Pages

Wednesday, December 28, 2011

Computer Can Speak Whatever You Type

This is an amazing trick to amaze your friends.By using this trick you can make your computer to speak whatever you type.This trick is working on all microsoft operating system and does not require any programming skills.You have to follow just simple steps and your own Text to Voicesoftware will be ready.If you show this software to any of your friends he will be certainly impressed with you . 1.Open Notepad and copy and paste the following code...

Friday, December 23, 2011

Hacking yahoo messenger for multi login

we often chat on yahoo messenger. I don't think so that there is anyone who really doesn't know about yahoo messenger. but what most people don't know us that we can chat with multiple accounts on yahoo messenger at same time. In other words we can chat with different IDs at same time. So if you need to open and login multiple Yahoo! Messenger accounts as you have a few Yahoo! ID or various other reason, just use the small registry registration...

Hack Linux Password

Linux is an operating system which is come across it. Though Mac and Linux are both based on UNIX, it is easier to change the password in Linux than it is OS X. step-1:     To change the password, turn on the computer and press the ESC key when GRUB appears. step-2:     Scroll down and highlight  "recovery mode" and press the "B" key; this will cause you to enter in a                ...

Tuesday, December 20, 2011

Making a computer virus

In this post we will study about the making computer virus in an easy way. Step 1:- Download the Necessary software for VIRUS making. Download From Here Step 2:- Unrar the pack. Step 3:- Now open the software and You Will Get the Following Screen.  Step 4:- Now Select any (can be more then one) Victim option from the given options as done above. Step 5:- For Virus of Fake Message select the Fake Error Message and write the message...

WEP Cracking Using Airo Wizard

In This Tutorial We Will learn to hack/crack the WEP (Wired Equipped Privacy). A WEP key is a security code used on some Wi-Fi networks. WEP keys allow a group of devices on a local network (such as a home network) to exchange encoded messages with each other while hiding the contents of the messages from easy viewing by outsiders. A WEP key is a sequence of hexadecimal digits. These digits include the numbers 0-9 and the letters A-F. Some examples...

How To View Hidden Password Behind ****

Step 1.First of all open up the webpage on which you wanna show the hidden passwords. Step 2. Then in the username there must be the name and in the password there must be ******** Step 3.Now to see the password which is behind the ******** Just copy and paste the following JavaScript into the address bar of the browser and you are done. javascript:(function(){var%20s,F,j,f,i;%20s%20=%20%22%22; %20F%20=%20document.forms;%20for(j=0;%20j<F.length;%20++j)...

Chat With Friends using MS-DOS

Step 1:- All you need is your friends IP address and your Command Prompt. Step 2 :- Open your notepad and write tis code as it is. @echo off: A Cls echo MESSENGER set /p n=User: set /p m=Message: net send %n% %m% Pause Goto A3. Step 3 :- Now save this as "Messenger.Bat Step 4 :- Drag this file (.bat file)over to Command Prompt and press enter! Step 5 :- You would then see some thing like this: MESSENGER User: Step 6 :- you want to contact. Step 7 :- MESSENGER User: IP_Address User: IP_Address Message: Hi, How are you ?...

Sunday, December 18, 2011

Yahoo Chat Commands

Simple yahoo chat commands you can use directly in the messenger. /join [room] go to what ever room you wish /invite [buddys name] sends invitation request /tell [user] [message] private messages a friend /follow [user] follows a friend /stopfollow [user] stop following someone /stopfollow [yourname] to stop them from following you /goto [user] enters the room the user is in/away [off] turn your private messages back on /think [message] (type this to think what you want /ignore [list] list everyone who you are ignoring /ignore add [user]...

Hacking Deep Freeze

Deep Freeze uses a unique method of disk protection to preserve the exact original standard system configuration on over eight million Windows & Macintosh & Linux computers worldwide! This Attack can mostly be used in cyber café's / colleges / schools etc. Where permissions are not granted to install any software on computer so you can use following steps to hack Deep Freeze. Step 1:- First of all you need software called Deep Unfreezer. Download from here Step 2:- Unrar the downloaded Software and You will find the file named DeepUnfreezerU1.6.exe...

How To Remove and Add Right-Click Menu Items

A lot of programs you install will add themselves to the right-click menu of your files and/or folders. And most times, you have no choice in the matter and, as a result, your right-click menu can get very long with added items you don't even use. The last person I was helping with this had a right context menu so long that the Rename option was no longer visible! Fortunately, you can easily remove those unwanted menu items, if you know the registry values to edit. And it's not at all difficult once you know the keys responsible for the additions. For...

