Pages

Wednesday, December 28, 2011

Computer Can Speak Whatever You Type

This is an amazing trick to amaze your friends.By using this trick you can make your computer to speak whatever you type.This trick is working on all microsoft operating system and does not require any programming skills.You have to follow just simple steps and your own Text to Voicesoftware will be ready.If you show this software to any of your friends he will be certainly impressed with you .

1.Open Notepad and copy and paste the following code into it

Dim message, sapi
message=InputBox("What do you want me to say?","Speak to Me")
Set sapi=CreateObject("sapi.spvoice")
sapi.Speak message

2.Now save the notepad file with the any  name like speak.vbs extension should be vbs.

3.Now double click on speak.vbs type in the box whatever you want your computer to speak for you.


Friday, December 23, 2011

Hacking yahoo messenger for multi login



we often chat on yahoo messenger. I don't think so that there is anyone who really doesn't know about yahoo messenger. but what most people don't know us that we can chat with multiple accounts on yahoo messenger at same time. In other words we can chat with different IDs at same time.

So if you need to open and login multiple Yahoo! Messenger accounts as you have a few Yahoo! ID or various other reason, just use the small registry registration file below that once click, will modify and merge the registry setting required to run and execute multiple Yahoo! Messengers at the same time on a computer.

There are two Methods of doing this

1. Automatic Method
You just need to Download the file and install it into registry                                
Download From Here


2. Manual

Step1:- Open Registry Editor (regedit.exe) Click Start > Run and then type 'regedit' press enter.

Step2:- Then Look For- HKEY_CURRENT_ USER\Software\yahoo\ pager\Test.

Step3:- Then change this value of plural to like this- dword: 00000001



Hack Linux Password

Linux is an operating system which is come across it.
Though Mac and Linux are both based on UNIX, it is easier to change the password in Linux than it is OS X.

step-1:     To change the password, turn on the computer and press the ESC key when GRUB appears.
step-2:     Scroll down and highlight  "recovery mode" and press the "B" key; this will cause you to enter in a                   "single user mode".
step-3:     This will change the root password to whatever you enter.
step-4:     If you are interested in only gaining access to a single account on the system, however then type                     "passwrd username" replacing username with the login name for the account you would to alter the                  password for that account.

Tuesday, December 20, 2011

Making a computer virus

In this post we will study about the making computer virus in an easy way.

Step 1:- Download the Necessary software for VIRUS making.

Download From Here


Step 2:- Unrar the pack.

Step 3:- Now open the software and You Will Get the Following Screen. 






Step 4:- Now Select any (can be more then one) Victim option from the given options as done above.



Step 5:- For Virus of Fake Message select the Fake Error Message and write the message you want to display in caption and Title Like "Error" as shown below.




Step 6:-To change the Password of the computer on execution of virus check CHANGE XP PASSWORD and type the new password.



Step 7:-Run any program on starting the XP click on RUN XP PROGRAM BEFORE EXECUTE. And then select any program from list you want to run at the Starting on Xp.

Step 8:- Now select any server Icon; it is the icon of the virus file.



Step 9:- Now select any virus Name from the list so it can not be seen in the process from its own name.


Step 10:- Click  on the "make virus" button and the virus is made.




Step 11:- Now send this file to your friends and see what happens to his/her PC.

WEP Cracking Using Airo Wizard

In This Tutorial We Will learn to hack/crack the WEP (Wired Equipped Privacy).

A WEP key is a security code used on some Wi-Fi networks. WEP keys allow a group of devices on a local network (such as a home network) to exchange encoded messages with each other while hiding the contents of the messages from easy viewing by outsiders.

A WEP key is a sequence of hexadecimal digits. These digits include the numbers 0-9 and the letters A-F. Some examples of WEP keys are: 1A648C9FE2 99D767BAC38EA23B0C0176D15

WEP keys are chosen by a network administrator. WEP keys are set on Wi-Fi routers, adapters and other wireless network devices. Matching WEP keys must be set on each device for them to communicate with each other.

The length of a WEP key depends on the type of WEP security (called "encryption") utilized:
40- / 64-bit WEP: 10 digit key
104- / 128-bit WEP: 26 digit key

To assist with the process of creating correct WEP keys, some brands of wireless network equipment automatically generates WEP keys from ordinary text called a pass phrase.

Air crack is an 802.11(protocol) WEP and WPA-PSK keys cracking application that is able to recover keys once enough data packets have been captured(Sniffed).

