30</atom:updated><title>Change STARTUP and SHUTDOWN sounds in XP</title><description>Have you ever felt bugged-up with the Start-up and Shutdown jingle of your Windows XP or Vista ? If yes, here is the solution, now you use any of your favorite voice or music or dialogue as your PC’s shutdown and start up.&lt;br /&gt;&lt;br /&gt;It’s a simple 4 step process.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight:bold;"&gt;Step 1.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;    Choose the track which you want to play at start-up and &lt;a href="http://dadecoders.blogspot.com/2008/05/restrict-pc-shutdown.html"&gt;shutdown jingles&lt;/a&gt;,&lt;br /&gt;    Limitations are&lt;br /&gt;  * It should be in .WAV format.&lt;br /&gt;  * The size of file should not be large, prefer keeping them within in 1 Mb, &lt;br /&gt;     otherwise your   startup will take a bit longer.&lt;br /&gt;&lt;br /&gt;   If the file you want to make your start-up or shutdown is not in .WAV format,&lt;br /&gt;   you can easily convert them using Jet Audio 7, or any other converter.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight:bold;"&gt;Step 2.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;  Now rename these files as “Windows XP Startup.WAV” and “Windows XP Shutdown.WAV” respectively.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight:bold;"&gt;Step 3.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;   Now Go to “C:\WINDOWS\MEDIA”, here you will find files “Windows XP Startup.WAV”&lt;br /&gt;   and “Windows XP Shutdown.WAV”, move them to some other locations,&lt;br /&gt;    this step is required for, in case you need to revert back these sounds,&lt;br /&gt;      else you can ignore this step.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight:bold;"&gt;Step 4.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;    Now the files you have chosen and renamed,&lt;br /&gt;      just copy-paste or cut paste them in &lt;br /&gt;    “C:\WINDOWS\MEDIA”, here you go,&lt;br /&gt;    now you can enjoy the new Start-up and shutdown.</description><link>http://dadecoders.blogspot.com/2008/05/change-startup-and-shutdown-sounds-in.html</link><thr:total>0</thr:total><author>dadecoders@gmail.com (naanicrazyboy)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2385645531875778870.post-3533035078197818019</guid><pubDate>Fri, 09 May 2008 15:07:00 +0000</pubDate><atom:updated>2008-12-25T11:10:37.407+05:30</atom:updated><title>Restrict PC Shutdown</title><description>Both Vista and Windows XP let you take control of preventing a user not to &lt;a href="http://dadecoders.blogspot.com/2007/09/remov-shutdown-button.html"&gt;shutdown&lt;/a&gt; the machine by editing the group policy.&lt;br /&gt;For example if your friend is using your computer and you went somewhere ( and you have still some unsaved document left) and he shutdowns the pc without saving them…you loose a good amount of data.&lt;br /&gt;( Trust me I have lost one whole blog post and project code at same time ).&lt;br /&gt;This is what you can do&lt;br /&gt;&lt;br /&gt;Restrict PC Shutdown&lt;br /&gt;&lt;br /&gt;* Type gpedit.msc in run dialog box [ WIN KEY + R ]&lt;br /&gt;&lt;br /&gt;* This will open Group Policy Editor. Now there are two things in it,&lt;br /&gt;    Computer Configuration and User Configuration&lt;br /&gt;&lt;br /&gt;* Click on User Configuration &gt; Administrative Templates &gt; Start Menu and Task Bar&lt;br /&gt;&lt;br /&gt;* Now look for “remove and prevent access to shutdown command”&lt;br /&gt;&lt;br /&gt;* Double Click and Enable it.&lt;br /&gt;&lt;br /&gt;* Exit the group policy editor.This setting &lt;a href="http://dadecoders.blogspot.com/2007/09/remov-shutdown-button.html"&gt;removes the Shut Down&lt;/a&gt; option from the Start menu and disables the Shut Down button on the Windows Security dialog box, which appears when you press CTRL+ALT+DEL.&lt;br /&gt;&lt;br /&gt;               This setting prevents users from using the Windows user interface to shut down the system.&lt;br /&gt;  Now if you try to shutdown by clicking on start , the shutdown button must have disappeared. Moreover check the task manager and you will find all shutdown,restart and others disabled except switch user.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(255, 0, 0);"&gt;SO YOU WILL NEVER LOOSE YOUR DATA.&lt;/span&gt;</description><link>http://dadecoders.blogspot.com/2008/05/restrict-pc-shutdown.html</link><thr:total>0</thr:total><author>dadecoders@gmail.com (naanicrazyboy)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2385645531875778870.post-6605203225548633770</guid><pubDate>Fri, 09 May 2008 15:05:00 +0000</pubDate><atom:updated>2008-12-25T11:08:36.949+05:30</atom:updated><title>Add Safe Mode in Boot list</title><description>&lt;p&gt;Safe mode is required when you have to fix a problem such as virus infection or uninstalling drivers in your &lt;a href="http://dadecoders.blogspot.com/search/label/windows%20xp"&gt;windows XP&lt;/a&gt;. generally we need to use F8 Key to get into safe mode and if not timed properly you will need to restart windows xp again. &lt;/p&gt;&lt;p&gt;       Here is a small trick which lets you add Safe mode by default into your Boot list. You will see it when you restart your windows xp machine.&lt;/p&gt;&lt;p&gt;   Steps to Add Safe Mode in Boot list&lt;/p&gt;&lt;p&gt;* Go to control panel &gt; System.&lt;/p&gt;&lt;p&gt;* Click on Advanced Tab.&lt;/p&gt;&lt;p&gt;* Then click on settings under the startup and recovery action.&lt;/p&gt;&lt;p&gt;* Click on edit under system startup to indirectly edit your boot.ini file.&lt;/p&gt;&lt;p&gt;* Add the following entry&lt;br /&gt;  “multi(0)disk(0)rdisk(0)partition(2)\WINDOWS=”XP - Safe Mode” /&lt;br /&gt;   fastdetect/ safeboot:minimal/sos/bootlog” without quotes .&lt;/p&gt;&lt;p&gt;   Add safe mode to your boot listThats it, restart your machine and you will see another label as “XP- Safe Mode” added to the list.PS: This option is also used for adding any other windows installation on other partition.&lt;/p&gt;</description><link>http://dadecoders.blogspot.com/2008/05/add-safe-mode-in-boot-list.html</link><thr:total>1</thr:total><author>dadecoders@gmail.com (naanicrazyboy)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2385645531875778870.post-3736773119071221230</guid><pubDate>Fri, 09 May 2008 15:02:00 +0000</pubDate><atom:updated>2008-12-25T11:05:43.140+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Funny tricks.