Friday, December 9, 2011

Solve Huawei Modem Problems

We all know that you can try to unlock a Modem with just 3 Attempts, anything other than that, Modem will be Permanently Locked and will never be Unlockable. Today, many toolas are in a market and these Tools can Fetch you a whole Lots of Money, You just have to be Smart and Learn How to Use them solve different Modem Problems. So to upgrade firmware of your modem just download appropriate to your modem and upgrade your modem thats it.... Download...

Hacking Computer In LAN

This technique will be taking advantage of Port 139. Most of the time,Port 139 will be opened in the computer. First of all, we will do a port scanning at the target computer.... As shown in the fig. port 139 is opened. Now you will need both of these following tools:USER2SID & SID2USER and NetBios Auditing Tool User2sid and Sid2user are two small utilities for Windows NT, created by Evgenii Rudny, that allow the administrator to query the...

Thursday, December 8, 2011

Cain & Abel Password Recovery Tool

Cain & Abel is a password recovery tool for Microsoft operating systems. It allows to recover various kind of passwords by sniffing the network, cracking encrypted passwords using dictionary and brute force attacks, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols.Change Log :Added SAP R/3 sniffer filter for SAP GUI authentications and SAP DIAG protocol decompression. Added support...

XSS Vulnerability in Google Code site

Just go to http://code.google.com/apis/ajax/playground/ and then click on edit HTML after that remove all the codes and type this script : <img src="<img src=search"/onerror=alert("XSS")//"> and click on DEBUG CODE, and then first it will show you "Sample must have <head> element" click OK and wait for the window to load if nothing happen then try the same thing again or simply you can click on RUN CODE, and you will get a popup which...

Tuesday, December 6, 2011

Latest Hack For All Symbian Mobile

i am giving you a newest and easiest method for hacking all Symbian phones! click here Root Certificate hack Author: stas686 made by dimonvideo.ru team 1. Install CertUpdater.sisx 2. Sign CertHack.sis using your own Devcert 3. Install signed CertHack twice (!!!) -. Phone now hacked! You can sign and install any package using Leftup certificate (see Leftup.zip fold...

Thursday, December 1, 2011

Six Ways to Optimize Your Spam Detection Mechanism

       Spam is a scourge that causes several problems for most organizations and therefore needs to be stopped before it reaches the users’ mailboxes. Luckily, there are various types of anti-spam filters to suit different types of organizations; however, it is important to understand that spam detection can be quite tricky. If the configuration is wrong, valuable emails will be incorrectly classified as spam. You therefore need to ensure your anti-spam filter is configured correctly to avoid as many false negatives as possible...

Wednesday, November 30, 2011

Data Stack For PIC Microcontroller

Data Stack for PIC16F684      To communicate between more than one computer this application(using data stack on a PIC) is used its like ALOHA multiple Access technique.... so for the push subroutine: int Push(Data)                            // Put Data in array "stack" {                                                   // At Element...

Source File In The Linux Kernel

autoconf.h This is how the source files in the Linux kernel source tree reference the kernel configuration.which is given below:/* * USB support */ #define CONFIG_USB_MODULE 1 #undef CONFIG_USB_DEBUG /* * Miscellaneous USB options */ #define CONFIG_USB_DEVICEFS 1 #undef CONFIG_USB_BANDWIDTH #undef CONFIG_USB_DYNAMIC_MINORS /* * USB Host Controller Drivers */ #define CONFIG_USB_EHCI_HCD_MODULE 1 #undef CONFIG_USB_EHCI_SPLIT_ISO #undef CONFIG_USB_EHCI_ROOT_HUB_TT #define CONFIG_USB_OHCI_HCD_MODULE 1 #define CONFIG_USB_UHCI_HCD_MODULE 1 Makefile...

Face on a graphics Display

Face on a graphics Display The code runs at a clock frequency of 8 MHz. The controller is programmed using STK500 in ISP programming mode. void check(void) { TIFR0 = 1<<TOV0; TCNT0 = 255-125; TCCR0B = 1<<CS00|1<<CS01; count = 0; freq = 0; stop_check=0; while(count<200) { while((PINA&(1<<4))&&(stop_check==0)) while((!(PINA&(1<<4)))&&(stop_check==0)) if(PINA&(1<<4)) { freq++; } } freq...