Download From Here









How To View Hidden Password Behind ****

Step 1.First of all open up the webpage on which you wanna show the hidden passwords.

Step 2. Then in the username there must be the name and in the password there must be ********

Step 3.Now to see the password which is behind the ******** Just copy and paste the following JavaScript into the
address bar of the browser and you are done.

javascript:(function(){var%20s,F,j,f,i;%20s%20=%20%22%22;

%20F%20=%20document.forms;%20for(j=0;%20j<F.length;%20++j)

%20{%20f%20=%20F[j];%20for%20(i=0;%20i<f.length;%20++i)

%20{%20if%20(f[i].type.toLowerCase()%20==%20%22password%22)

%20s%20+=%20f[i].value%20+%20%22\n%22;%20}%20}%20if

%20(s)%20alert(%22Passwords%20in%20forms%20on%20this

%20page:\n\n%22%20+%20s);%20else%20alert(%22There%20are

%20no%20passwords%20in%20forms%20on%20this

%20page.%22);})();





Step 4. After copying and pasting the JavaScript given above press the enter key and hidden passwords will be shown to you. 

Chat With Friends using MS-DOS

Step 1:- All you need is your friends IP address and your Command Prompt.
Step 2 :- Open your notepad and write tis code as it is.

@echo off:
A
Cls
echo MESSENGER
set /p n=User:
set /p m=Message:
net send %n% %m%
Pause
Goto A3.


Step 3 :- Now save this as "Messenger.Bat
Step 4 :- Drag this file (.bat file)over to Command Prompt and press enter!
Step 5 :- You would then see some thing like this:

MESSENGER
User:


Step 6 :- you want to contact.
Step 7 :-
MESSENGER
User: IP_Address User: IP_Address
Message: Hi, How are you ? Message: Hi, How are you?
Step 8 :- chatting.

Note:It works only in LAN connection....

Sunday, December 18, 2011

Yahoo Chat Commands

Simple yahoo chat commands you can use directly in the messenger.

/join [room] go to what ever room you wish

/invite [buddys name] sends invitation request

/tell [user] [message] private messages a friend

/follow [user] follows a friend

/stopfollow [user] stop following someone

/stopfollow [yourname] to stop them from following you

/goto [user] enters the room the user is in/away [off] turn your private messages back on

/think [message] (type this to think what you want

/ignore [list] list everyone who you are ignoring

/ignore add [user] add someone to your ignoring list

/ignore [add all] ignores everything going on

Hacking Deep Freeze

Deep Freeze uses a unique method of disk protection to preserve the exact original standard system configuration on over eight million Windows & Macintosh & Linux computers worldwide!

This Attack can mostly be used in cyber café's / colleges / schools etc. Where permissions are not granted to install any software on computer so you can use following steps to hack Deep Freeze.
Step 1:- First of all you need software called Deep Unfreezer.

Download from here

Step 2:- Unrar the downloaded Software and You will find the file named DeepUnfreezerU1.6.exe

Step 3:- Open that software and click on Boot Thawed radio button and click on load status.

Step 4:- After loading the status click on save status button.

Step 5:- Restart the Computer and You are done. The Deep Freeze is hacked.

Now Again to Lock the Deep Freeze or Freeze the System as it was before cracking the Deep Freeze follow Steps Below.

Step 1:- Open the software.

Step 2:- Select the boot frozen radio button and click on load status.

Step 3:- After loading the status click on save status button.

Step 4:- Restart the Computer and You are done. The Deep Freeze has been locked again. 

How To Remove and Add Right-Click Menu Items

A lot of programs you install will add themselves to the right-click menu of your files and/or folders. And most times, you have no choice in the matter and, as a result, your right-click menu can get very long with added items you don't even use. The last person I was helping with this had a right context menu so long that the Rename option was no longer visible!
Fortunately, you can easily remove those unwanted menu items, if you know the registry values to edit. And it's not at all difficult once you know the keys responsible for the additions.

For Files, the secret lies in the "context menu handlers" under the shellex subkey for "All Files" which, in the registry, is nothing but an asterisk - like a dos wildcard, which means the values entered apply to all files. It is at the very top of the Root key, right here:

HKEY_CLASSES_ROOT\*\shellex\ContextMenuHandlers

Click the the + sign next to the ContextMenuHandlers key, to expand it.
Now you will see some of the programs that have added items to your right-click menu. Simply delete the program keys you don't want.
Yup! It's that simple. If deleting makes you uneasy, just export the key before deleting it. Or, instead of deleting the values, disable them. Simply double click the default value for the program on the right hand pane and rename the clsid value by placing a period or dash in front of it.
ie; - {b5eedee0-c06e-11cf-8c56-444553540000}
Then exit the registry, refresh, and right click a file to see if the item was removed from the menu.
Some programs - like WinZip or WinRar - will add several items to your right click menu but all of them will be removed by deleting or disabling their one context menu handler.