</category><category domain="http://www.blogger.com/atom/ns#">Hackers</category><category domain="http://www.blogger.com/atom/ns#">Microsoft</category><title>Hide ur drives and Lock ur drives</title><description>Open Registry (go to run command, type "regedit" and press enter)&lt;br /&gt;then go to this key&lt;br /&gt;&lt;span style="color:#330099;"&gt;HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Policies\Explorer&lt;/span&gt;&lt;br /&gt;now right click in right side pane and create DWORD Value (blue color)&lt;br /&gt;Rename it as "NoViewOnDrive" (for locking drive)&lt;br /&gt;          or&lt;br /&gt;Rename it as "NoDrives" (for Hiding drive)&lt;br /&gt;&lt;br /&gt;double click on it and put some numbers to lock ur desired Drive and click OK.&lt;br /&gt;DRIVE NOS.&lt;br /&gt;FOR A : 1&lt;br /&gt;FOR C : 4&lt;br /&gt;FOR D : 8&lt;br /&gt;FOR E : 16&lt;br /&gt;FOR F : 32&lt;br /&gt;FOR G : 64&lt;br /&gt;FOR H : 128&lt;br /&gt;finally restart or log-off the computer to take effect.&lt;br /&gt;Keep in mind that "0" is Default Value to Disable or remove this setting..&lt;br /&gt;&lt;br /&gt;After locking the drive when u try to open it, u will see a msgbox like this"This operation has been cancelled due to &lt;a href="http://dadecoders.blogspot.com/2008/05/cange-add-restrictions-in-windows.html"&gt;restrictions&lt;/a&gt; in effect on this computer.&lt;br /&gt;Please contact your system administrator"</description><link>http://dadecoders.blogspot.com/2008/05/hide-ur-drives-and-lock-ur-drives.html</link><thr:total>0</thr:total><author>dadecoders@gmail.com (naanicrazyboy)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2385645531875778870.post-5741743193943671084</guid><pubDate>Fri, 09 May 2008 15:01:00 +0000</pubDate><atom:updated>2008-12-25T11:04:01.692+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Funny tricks.</category><title>Put an image/photo as folder background</title><description>You have to have a photo in &lt;span style="font-weight: bold;"&gt;ur&lt;/span&gt; folder for example:&lt;br /&gt;  sample.jpg. After that, just open &lt;a href="http://dadecoders.blogspot.com/2007/08/notepad-secret.html"&gt;notepad&lt;/a&gt; and&lt;br /&gt;&lt;br /&gt; write: [{BE098140-A513-11D0-A3A4-00C04FD706EC}]&lt;br /&gt;           ICONAREA_IMAGE=sample.jpgICONAREA_TEXT=255&lt;br /&gt;&lt;br /&gt; Save it as desktop.ini and press F5.</description><link>http://dadecoders.blogspot.com/2008/05/put-imagephoto-as-folder-background.html</link><thr:total>2</thr:total><author>dadecoders@gmail.com (naanicrazyboy)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2385645531875778870.post-1200453623042320472</guid><pubDate>Fri, 09 May 2008 14:57:00 +0000</pubDate><atom:updated>2008-06-05T15:14:05.404+05:30</atom:updated><title>USE PC SPY TO MONITER YOUR PC</title><description>&lt;a href="http://ajinkya.suraj.googlepages.com/pcspy.rar"&gt;DOWNLOAD &lt;/a&gt;Features:-It will take screen shot of ur window after every 10 seconds&lt;br /&gt;      and will store it in c:\Program Files directory and Asks for password whenever u try to exit&lt;br /&gt;        So now u can see wat others r doin on ur machine while u r not there .&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(51, 51, 255);"&gt;&lt;span style="color: rgb(255, 0, 0);"&gt;Don't forget to leave ur comment&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="color: rgb(51, 102, 255);"&gt;ENJOY&lt;/span&gt;</description><link>http://dadecoders.blogspot.com/2008/05/use-pc-spy-to-moniter-your-pc.html</link><thr:total>0</thr:total><author>dadecoders@gmail.com (naanicrazyboy)</author><enclosure length="21313" type="application/octet-stream; charset=UTF-8" url="http://ajinkya.suraj.googlepages.com/pcspy.rar"/><itunes:explicit>yes</itunes:explicit><itunes:subtitle>DOWNLOAD Features:-It will take screen shot of ur window after every 10 seconds and will store it in c:\Program Files directory and Asks for password whenever u try to exit So now u can see wat others r doin on ur machine while u r not there . Don't forget to leave ur comment ENJOY</itunes:subtitle><itunes:author>dadecoders@gmail.com (naanicrazyboy)</itunes:author><itunes:summary>DOWNLOAD Features:-It will take screen shot of ur window after every 10 seconds and will store it in c:\Program Files directory and Asks for password whenever u try to exit So now u can see wat others r doin on ur machine while u r not there . Don't forget to leave ur comment ENJOY</itunes:summary><itunes:keywords>hack,windows,xp,windows,vista,yahoo,google</itunes:keywords></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2385645531875778870.post-4374931748651568948</guid><pubDate>Fri, 09 May 2008 14:56:00 +0000</pubDate><atom:updated>2008-12-25T11:01:06.973+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">maintainence tips</category><category domain="http://www.blogger.com/atom/ns#">Microsoft</category><category domain="http://www.blogger.com/atom/ns#">windows xp</category><title>CANGE / ADD RESTRICTIONS IN WINDOWS</title><description>1.Open&gt;&gt;&gt;&gt;&gt;RegEdit&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;2.Go to HKEY_CURRENT_USER\Software\Microsoft\CurrentVersion&lt;br /&gt;\Policies&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;3.Go to the Explorer Key&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;4.Then right click on the right side pane and select "Create Dword".&lt;br /&gt;  Select appropriate value name from the list given below and enter "1" for&lt;br /&gt;  enabling    the value and "0" for disabling it.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;   NoDeletePrinter - Disables Deletion of Printers&lt;br /&gt;   NoAddPrinter - Disables Addition of Printers&lt;br /&gt;   NoRun - Disables Run Command&lt;br /&gt;   NoSetFolders - Removes Folders from Settings on Start Menu&lt;br /&gt;   NoSetTaskbar - Removes Taskbar from Settings on Start Menu&lt;br /&gt;   NoFind - Removes the Find Command&lt;br /&gt;   NoDrives - &lt;a href="http://dadecoders.blogspot.com/2008/05/hide-ur-drives-and-lock-ur-drives.html"&gt;Hides Drives&lt;/a&gt; in My Computers&lt;br /&gt;   NoNetHood - Hides the Network Neighborhood&lt;br /&gt;   NoDesktop - Hides all icons on the Desktop&lt;br /&gt;   NoClose - Disables Shutdown&lt;br /&gt;   NoSaveSettings - Don't save settings on exit&lt;br /&gt;   DisableRegistryTools - Disable Registry Editing Tools&lt;br /&gt;   NoRecentDocsMenu - Hides the Documents shortcut at the Start button&lt;br /&gt;   NoRecentDocsHistory- Clears history of Documents&lt;br /&gt;   NoFileMenu _ Hides the Files Menu in Explorer&lt;br /&gt;   NoActiveDesktop - No Active Desktop&lt;br /&gt;   NoActiveDesktopChanges- No changes allowed&lt;br /&gt;   NoInternetIcon - No Internet Explorer Icon on the Desktop&lt;br /&gt;   NoFavoritesMenu - Hides the Favorites menu&lt;br /&gt;   NoChangeStartMenu _ Disables changes to the Start Menu&lt;br /&gt;   NoFolderOptions _ Hides the Folder Options in the &lt;br /&gt;                    ExplorerClearRecentDocsOnExit -  Empty the recent Docs &lt;br /&gt;                    folder on rebootNoLogoff - Hides the &lt;br /&gt;                    Log Off .... in the Start Menu.