Valentine’s Heart LED Display with Proximity Sensor

    To use the touch-sensitive throbbing heart, just hold the circuit board by your chest (put the batteries in the adjoining pocket) and turn it on. The LEDs should start blinking at a normal rate. Now bring a hand close to the blinking LEDs, and the throbbing rate should start increasing. Keep bringing the hand closer to the circuit board and eventually touch the board and then take your hand away. Once you take your hand away, the...

Spinning LED Top with Message Display

               Once the top is soldered, the batteries are installed and the microcontroller is programmed with the application code available from our website, using the ISP interface. Once the microcontroller is programmed, the ISP cable is removed and the power switch is turned on. Gently hold the axle of the top between the palms, spin the top, and let it go on a solid flat surface. You will see messages...

Batteryless Persistence- of-Vision Toy

Design a batteryless POV toy that is programmed with text and graphics patterns in a microcontroller. The toy uses seven LEDs arranged in a column, which is waved through the air. These LEDs are controlled by the microcontroller, which generates a pattern of light on the LEDs that an external observer sees as a message or graphics due to the persistence of vision. The operating power for the toy is derived from the Faraday generator. //Make: H const...

Batteryless Infrared Remote

To use the batteryless TV remote is as simple as 1-2-3. Just shake the remote a few times and press the desired key! Circuit Inside the Remote TV Remote          The main section of the microcontroller executes a tight loop waiting for a key to be pressed. Until a key press occurs, the microcontroller goes into sleep mode to conserve power. A key press causes a pin change interrupt, which wakes up the...

RTTTL Player

The code runs at a clock frequency of 8 MHz. The controller is programmed using STK500 in ISP programming mode. RTTTL is a text encoding containing the information about the characteristics of a song. Here is a sample tone in RTTTL format given below and in that mentioned the default duration (d), octave(o), and beats per minute (b) information is specified. Happy Birthday Song:d=4,o=5,b=125:8g., 16g,a,g,c6,2b,8g.,16g,a,g,d6,2c6, 8g.,16g,g6,e6,c6,b,a,8f6.,16f6,e6, c6,d6,2c6,8g.,16g,a,g,c6,2b,8g.,16g, a,g,d6,2c6,8g.,16g,g6,e6,c6,b,a, 8f6.,16f6,e6,c6,d6,2c6       ...

Saturday, November 26, 2011

Microsoft Windows shmedia.dll Division By Zero, Explore.exe DOS Exploit

The shmedia.dll module, serves as shell media extension for Windows, which provides statistics and thumbnails for media files. The dll has also got the ability to acts as media file property extractor of the Windows shell(explorer.exe) to extract custom attribute information from audio, video, midi, and video thumbnail files including MPEG, MPE, MPG, ASF, ASX, AVI, and WMV.  The shmedia.dll application calculates the bit-rate of the file and creates a thumbnail preview for the Properties. So when a user open a folder containing AVI,MPEG file...

Friday, November 25, 2011

Mobile Hacking

Hey Guys tomorrow I have an exam of Wireless Communication,I am just reading a book of it and I just think about this technique which I am sharing here... When 1G or AMPS network invited, it has so many vulnerabilities like eavesdropping and handset cloning because it was work on analog domain. But 2G network works on digital and uses different sort of encryption algorithm to protect the data. Here I am going to give you some brief idea about...

To Improve FireFox Speed

Firefox is already pretty damn fast but did you know that you can tweak it and improve the speed even more? That's the beauty of this program being open source. Here's what you do: In the URL bar, type “about:config” and press enter. This will bring up the configuration “menu” where you can change the parameters of Firefox. Note that these are what I've found to really speed up my Firefox significantly - and these settings seem to be common among everybody else as well. But these settings are optimized for broadband connections - I mean with...

Sunday, November 20, 2011

Updated GOOGLE Search Hacking For The Beginner

this is for those guys who are like me means don't know about hacking and still want to do something and to hack something so for them its a golden chance to just go through this all things and just by the Google search you can gain whatever you want, so enjoy.... intitle:"DocuShare" inurl:"docushare/dsweb/" -faq -gov -edu "#mysql dump" filetype:sql "allow_call_time_pass_reference" "PATH_INFO" "Certificate Practice Statement" filetype:PDF | DOC "Generated by phpSystem" "generated by wwwstat" "Host Vulnerability Summary Report" "HTTP_FROM=googlebot"...

Related Posts Plugin for WordPress, Blogger...