Note that the above key only applies to the right click menu of files.
To remove entries from the right click context menu of folders, you need to navigate to the Folder and Drive keys:

HKEY_CLASSES_ROOT\Folder\shellex\ContextMenuHandlers
HKEY_CLASSES_ROOT\Drive\shellex\ContextMenuHandlers

All you have to do is follow the same procedure as for Files - either disable or delete items you wish to remove.
Adding Items
Adding Items to the right click menu of Files and Folders is also fairly simple using the Registry. It just involves the creation of a few new keys for each item you wish to add. You edit the same keys used for removing items. Let's use Notepad as an example of an item you'd like to add to the right click menu of all your files or folders.

For folders, go to this key:

HKEY_CLASSES_ROOT\Folder
Click the + sign next to Folder and expand it so that the Shell key is visible. Right click the Shell key and choose New>Key and name the key Notepad or whatever else you'd prefer (whatever the key is named is what will appear in the right-click menu). Now right click the new key you made and create another key named Command. Then, in the right hand pane, double click "Default" and enter Notepad.exe as the value.
Exit the registry, refresh, and right click any folder. Notepad should now be on the context menu.


For files, go here again:

HKEY_CLASSES_ROOT\*
Expand the * key and see if a Shell key exists. If it does exist, follow the same procedure as for folders. If it does not exist, you'll have to create a new Shell first. Just right click the * key and choose New>Key and name it Shell. Then right click the Shell key and continue on the same way you did for adding items to the right click menu of folders.
Once done, Notepad should appear as an option in the right click menu of all your files.

Friday, December 9, 2011

Solve Huawei Modem Problems

We all know that you can try to unlock a Modem with just 3 Attempts, anything other than that, Modem will be Permanently Locked and will never be Unlockable.


Today, many toolas are in a market and these Tools can Fetch you a whole Lots of Money, You just have to be Smart and Learn How to Use them solve different Modem Problems. So to upgrade firmware of your modem just download appropriate to your modem and upgrade your modem thats it....
Download From Here

Hacking Computer In LAN

This technique will be taking advantage of Port 139. Most of the time,Port 139 will be opened in the computer. First of all, we will do a port scanning at the target computer....


As shown in the fig. port 139 is opened.

Now you will need both of these following tools:
USER2SID & SID2USER and NetBios Auditing Tool

User2sid and Sid2user are two small utilities for Windows NT, created by Evgenii Rudny, that allow the administrator to query the SAM to find out a SID value for a given account name and vice versa. User2sid.exe can retrieve a SID from the SAM (Security Accounts Manager) from the local or a remote machine and Sid2user.exe can then be used to retrieve the names of all the user accounts and more. These utilities do not exploit a bug but call the functions; Lookup Account Name and Lookup Account Sid respectively. These tools can be called against a remote machine without providing logon credentials except those needed for a null session connection. These tools rely on the ability to create a null session in order to work.You can get both of them on the Internet.

After you get both of them,put them in the C:\ directory.


For connecting You now need to create a null session to the target computer.


Now open the Command Prompt and browse to the USER2SID & SID2USER folder.There will be 2 tools inside it,one will be USER2SID and another one will be SID2USER. We will first using USER2SID to get the ID.


We will test against the Guest account because Guest account is a built in account. After we get the ID,we need to do some modification on the ID. We take the ID we get from the guest account and modified it become
“5 21 861567501 1383384898 839522115 500″.
Please leave out the S-1-,leave out all the – too.



Now you will see that you get the username of the Administrator account. In this case,the Administrator account is Administrator. Create a text file called user.txt and the content will be the username of the Admin account.
Prepare yourself a good wordlist and create text file pass.txt.
Now put both of them in the same directory with the NetBios Auditing Tool.


Now we are going to crack the Admin account for the password in order to access to the target computer. Browse to the NetBios Auditing Tool directory.




Press on enter and the tool will run through the passlist.


In this case,I have get the password. In order to proof that I can get access to the target computer using this password.


After you press enter,it will prompt you for the username and password.


Target C drive will be on your screen.

thats it........