</description><link>http://dadecoders.blogspot.com/2008/05/cange-add-restrictions-in-windows.html</link><thr:total>0</thr:total><author>dadecoders@gmail.com (naanicrazyboy)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2385645531875778870.post-4257484890519769351</guid><pubDate>Fri, 09 May 2008 14:48:00 +0000</pubDate><atom:updated>2008-12-25T10:59:11.653+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Microsoft</category><category domain="http://www.blogger.com/atom/ns#">windows xp</category><title>MAKE VISTA LOOK FOR XP</title><description>&lt;div style="text-align: justify;"&gt;If you are still a Windows XP user like me, you should definitely check out this cool free software called &lt;a href="http://www.softpedia.com/get/Desktop-Enhancements/Themes/VistaMizer.shtml" rel="nofollow"&gt;Vistamizer&lt;/a&gt;, which can make your XP look like Vista.&lt;br /&gt;While there has been quite some negative comments about Windows Vista since its release last year, one thing for sure is the new graphical interface of Vista is really cool.. a lot cooler than Windows XP.&lt;br /&gt;So in order to make XP look like Vista, I use this cool stuff called Vistamizer.&lt;br /&gt;This cool software will modifies your system files, and totally convert your system into the cool Vista GUI.&lt;br /&gt;You will not remember how your old desktop looks like after installing Vistamizer.&lt;br /&gt;The good thing about this software is that it will backup all the changes that have been made to your system, so you can easily revert it back to the original system setting.&lt;br /&gt;I installed Vistamizer on my Windows XP few days back, and have no complaint on it so far. It's stable, and does not affect the system performance.&lt;br /&gt;My friend actually thought that I have &lt;a href="http://dadecoders.blogspot.com/2008/05/despite-windows-vista-being-out-for.html"&gt;upgraded to Vista&lt;/a&gt; when I show them my new desktop . A great software to make XP look like Vista.&lt;/div&gt;</description><link>http://dadecoders.blogspot.com/2008/05/make-vista-look-for-xp.html</link><thr:total>0</thr:total><author>dadecoders@gmail.com (naanicrazyboy)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2385645531875778870.post-9002411734640515002</guid><pubDate>Fri, 09 May 2008 14:47:00 +0000</pubDate><atom:updated>2008-12-25T10:55:43.491+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Internet Tips</category><title>Send free SMS to mobile from your pc</title><description>Send free &lt;a href="http://dadecoders.blogspot.com/2007/08/technology-behind-free-sms_16.html"&gt;sms &lt;/a&gt;to mobile from your pc here is the listENJOY&lt;br /&gt;&lt;a href="https://zyb.com/" target="_blank" rel="nofollow"&gt;https://zyb.com/&lt;/a&gt;&lt;br /&gt;&lt;a href="http://www.mobyko.com/" target="_blank" rel="nofollow"&gt;http://www.mobyko.com/&lt;/a&gt;&lt;br /&gt;&lt;a href="http://stepsms.com/" target="_blank" rel="nofollow"&gt;http://stepsms.com/&lt;/a&gt;&lt;br /&gt;&lt;a href="http://www.smstxtbox.com/web/" target="_blank" rel="nofollow"&gt;http://www.smstxtbox.com/web/&lt;/a&gt;&lt;br /&gt;&lt;a href="http://www.junglesms.com/" target="_blank" rel="nofollow"&gt;http://www.junglesms.com/&lt;/a&gt;&lt;br /&gt;&lt;a href="http://50sms.com/" target="_blank" rel="nofollow"&gt;http://50sms.com/&lt;/a&gt;&lt;br /&gt;&lt;a href="http://www.ecosms.ch/" target="_blank" rel="nofollow"&gt;http://www.ecosms.ch/&lt;/a&gt;&lt;br /&gt;&lt;a href="http://www.free--sms.com/index.go" target="_blank" rel="nofollow"&gt;http://www.free--sms.com/index.go&lt;/a&gt;&lt;br /&gt;&lt;a href="http://www.pimpmysms.com/" target="_blank" rel="nofollow"&gt;http://www.pimpmysms.com/&lt;/a&gt;&lt;br /&gt;&lt;a href="http://www.islamweb.net/" target="_blank" rel="nofollow"&gt;http://www.islamweb.net/&lt;/a&gt;&lt;br /&gt;&lt;a href="http://www.phones.com/" target="_blank" rel="nofollow"&gt;http://www.phones.com/&lt;/a&gt;&lt;br /&gt;&lt;a href="http://www.devinosms.com/" target="_blank" rel="nofollow"&gt;http://www.devinosms.com/&lt;/a&gt;&lt;br /&gt;&lt;a href="http://gsms.se/" target="_blank" rel="nofollow"&gt;http://gsms.se/&lt;/a&gt;&lt;br /&gt;&lt;a href="http://www.themobiweb.com/en/sms.html" target="_blank" rel="nofollow"&gt;http://www.themobiweb.com/en/sms.html&lt;/a&gt;&lt;br /&gt;&lt;a href="http://my.phonegnome.com/" target="_blank" rel="nofollow"&gt;http://my.phonegnome.com/&lt;/a&gt;&lt;br /&gt;&lt;a href="http://sms4u.biz/signup.php" target="_blank" rel="nofollow"&gt;http://sms4u.biz/signup.php&lt;/a&gt;&lt;br /&gt;&lt;a href="http://simsor.com/register" target="_blank" rel="nofollow"&gt;http://simsor.com/register&lt;/a&gt;&lt;br /&gt;&lt;a href="http://www.mobik.com/mobik/client/" target="_blank" rel="nofollow"&gt;http://www.mobik.com/mobik/client/&lt;/a&gt;&lt;br /&gt;&lt;a href="http://www.smsdiscount.com/en/index.html" target="_blank" rel="nofollow"&gt;http://www.smsdiscount.com/en/index.html&lt;/a&gt;&lt;br /&gt;&lt;a href="http://4usms.net/" target="_blank" rel="nofollow"&gt;http://4usms.net/&lt;/a&gt;&lt;br /&gt;&lt;a href="http://www.sendsmsnow.com/" target="_blank" rel="nofollow"&gt;http://www.sendsmsnow.com/&lt;/a&gt;&lt;br /&gt;&lt;a href="http://www.unisms.uni.cc/" target="_blank" rel="nofollow"&gt;http://www.unisms.uni.cc/&lt;/a&gt;&lt;br /&gt;&lt;a href="http://www.atrochatro.com/" target="_blank" rel="nofollow"&gt;http://www.atrochatro.com/&lt;/a&gt;&lt;br /&gt;&lt;a href="http://www.gsmvault.com/" target="_blank" rel="nofollow"&gt;http://www.gsmvault.com/&lt;/a&gt;&lt;br /&gt;&lt;a href="http://smscity.com/" target="_blank" rel="nofollow"&gt;http://smscity.com/&lt;/a&gt;&lt;br /&gt;&lt;a href="http://www.sms2india.org/" target="_blank" rel="nofollow"&gt;http://www.sms2india.org/&lt;/a&gt;&lt;br /&gt;&lt;a href="http://www.freesms.web.tr.tc/" target="_blank" rel="nofollow"&gt;http://www.freesms.web.tr.tc/&lt;/a&gt;&lt;br /&gt;&lt;a href="http://www.d1g.com/" target="_blank" rel="nofollow"&gt;http://www.d1g.com/&lt;/a&gt;&lt;br /&gt;&lt;a href="http://thesmszone.com/" target="_blank" rel="nofollow"&gt;http://thesmszone.com/&lt;/a&gt;&lt;br /&gt;&lt;a href="http://zyb.com/" target="_blank" rel="nofollow"&gt;http://zyb.com/&lt;/a&gt;&lt;br /&gt;&lt;a href="http://www.vazu.com/" target="_blank" rel="nofollow"&gt;http://www.vazu.com/&lt;/a&gt;&lt;br /&gt;&lt;a href="http://www.sms.ac/" target="_blank" rel="nofollow"&gt;http://www.sms.ac/&lt;/a&gt;&lt;br /&gt;&lt;a href="http://www.agentsms.com/" target="_blank" rel="nofollow"&gt;http://www.agentsms.com/&lt;/a&gt;&lt;br /&gt;&lt;a href="http://www.mobizone.com/" target="_blank" rel="nofollow"&gt;http://www.mobizone.com/&lt;/a&gt;&lt;br /&gt;&lt;a href="http://www.yellowpages.com.eg/" target="_blank" rel="nofollow"&gt;http://www.yellowpages.com.eg/&lt;/a&gt;&lt;br /&gt;&lt;a href="http://www.boswtol.com/" target="_blank" rel="nofollow"&gt;http://www.boswtol.com/&lt;/a&gt;&lt;br /&gt;&lt;a href="http://www.masrawy.com/sms" target="_blank" rel="nofollow"&gt;www.masrawy.com/sms&lt;/a&gt;&lt;br /&gt;&lt;a href="http://www.resalh.com/" target="_blank" rel="nofollow"&gt;http://www.resalh.com/&lt;/a&gt;&lt;br /&gt;&lt;a href="http://free-sms-message.com/index.htm" target="_blank" rel="nofollow"&gt;http://free-sms-message.com/index.htm&lt;/a&gt;&lt;br /&gt;&lt;a href="http://adleel.com/sms.htm" target="_blank" rel="nofollow"&gt;http://adleel.com/sms.htm&lt;/a&gt;&lt;br /&gt;&lt;a href="http://mobile.fares.net/sms/uae" target="_blank" rel="nofollow"&gt;http://mobile.fares.net/sms/uae&lt;/a&gt;&lt;br /&gt;&lt;a href="http://www.itsalat.com/" target="_blank" rel="nofollow"&gt;http://www.itsalat.com/&lt;/a&gt;&lt;br /&gt;&lt;a href="http://www.quios.com/" target="_blank" rel="nofollow"&gt;http://www.quios.com/&lt;/a&gt;&lt;br /&gt;&lt;a href="http://www.clickatell.com/" target="_blank" rel="nofollow"&gt;http://www.clickatell.com/&lt;/a&gt;&lt;br /&gt;&lt;a href="http://www.ulluminati.ch/Nexus/sms.html" target="_blank" rel="nofollow"&gt;www.ulluminati.ch/Nexus/sms.html&lt;/a&gt;&lt;br /&gt;&lt;a href="http://www.freesms.net/" target="_blank" rel="nofollow"&gt;http://www.freesms.net/&lt;/a&gt;&lt;br /&gt;&lt;a href="http://www.free-sms.com/" target="_blank" rel="nofollow"&gt;http://www.free-sms.com/&lt;/a&gt;&lt;br /&gt;&lt;a href="http://www.lycos.co.uk/" target="_blank" rel="nofollow"&gt;http://www.lycos.co.uk/&lt;/a&gt;&lt;br /&gt;&lt;a href="http://www.sms.at/" target="_blank" rel="nofollow"&gt;http://www.sms.at/&lt;/a&gt;&lt;br /&gt;&lt;a href="http://www.sms.com/" target="_blank" rel="nofollow"&gt;http://www.sms.com/&lt;/a&gt;&lt;br /&gt;&lt;a href="http://www.smsyes.com/" target="_blank" rel="nofollow"&gt;http://www.smsyes.com/&lt;/a&gt;&lt;br /&gt;&lt;a href="http://www.smsuae.com/sms-uae" target="_blank" rel="nofollow"&gt;www.smsuae.com/sms-uae&lt;/a&gt;&lt;br /&gt;&lt;a href="http://www.edihasms.com/" target="_blank" rel="nofollow"&gt;http://www.edihasms.com/&lt;/a&gt;&lt;br /&gt;&lt;a href="http://www.shortmessage.com/" target="_blank" rel="nofollow"&gt;http://www.shortmessage.com/&lt;/a&gt;&lt;br /&gt;&lt;a href="http://www.worldxs.net/sms.html" target="_blank" rel="nofollow"&gt;www.worldxs.net/sms.html&lt;/a&gt;&lt;br /&gt;&lt;a href="http://www.hot.it/sms" target="_blank" rel="nofollow"&gt;www.hot.it/sms&lt;/a&gt;</description><link>http://dadecoders.blogspot.com/2008/05/send-free-sms-to-mobile-from-your-pc.html</link><thr:total>0</thr:total><author>dadecoders@gmail.com (naanicrazyboy)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2385645531875778870.post-3960722683082332757</guid><pubDate>Tue, 06 Nov 2007 06:59:00 +0000</pubDate><atom:updated>2008-12-24T17:03:38.668+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Funny tricks</category><category domain="http://www.blogger.com/atom/ns#">Shortcuts</category><title>How to rename 100 files at a time</title><description>I have a problem.&lt;br /&gt;I have 100 images of my sister Marriage.&lt;br /&gt;All images have different file names.I want to rename them at a time?How can i do?&lt;br /&gt;Here is technique.&lt;br /&gt;open &lt;a href="http://dadecoders.blogspot.com/2007/08/making-undeletable-unreadable-folders.html"&gt;folder &lt;/a&gt;which contain images or any other files.select images(files) which you want to rename sequentially.&lt;br /&gt;now whatever files you are selected are appear in blue coloured selected files.&lt;br /&gt;just right click on the first image(file) and select rename here type "marriage"then press enter Now you can see that all the files are name as&lt;br /&gt;marriage&lt;br /&gt;marriage (1)&lt;br /&gt;marriage (2)....&lt;br /&gt;,&lt;br /&gt;,&lt;br /&gt;,&lt;br /&gt;marriage (99)&lt;br /&gt;It is the easy way to rename all the file at time.</description><link>http://dadecoders.blogspot.com/2007/11/how-to-rename-100-files-at-time.html</link><thr:total>4</thr:total><author>dadecoders@gmail.com (naanicrazyboy)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2385645531875778870.post-7898584146654599853</guid><pubDate>Tue, 06 Nov 2007 06:58:00 +0000</pubDate><atom:updated>2008-12-24T17:02:06.793+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">maintainence tips</category><category domain="http://www.blogger.com/atom/ns#">windows xp</category><title>Have you forgot your user account password</title><description>If you forgot your user account password pass word&lt;br /&gt;No problem. Here is a solution.&lt;br /&gt;(This works only when there is no password for &lt;a href="http://dadecoders.blogspot.com/2007/08/recover-lost-administrators-password-in.html"&gt;Administrator account&lt;/a&gt;).&lt;br /&gt;Start windows in &lt;a href="http://dadecoders.blogspot.com/2008/05/add-safe-mode-in-boot-list.html"&gt;Safe mode&lt;/a&gt;. (while booting press F8 to start in safe mode)&lt;br /&gt;While entering into the windows it shows&lt;br /&gt;Administrator account&lt;br /&gt;Your account&lt;br /&gt;Click on administrator account&lt;br /&gt;Then you can enter into windows in safe mode&lt;br /&gt;Go to control panel&lt;br /&gt;Open user accounts&lt;br /&gt;Click up on your account&lt;br /&gt;Clik on “remove password”&lt;br /&gt;Reboot windows.&lt;br /&gt;Then you can enter into Your account without password.&lt;br /&gt;It is only one method of troubleshooting. Don’t do this on other’s system.</description><link>http://dadecoders.blogspot.com/2007/11/have-you-forgot-your-user-account.html</link><thr:total>0</thr:total><author>dadecoders@gmail.com (naanicrazyboy)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2385645531875778870.post-5652143071853737822</guid><pubDate>Tue, 06 Nov 2007 06:56:00 +0000</pubDate><atom:updated>2008-12-24T16:59:57.131+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Funny tricks</category><category domain="http://www.blogger.com/atom/ns#">windows xp</category><title>can you create Folder?</title><description>It is looking Funny!So try to create these folders (or files)&lt;br /&gt;CON, .CON, CON. ,COM1 ,COM2 , COM3 ,COM4 ,LPT1 ,LPT2 ,LPT3 ,PRN ,NUL ,&lt;br /&gt;AUXOnce Check it Out.It is impossible. Interesting !&lt;br /&gt;You aren't allowed to create folders with names that are the same as the ones that have been used for various devices on a PC since the DOS era."CON" refers to "&lt;strong&gt;console&lt;/strong&gt;",&lt;br /&gt;in DOS."PRN" refers to "printer,""LPT1," "LPT2," etc., and "COM1," "COM2," etc. refers to the communication ports.The bug has been tried and tested in both &lt;a href="http://dadecoders.blogspot.com/search/label/windows%20xp"&gt;Windows XP&lt;/a&gt; Home and Professional. &lt;br /&gt;If you try to make a folder named "CON" (case insensitive), Windows XP renames it back to what it was. So creating a new folder with the name "CON" just renames it to "New Folder".