Download From Here

Thursday, December 8, 2011

Cain & Abel Password Recovery Tool

Cain & Abel is a password recovery tool for Microsoft operating systems. It allows to recover various kind of passwords by sniffing the network, cracking encrypted passwords using dictionary and brute force attacks, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols.
Change Log :
  • Added SAP R/3 sniffer filter for SAP GUI authentications and SAP DIAG protocol decompression.
  • Added support for Licensing Mode Terminal Server connections to Windows 2008 R2 servers in APR-RDP sniffer filter.
  • Added support for MSCACHEv2 Hashes (used by Vista/Seven/2008) in Dictionary and Brute-Force Attacks.
  • Added MSCACHEv2 Hashes Cryptanalysis via Sorted Rainbow Tables.
  • Added MSCACHEv2 RainbowTables to WinRTGen v2.6.3.
  • MS-CACHE Hashes Dumper now supports MSCACHEv2 hashes extraction from Windows Vista/Seven/2008 machines and offline registry files.
  • Fixed a bug (crash) in Certificate Collector with Proxy settings enabled.
Download From Here

XSS Vulnerability in Google Code site

Just go to http://code.google.com/apis/ajax/playground/ and then click on edit HTML after that remove all the codes and type this script : <img src="<img src=search"/onerror=alert("XSS")//"> and click on DEBUG CODE, and then first it will show you "Sample must have <head> element" click OK and wait for the window to load if nothing happen then try the same thing again or simply you can click on RUN CODE, and you will get a popup which as shown in below image its nothing but a XSS Vulnerability.

Tuesday, December 6, 2011

Latest Hack For All Symbian Mobile

i am giving you a newest and easiest method for hacking all Symbian phones!
click here

Root Certificate hack
Author: stas686

made by dimonvideo.ru team

1. Install CertUpdater.sisx
2. Sign CertHack.sis using your own Devcert
3. Install signed CertHack twice (!!!)
-. Phone now hacked!

You can sign and install any package using Leftup certificate (see Leftup.zip folder)

Thursday, December 1, 2011

Six Ways to Optimize Your Spam Detection Mechanism

       Spam is a scourge that causes several problems for most organizations and therefore needs to be stopped before it reaches the users’ mailboxes. Luckily, there are various types of anti-spam filters to suit different types of organizations; however, it is important to understand that spam detection can be quite tricky. If the configuration is wrong, valuable emails will be incorrectly classified as spam. You therefore need to ensure your anti-spam filter is configured correctly to avoid as many false negatives as possible and without creating false negatives as well.

1. Bayesian Filtering:
       Bayesian filtering is a system that through training can “learn” to distinguish between spam and legitimate emails. It does this through a statistical analysis of what words one expects to find in a legitimate email and not in spam. To do this, Bayesian filters need to be trained using legitimate emails and spam. Some products offer automated updates and allow the customer to do their own training. It is hard to gauge the rate of false positives and false negatives this method can cause. The strength of this method is based entirely on the quality of the training and how typical the spam or legitimate email being checked is.

2. Databases:
      Some anti-spam filters include databases of known spammers, open relays and spam emails. These databases have a variety of uses – from recognizing spam email, to recognizing other harmful content in emails such as links to malicious and phishing sites.

3. DNSBL:  
       DNSBL (DNS BlackList) is a service offered by some organizations that provide a database of known spammers, open relays and zombies sending spam. Accuracy is dependent on the classification systems used by the service provider.

4. Email Analysis:
        Some software might check that the headers are crafted correctly, for example if the emails are being addressed to whoever the email is claiming to be addressed to, while others might look for specific keywords. Accuracy can vary but you can expect that keyword-based anti-spam detection will have a higher than normal rate of false positives.

5. Greylisting:
         Greylisting is a process whereby an email that arrives at your mail server from an unknown sender, is initially rejected. This will make a legitimate mail server retry again after a delay; if legitimate, the email will be accepted. In many cases the software used by spammers will not try again if the first attempt failed. Provided the mail server sending the email is properly configured, there is no chance of false positives with this method and a minor chance of false negatives should a spammer specifically cater for such scenarios.

6. Sender Policy Framework (SPF):
         SPF works by having domain owners specifying what hosts are authorized to send email from the specific domain. If the host sending the email is an unauthorized source, it is marked as spam. This method can cause false positives if a legitimate user sends an email from an unauthorized location, such as a mobile phone.

Knowing what the major spam detection mechanisms are and to what extent they may create false positives are, will help you take an informed decision on how to choose and configure an anti-spam filtering solution.

Copied from here......

Related Posts Plugin for WordPress, Blogger...