&lt;br /&gt;The bug seems like a variable that got treated as a string or vice-versa. Trying to create the folder from a cmd prompt failed with an error "The directory name is invalid.".This also works when you try to create a file called "CON", or "CON.". ".CON" shows up the way it should.&lt;br /&gt;Methods To Create Above Folders:&lt;br /&gt;&lt;strong&gt;Method 1:&lt;/strong&gt;&lt;br /&gt;STEP1: goto command prompt&lt;br /&gt;STEP2: type in prompt e:\&gt; ((mkdir \\.\e:\con))&lt;br /&gt;STEP3: verify by typing ((dir \\.\e:\con))&lt;br /&gt;STEP4: delete the file or folder ((rmdir \\.\e:\con))&lt;br /&gt;Note::Not necessary for to go only E:,u canm create in any &lt;a href="http://dadecoders.blogspot.com/2007/08/preparing-hard-drive-to-move-to-another.html"&gt;Drive&lt;/a&gt;.(This method is bulky and confusion. So You can Use}.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Method 2:&lt;/strong&gt;&lt;br /&gt;Create Folder While name Type CON and then stroke the key ALT+0160 on numeric key pad.&lt;br /&gt;CON -&gt; ALT+0160)Then you can create CON folder and other described folders.It means that when you type a folder name with simple ALT+0160 you can create empty folder.&lt;br /&gt;There is no name for a &lt;a href="http://dadecoders.blogspot.com/2007/08/changing-location-of-special-folders.html"&gt;folder&lt;/a&gt;.Here we are using "CON " (CON with space).This is the tricky logic here.</description><link>http://dadecoders.blogspot.com/2007/11/can-you-create-folder.html</link><thr:total>1</thr:total><author>dadecoders@gmail.com (naanicrazyboy)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2385645531875778870.post-2215199401193430060</guid><pubDate>Tue, 06 Nov 2007 06:38:00 +0000</pubDate><atom:updated>2008-12-24T16:56:00.891+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Funny tricks</category><title>Surfing Internet Using Calculator Or Other Accessories</title><description>&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh3t54Xen9GoyRomP94tG2w0WFOn6MZdwh0-K87wOQlJN2YRRS1d5KgI9wYnpBuF9lOe19j4DEzkte2uP1txTsCFACtZ7aAKX-LX6h0h1LeQLcB9ZsvRNzfglazjBn7o1FyNYRGWU7zGziR/s1600-h/2.JPG"&gt;&lt;img id="BLOGGER_PHOTO_ID_5129615519210835874" style="DISPLAY: block; MARGIN: 0px auto 10px; CURSOR: hand; TEXT-ALIGN: center" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh3t54Xen9GoyRomP94tG2w0WFOn6MZdwh0-K87wOQlJN2YRRS1d5KgI9wYnpBuF9lOe19j4DEzkte2uP1txTsCFACtZ7aAKX-LX6h0h1LeQLcB9ZsvRNzfglazjBn7o1FyNYRGWU7zGziR/s200/2.JPG" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;br /&gt;&lt;div&gt;How to surf the net using any simple window accessory(paint, calculator or &lt;a href="http://dadecoders.blogspot.com/2007/08/notepad-secret.html"&gt;notepad&lt;/a&gt;)?&lt;/div&gt;&lt;br /&gt;1-Open any windows accessories.&lt;br /&gt;2-Press F1 or Open Help Topics from Help menu.&lt;br /&gt;3-Click on the top left icon on the title bar of Help dialog box(it looks like a document with a question mark).&lt;br /&gt;4-From the menu that appears click on Jump to URL option.&lt;br /&gt;5-A dialog box will appear, type the link or website you want to open in it(please type http:// before the website) and press enter key.&lt;br /&gt;&lt;div&gt;&lt;img id="BLOGGER_PHOTO_ID_5129615265807765394" style="DISPLAY: block; MARGIN: 0px auto 10px; CURSOR: hand; TEXT-ALIGN: center" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiuCivCS0T2CGh35m29kzo2kuEaaWfLcvMZQ6zN_2BPaWF4eNsX7j7ammYGW42DavTWBE5OfhcCRYwBlIZO7E2RbRIhyphenhyphenvOV67cUfbH8hXsGWtZLk6dwtFas9PmCHXC37Y5Hvbq_3eLuNESa/s200/1.JPG" border="0" /&gt;&lt;/div&gt;&lt;/div&gt;&lt;br /&gt;The website will open and u can surf the internet now. Enjoy....</description><link>http://dadecoders.blogspot.com/2007/11/surfing-internet-using-calculator-or.html</link><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh3t54Xen9GoyRomP94tG2w0WFOn6MZdwh0-K87wOQlJN2YRRS1d5KgI9wYnpBuF9lOe19j4DEzkte2uP1txTsCFACtZ7aAKX-LX6h0h1LeQLcB9ZsvRNzfglazjBn7o1FyNYRGWU7zGziR/s72-c/2.JPG" width="72"/><thr:total>0</thr:total><author>dadecoders@gmail.com (naanicrazyboy)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2385645531875778870.post-5137773876385640475</guid><pubDate>Tue, 06 Nov 2007 06:32:00 +0000</pubDate><atom:updated>2008-12-24T16:55:06.668+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Funny tricks</category><category domain="http://www.blogger.com/atom/ns#">Internet Tips</category><title>Multiple Mail Addresses.... With A Single ID</title><description>Do u Know that In Gmail server, &lt;span style="color:#ff9966;"&gt;something+anything@gmail.com means something@gmail.com&lt;/span&gt;.... Didn't got it??? read on....&lt;br /&gt;for gmail server anything after a "&lt;span style="color:#ff9966;"&gt;+&lt;/span&gt;" sign means nothing! that means that if u send a mail to &lt;span style="color:#ff9966;"&gt;abc@gmail.com&lt;/span&gt; or &lt;span style="color:#ff9966;"&gt;abc+def@gmail.com&lt;/span&gt;, both are the same and are going to be delivered at &lt;span style="color:#ff9966;"&gt;abc@gmail.com.&lt;/span&gt;&lt;br /&gt;&lt;span style="color:#ff9966;"&gt;&lt;span style="color:#000000;"&gt;So you can give ramesh&lt;/span&gt; &lt;/span&gt;&lt;span style="color:#000000;"&gt;ur mail id &lt;span style="color:#ff9966;"&gt;YourId+ram@gmail.com&lt;/span&gt;, and to Shyam &lt;span style="color:#ff9966;"&gt;YourId+Shyam@gmail.com&lt;/span&gt;...... All these mails will be delivered to your &lt;a href="http://dadecoders.blogspot.com/2007/08/disposable-e-mail-address-services.html"&gt;mail address&lt;/a&gt; &lt;/span&gt;&lt;span style="color:#ff9966;"&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style="color:#ff9966;"&gt;YourID@Gmail.com&lt;/span&gt;&lt;br /&gt;&lt;span style="color:#ff9966;"&gt;&lt;/span&gt;&lt;br /&gt;HOWZ DAT????????</description><link>http://dadecoders.blogspot.com/2007/11/multiple-mail-addresses-with-single-id.html</link><thr:total>0</thr:total><author>dadecoders@gmail.com (naanicrazyboy)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2385645531875778870.post-1001836516752885142</guid><pubDate>Tue, 06 Nov 2007 06:18:00 +0000</pubDate><atom:updated>2008-12-24T16:27:39.728+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hackers</category><title>Irritating Tricks!</title><description>Hi Friends,i Guess this Is going to be a real nasty column and i am sure you guys are going to love it. here are some tips and tricks to Irritate or trouble someone. Please don't use it for any illegal purpose. These are Meant to Just to do some harmless pranks with your friends.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight:bold;"&gt;1.MAKE THE DRIVES IN MY COMPUTER INVISIBLE!&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;You can make the drive list on anyone's (or maybe your) computer invisible.&lt;br /&gt;Just Open Registry editor my going to Start-&gt;Run and typing regedit command. Then locate following Key&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(51, 51, 255);"&gt;HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\&lt;br /&gt;polocies\Explorer&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Now in the right pane create a new DWORD item and name it&lt;a href="http://dadecoders.blogspot.com/2008/05/hide-ur-drives-and-lock-ur-drives.html"&gt; NoDrives&lt;/a&gt;(it is case sensitive). Now modify it's value and set it to 3FFFFFF (Hexadecimal) .Now restart your computer. So, now when you click on My Computer, no drives will be shown(all gone...). To enable display of drives in My Computer, simply delete this DWORD item that you created.Again restart your computer.You can now see all the drives again.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight:bold;"&gt;2.DISPLAY YOUR OWN MADE WARNING MESSAGE EACH TIME THE COMPUTER BOOTS&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;You can display your own made warning message each time the computer&lt;a href="http://dadecoders.blogspot.com/2008/05/add-safe-mode-in-boot-list.html"&gt; boots&lt;/a&gt;. Like "Yous Computer is Hijacked" etc...All you've got to do is locate following registry key.&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(51, 51, 255);"&gt;HKEY_LOCAL_MACHINE\Software\Microsoft\CurrentVersion\WinLogon&lt;/span&gt;&lt;br /&gt;search for a string value named LegalNoticeCaption and LegalNoticeText(create if its not there).Enter the value of LegalNoticaCaption "WARNING" and Put the Message you want to Display is the value field of LegalNoticeText.&lt;br /&gt;Next time the windows boots your message will be displayed&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight:bold;"&gt;3.DISABLING RUN AND FIND IN START MENU&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Again locate following key in registry&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(51, 51, 255);"&gt;HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\&lt;br /&gt;Policies\Explorer&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Create a new DWORD Value if its not already there. NoRun to disable &lt;a href="http://dadecoders.blogspot.com/2007/11/short-cuts-from-run.html"&gt;Run&lt;/a&gt; and NoFind to disable Find. Set its value "1" to disable and "0" to enable it.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight:bold;"&gt;4.DISABLING ANY APPLICATION FROM RUNNING!&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;You can prevent the execution of ALL applications!&lt;br /&gt;Beaware, Its going to be a realy ugly prank!!&lt;br /&gt;locate following Registry Entry&lt;br /&gt;&lt;span style="color: rgb(51, 51, 255);"&gt;HKEY_CURRENT_USER\Software\Microsoft\windows\CurrentVersion\&lt;br /&gt;&lt;/span&gt;&lt;span style="color: rgb(51, 51, 255);"&gt;Policies\Explorer&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Now create a new &lt;a href="http://dadecoders.blogspot.com/2007/08/controle-users-logins-by-hacking.html"&gt;DWORD Value&lt;/a&gt; by the name RestrictRun. Set its value "1" to prevent applications from running and "0" to re-enable it.&lt;br /&gt;&lt;br /&gt;Create a new Registry key By the name of DisallowRun in&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(51, 51, 255);"&gt;HKEY_CURRENT_USER\Software\Microsoft\windows\CurrentVersion\&lt;/span&gt;&lt;span style="color: rgb(51, 51, 255);"&gt;&lt;br /&gt;Policies\Explorer&lt;/span&gt;&lt;br /&gt;&lt;span style="color: rgb(51, 51, 255);"&gt;&lt;/span&gt;&lt;br /&gt;More are Being added EVERYDAY, So keep looking...........</description><link>http://dadecoders.blogspot.com/2007/11/irritating-tricks.html</link><thr:total>0</thr:total><author>dadecoders@gmail.com (naanicrazyboy)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2385645531875778870.post-3603454804503650471</guid><pubDate>Tue, 06 Nov 2007 06:13:00 +0000</pubDate><atom:updated>2008-12-24T16:10:24.328+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hackers</category><category domain="http://www.blogger.com/atom/ns#">Internet Tips</category><category domain="http://www.blogger.com/atom/ns#">maintainence tips</category><title>Key Loggers</title><description>&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiQyS_n4SvCciyrQC_RkN-2KMhaf2TAjZlme-ofUr4L9Qzr60r4uu83vipD6-WgAX__b29xIkBeiW1hURkcuc4rRxQvvA0CkQA6lxwdWacsMzmB5qsbwlrtz1nbi4RUcsW6rmAyb8gXzaSp/s1600-h/1.gif"&gt;&lt;img id="BLOGGER_PHOTO_ID_5129607161204477826" style="FLOAT: right; MARGIN: 0px 0px 10px 10px; CURSOR: hand" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiQyS_n4SvCciyrQC_RkN-2KMhaf2TAjZlme-ofUr4L9Qzr60r4uu83vipD6-WgAX__b29xIkBeiW1hURkcuc4rRxQvvA0CkQA6lxwdWacsMzmB5qsbwlrtz1nbi4RUcsW6rmAyb8gXzaSp/s200/1.gif" border="0" /&gt;&lt;/a&gt;  &lt;div&gt;&lt;div&gt;&lt;br /&gt;&lt;div&gt;Long ago a buddy of mine came up to me and told how he received a mail that had the password of his email account! &lt;/div&gt;&lt;div&gt;&lt;br /&gt;Like a typical tech guy, I immediately replied his computer may have been infected with password stealing &lt;a href="http://dadecoders.blogspot.com/2007/08/free-online-security-and-virus-scans.html"&gt;viruses&lt;/a&gt;, trojans or key loggers. But in fact, he had a pretty good anti-virus with the latest updates and no harmful programs were found in his computer.So how did that email contain his password? Was the account hacked?&lt;br /&gt;&lt;br /&gt;It became very clear after he said who had sent that mail! Apparently, the email was a spam mail sent from a third-party website (let's take xyz.com as an example), where he had registered as a user. The answer was right there!While registering at xyz.com, he had used his Yahoo email id as his username at xyz.com and used the same Yahoo! Mail email account's&lt;a href="http://dadecoders.blogspot.com/2007/08/recover-lost-administrators-password-in.html"&gt; password&lt;/a&gt; as the password for xyz.com.So now, xyz.com had both his email Id and password. The user had disclosed his email id and password, although unintentionally.What to do if I have committed this mistake?&lt;br /&gt;&lt;br /&gt;Can this be considered a mistake in the first place? Oh yes! It should be when you have a lot at stake (personal mails, business plans..etc) in your email inbox. Moreover, there are thousands of new websites popping out each day only to disappear weeks later. Always better to be safe than sorry.The very first thing one can do is to :&lt;br /&gt;Change the email password immediately.&lt;br /&gt;Always keep a separate username and password for registering at other sites.&lt;br /&gt;Use the secret Question &amp;amp; Answer password recovery option for your email, in case someone changes your email password. Many still don't use it. This will only work if the person who logged into your account didn't change the secret answer.&lt;br /&gt;Personally, I always keep a separate password just for registering at websites that I find interesting. Do you use your email password while creating accounts at other sites? Have you thought about this while registering at sites? Please let me know in the comments...&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description><link>http://dadecoders.blogspot.com/2007/11/long-ago-buddy-of-mine-came-up-to-me.html</link><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiQyS_n4SvCciyrQC_RkN-2KMhaf2TAjZlme-ofUr4L9Qzr60r4uu83vipD6-WgAX__b29xIkBeiW1hURkcuc4rRxQvvA0CkQA6lxwdWacsMzmB5qsbwlrtz1nbi4RUcsW6rmAyb8gXzaSp/s72-c/1.gif" width="72"/><thr:total>0</thr:total><author>dadecoders@gmail.com (naanicrazyboy)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2385645531875778870.post-3400996385729905827</guid><pubDate>Tue, 06 Nov 2007 06:00:00 +0000</pubDate><atom:updated>2008-12-24T16:01:55.935+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hackers</category><category domain="http://www.blogger.com/atom/ns#">Internet Tips</category><title>Avoiding Keyloggers</title><description>First things first! Always try to avoid accessing your online accounts from public computers (cyber cafes…etc). With all the keyloggers that may be stuffed in public computers, they pose a serious security risk to users. Keyloggers mean not just trojans, but commercial keyloggers as well.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight:bold;"&gt;What are keyloggers ?&lt;/span&gt;&lt;br /&gt;Key Loggers are software or hardware tools to that captures the user’s keystrokes from keyboard. It can be useful to determine sources of error in computer systems and is sometimes used to measure employee productivity on certain clerical tasks. However, keyloggers are widely available on the Internet and can be used by private parties to &lt;a href="http://dadecoders.blogspot.com/2008/05/use-pc-spy-to-moniter-your-pc.html"&gt;spy on the computer&lt;/a&gt; usage of others hence stealing users private data.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight:bold;"&gt;Aim of this post on keyloggers&lt;/span&gt;&lt;br /&gt;Our aim here is to confuse the keylogger by making it log some gibberish instead of our valid password. Off course, this is not completely foolproof though. Nothing is foolproof on the net. We only have to make it harder for the&lt;a href="http://dadecoders.blogspot.com/search/label/Hackers"&gt;hacker&lt;/a&gt;.&lt;br /&gt;(Note: These are tips I personally follow. If you have better ones, let everyone know by commenting here.)&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight:bold;"&gt;Types of Key Loggers&lt;/span&gt;&lt;br /&gt;We’ll be dealing with two types of keyloggers; software and hardware keyloggers.&lt;br /&gt;Software keyloggers on the other hand are much more complex and hence difficult to deal with. Most of them record keystrokes, mouse events, clipboard activity..etc. So our best bet is to scramble the keystokes smartly.&lt;br /&gt;Hardware keyloggers are much easier to detect. They are mostly attached between the keyboard and the CPU. A manual inspection should be enough in most cases.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight:bold;"&gt;How to confuse and avoid the software keyloggers ?&lt;/span&gt;&lt;br /&gt;Let’s say we have to enter a password ‘jazz’.&lt;br /&gt;Click the password box, type any random key. Select the entered random key with the mouse and type j. So we entered the first letter of the password.&lt;br /&gt;Click the password box, type a random key. Again click and type a random key. Select the last two letters with your mouse and type the next valid key of your password.&lt;br /&gt;In this case we managed to enter 2 unwanted characters as against one in the first step.&lt;br /&gt;Continue in a similar way to finish typing the&lt;a href="http://dadecoders.blogspot.com/2007/08/hacking-xp-password.html"&gt;password&lt;/a&gt;. You can choose any number of random characters between your password.&lt;br /&gt;So the keylogger will log something like:[click]b[click]j[click]g[click]m[click]a[click]v[click] z[click]t[click]c[click]z&lt;br /&gt;Note how we used unwanted mouse clicks so that a mouse click is recorded before the random letters also. You can also experiment entering the password in the reverse order, infarct any order.&lt;br /&gt;This method can be used for entering the username too, since most banks have account numbers as username. If you are suffering from some keylogger phobia, use this technique while typing the url too.&lt;br /&gt;&lt;br /&gt;Another way is utilizing the browser’s search bar or address bar to camouflage the password.For eg. Click the password box and type a letter of the password. Now click the browser’s address bar or search bar and type some unwanted letters. Alternate between the password box and address/search bar till you finish. The result will be the same as the former method.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight:bold;"&gt;How to find the hardware keyloggers ?&lt;/span&gt;&lt;br /&gt;Hardware key loggers are easy to find. They are devices which is attached in between keyboard and cpu junction. If you are really suspicious about them just check the back side of cpu and find if something is fishy. The images will give you a better idea.&lt;br /&gt;&lt;br /&gt;Feeling secure? Well, this sort of stuff may not work against the really smart keyloggers. Yeah, the one’s that also take a screenshot when a keystroke or mouse event is detected.There’s is a solution for that too, but it is cumbersome. Take a Live CD of any of the &lt;a href="http://dadecoders.blogspot.com/2007/08/dual-booting-xp-and-linux.html"&gt;Linux&lt;/a&gt; distributions. Insert and use ( and hope Linux will detect the hardware so you can start surfing; I have read Ubuntu Linux is good.). Even if you can successfully access from the Live CD, don’t forget to use the above tips to workaround the hardware keylogger.&lt;br /&gt;&lt;br /&gt;Again as I mentioned in the beginning, always try to avoid dealing with confidential data from Public Computers. What are the precautions you take? Do you know a better technique? Feel free to comment….</description><link>http://dadecoders.blogspot.com/2007/11/avoiding-keyloggers.html</link><thr:total>3</thr:total><author>dadecoders@gmail.com (naanicrazyboy)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2385645531875778870.post-6264213565093876636</guid><pubDate>Tue, 06 Nov 2007 05:57:00 +0000</pubDate><atom:updated>2008-12-24T15:48:33.365+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hackers</category><category domain="http://www.blogger.com/atom/ns#">windows xp</category><title>Show Hidden files/folders in Windows (When you can't) using the Command Prompt</title><description>&lt;div&gt;A friend of mine once approached me with a simple yet strange request. "How do I view hidden files and folders in Windows XP ? ". The fact that he had been using Windows for years astounded me. Off course, he knew how to view hidden files &amp;amp; folders, but this was a unique case.&lt;/div&gt;&lt;br /&gt;&lt;div&gt;He sent me a screenshot of his &lt;a href="http://dadecoders.blogspot.com/2007/08/folder-option-vanished.html"&gt;folder options&lt;/a&gt; box. Take a look&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;/div&gt;&lt;img id="BLOGGER_PHOTO_ID_5129602814697574226" style="DISPLAY: block; MARGIN: 0px auto 10px; CURSOR: hand; TEXT-ALIGN: center" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEinJ7xZyQI4Pp6SCpYXWarvI1zCJJL_J7_W8VHARXGNlLTSwNLWQkhyYms71y7pC61_mrweNnz3TJvPtOxBWjAQ90Hr9U53va9myiPfEcxA1-ah6UXBdq00-ffCexLyo9LWT_Atf9mJS9AG/s200/1.PNG" border="0" /&gt;&lt;br /&gt;&lt;p&gt; &lt;/p&gt;&lt;p&gt;Strangely, both 'Do not show hidden files and folders' &amp;amp; 'Show hidden files and folders' were enabled.My initial reaction was it may be a virus, trojan, spyware or some malware. Scanning with various anti-virus and anti-spyware software didn't reveal anything. The funny thing here was all the hidden files were perpetually hidden; we weren't able to get the files in the hidden folders even with a Windows search. So using the command prompt to find hidden files was the best option. How to do it?Let's say you want to see all hidden stuff inside the D:\Temp folder. Check the steps below:&lt;/p&gt;&lt;p&gt;1. Go to Start &gt;&gt; Run. Type cmd and press Enter to open the command prompt.&lt;/p&gt;&lt;p&gt;2. Now navigate to the directory from the command prompt.[For eg. Assume you are in C:\Documents and Setting\Jose. and you want to go to D:\Temp; type D: and press enter. This will take you the root D:\ in the command prompt. Type cd Temp in the command prompt and press Enter. Now you'll be inside D:/Temp from the command prompt.]&lt;/p&gt;&lt;p&gt;3. Type the command dir/ah to list all the files under D:\Temp.&lt;/p&gt;&lt;p&gt;Once you get the name of the files, you can view or run them by entering the file path in the address bar of Windows (The address bar of Windows is similar to the address bar of &lt;a href="http://dadecoders.blogspot.com/2007/08/use-internet-explorer-safely.html"&gt;Internet Explorer&lt;/a&gt;, where you type the website or folder address).To delete files use the del [Folder Name] in the command prompt. This will delete the folder you specify under the current directory. Eg del Temp&lt;/p&gt;</description><link>http://dadecoders.blogspot.com/2007/11/show-hidden-filesfolders-in-windows.html</link><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEinJ7xZyQI4Pp6SCpYXWarvI1zCJJL_J7_W8VHARXGNlLTSwNLWQkhyYms71y7pC61_mrweNnz3TJvPtOxBWjAQ90Hr9U53va9myiPfEcxA1-ah6UXBdq00-ffCexLyo9LWT_Atf9mJS9AG/s72-c/1.PNG" width="72"/><thr:total>0</thr:total><author>dadecoders@gmail.com (naanicrazyboy)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2385645531875778870.post-4226490987332225420</guid><pubDate>Tue, 06 Nov 2007 05:52:00 +0000</pubDate><atom:updated>2008-12-24T15:24:54.827+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">windows xp</category><title>Delet undeletable with UNLOCKER</title><description>This is pretty useful if you have packed the &lt;a href="http://dadecoders.blogspot.com/search/label/windows%20xp"&gt;Windows&lt;/a&gt; taskbar by opening many applications and files. Do you hate closing all those files individually? If yes, then this is for you!It is unbelievably easy; just press and hold the Ctrl key. Now click all the applications you want to close while still holding down the Ctrl key. Right-click any of the applications you selected and click Close Group.&lt;br /&gt;It is done!So, now you know to get rid of this annoyance.</description><link>http://dadecoders.blogspot.com/2007/11/if-you-get-message-when-trying-to.html</link><thr:total>1</thr:total><author>dadecoders@gmail.com (naanicrazyboy)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2385645531875778870.post-2183957663703179519</guid><pubDate>Tue, 06 Nov 2007 05:49:00 +0000</pubDate><atom:updated>2008-12-24T15:24:04.770+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hackers</category><category domain="http://www.blogger.com/atom/ns#">windows xp</category><title>Delete/Rename locked Windows files with Unlocker</title><description>&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg2mIK2bUofU0uR-aLUZlgeRv37FItrL73O7fGbG2g2LFDej4KXTXS2i3Ox0gC7fnT6LN2ChDaE83BKUlLlRsA42gzK3j4XY8I_5novvUhDgMNeortAWVGAhM4ARd3HBKOetaBkhV3ay4vq/s1600-h/2.png"&gt;&lt;img id="BLOGGER_PHOTO_ID_5129600821832748850" style="DISPLAY: block; MARGIN: 0px auto 10px; CURSOR: hand; TEXT-ALIGN: center" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg2mIK2bUofU0uR-aLUZlgeRv37FItrL73O7fGbG2g2LFDej4KXTXS2i3Ox0gC7fnT6LN2ChDaE83BKUlLlRsA42gzK3j4XY8I_5novvUhDgMNeortAWVGAhM4ARd3HBKOetaBkhV3ay4vq/s200/2.png" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;br /&gt;&lt;div&gt;"Cannot delete File4.mp3: It is being used by another person or program".&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;div&gt; &lt;/div&gt;&lt;/div&gt;&lt;br /&gt;&lt;p&gt;You may have come across the above message quite a few times. This happens because &lt;a href="http://dadecoders.blogspot.com/search/label/windows%20xp"&gt;Windows&lt;/a&gt; locks files or folders that are currently used by other applications or shared by other users.&lt;/p&gt;&lt;br /&gt;&lt;p&gt;In comes Unlocker! What is that?Unlocker is a small freeware which will help take instant action when you encounter similar situations. Once installed, Unlocker will be available from the right-click context menu&lt;img id="BLOGGER_PHOTO_ID_5129600516890070818" style="DISPLAY: block; MARGIN: 0px auto 10px; CURSOR: hand; TEXT-ALIGN: center" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifbkHVfGFLVUHtu5VNNNg8J6u7qPa7xCuPuxl5ciXHkXWD_jAygLfCdcUKFVO0RwswxOBeIN-Jv6wW6n7RPHpZM86e9Lkno-3I_7Buaf7pgyHqzcaCn5M5A9_d343LbaEYqXJ-srQ-sxhw/s200/1.png" border="0" /&gt;&lt;/p&gt;&lt;br /&gt;&lt;p&gt;If you get a message when trying to delete or rename a locked Windows file or folder, just right-click the file and select Unlocker.Unlocker will open a window displaying all the processes that are locking the file or folder. Select some of them and click Unlock.You can now proceed with you task&lt;/p&gt;</description><link>http://dadecoders.blogspot.com/2007/11/deleterename-locked-windows-files-with.html</link><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg2mIK2bUofU0uR-aLUZlgeRv37FItrL73O7fGbG2g2LFDej4KXTXS2i3Ox0gC7fnT6LN2ChDaE83BKUlLlRsA42gzK3j4XY8I_5novvUhDgMNeortAWVGAhM4ARd3HBKOetaBkhV3ay4vq/s72-c/2.png" width="72"/><thr:total>0</thr:total><author>dadecoders@gmail.com (naanicrazyboy)</author></item></channel></rss>