This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Remove Unwanted Hidden Programs

If you want to remove programs that are installed with Windows but are not visible in "Add/Remove Windows Components" (such as MSN Messenger in WinXP), edit a file called "C:\WINDOWS\INF\SYSOC.INF". Go to: Start>> Run>> type in: C:\WINDOWS\INF\SYSOC.INF [Enter] In there you will find a listing of programs, and you will note that some programs have the word 'hide' at the end. Simply remove the word 'hide' but leave the preceding comma. Examples: BEFORE:msmsgs=msgrocm.dll,OcEntry,msmsgs.inf,hide,7 AFTER:msmsgs=msgrocm.dll,OcEntry,msmsgs.inf,,7 Exit...

Select theme and color scheme for welcome screen

With this tweaks you will be able to modify which color selection of the default theme is shown when the computer start up screen is displayed. Currently since there is only one theme you can only change the color scheme for the theme but in the future when more themes are available for XP you will be able to change which theme is used in the same place in the windows registry. 1. Start regedit, if you are unfamiliar with regedit please see our FAQ. 2. Navigate to HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\ThemeManager 3....

Sixteen Simple Tips

1.Switch to welcome screen Press Win+L to switch to the Welcome screen. 2.Lock your workstation Press Win+L to lock your workstation. 3.Switch user easly You can switch users without going through the Welcome screen: From Task Manager, go to the Users tab, right-click a user, and select Connect. 4.Hibrernate computer Hold down the shift key in the shutdown dialog to change "Stand By" to "Hibernate". Or just press H to hibernate instantly. You can even use the Power Control Panel to configure your power button to hibernate. 5.Disable...

Solve Hidden files does not appear After effected by virus

First Stopping the virus: u need to check the task manager to see if there is a (SVCHOST.EXE) running under the current logged in username and try to terminate it. Note: After u terminate the virus try not to double click on any of you computer driver coz this.... action will start the virus allover again, when u need to access any of ur drivers (Hard Disk Partition), type it's drive letter in the address bar and it will open without starting the virus process. Second Fixing the show hidden files and folders: ________________________________________...

Speed up Menu Display

• Click Start. Right-click My Computer, and then click Properties • Click the Advanced tab. In the Performance area, click Settings • On the Visual Effects tab in the Performance Options dialog box, clear the Fade or slide menus into view check box • Click OK. • In the System Properties dialog box, click OK.Now when you click a menu, it will appear almost instant...

Speed up the Start Menu

The default speed of the Start Menu is pretty slow, but you can fix that by editing a Registry Key. Fire up the Registry Editor and navigate to the following key: HKEY_CURRENT_USER \ Control Panel \ Desktop \ MenuShowDelay By default, the value is 400. Change this to a smaller value, such as 0, to speed it up. If this doesn't work for some reason, then you might try the following: Navigate to Display Properties then Appearance then Effects and turn off the option titled Show menu shadow. You will get much better overall performan...

Ten tips to increase your Windows Security

1- Always protect your Administrator account by creating password, just go to Control Panel > User Accounts, select your account and the click on "create a password for your account". 2- Protect your account by Password protect your screen saver, go to Control Panel > Display, Click on the Screen Saver tab and then check on resume password protect. 3- Setup a BIOS Password to protect your PC Setup application. 4- Always force you windows automatic update on, go to Control Panel > Automatic Updates and then Select the first option...

Turn off the Low Disk Space Notification

Open Registry by going to START-RUN and entering REGEDIT and Navigate to HKEY_CURRENT_USER and in Software – Microsoft – Windows – CurrentVersion – Policies - Explorer, and set the value of NoLowDiskSpaceChecks to DWORD = 1. (This modification requires a logoff or reboot to wo...

Want to Improve Shutdown Time

Close apps automatically & quickly at shutdown Open Registry by going to START-RUN and typing REGEDIT. Navigate to HKEY_CURRENT_USER\CONTROL PANEL\DESKTOP and look for AutoEndTasks. On my computer default value is 0. Change it to 1. Thats all. Further more you can reduce the time it takes for Windows to issue kill directive to all active/hung applications. In doing this only constraint that you should make sure exists is that HungAppTimeout is greater than WaitToKillAppTimeout. Change the values of WaitToKillAppTimeout to say 3500...

Windows Utilities Shortcuts

Here are some popular shortcuts to handy Windows utilities: Simply type the shortcut command in to the Run textbox (Start>> Run), then click OK. Shortcut Utility compmgmt.msc Computer Management devmgmt.msc Device Manager dfrg.msc Disk Defragmenter diskmgmt.msc Disk Management eventvwr.msc Event Viewer fsmgmt.msc Shared Folders Manager gpedit.msc Group Policies Editor lusrmgr.msc Local Users and Groups Manager perfmon.msc Performance Monitor secpol.msc Local Security Settings services.msc...

You Cannot Create a Folder Named CON !!

It is fact that you cannot create a folder named "CON", nor can you rename an existing folder to "CON". "CON" and a number of other character strings are in fact reserved names that go back to the days of DOS and cannot be used to name folders or files. Other reserved names are: * PRN * AUX * NUL * LPT1 * COM1 * Potential drive letter - A: to Z: * A number of others If you try to name a folder using one of these reserved names, the name will automatically revert to the default, generally "New Folder". Moreover, if you try to use a reserved...

Useful Direct Links

Kaspersky http://dnl-eu10.kaspersky-labs.com/devbuilds/ Bitdefender http://download.bitdefender.com/windows/ http://download.bitdefender.com/updates/ http://download.bitdefender.com/SMB/ AVG http://download.grisoft.cz/softw/80free/update/ Symantec Ebooks & Guide ftp://ftp.symantec.com/public/english_us_canada/products/ Mozilla Firefox http://releases.mozilla.org/pub/mozilla.org/firefox/releases/ Opera ftp://mirror-fpt-telecom.fpt.net/mirror/opera/win/ HP Drivers ftp://ftp.hp.com/pub/softlib/software1 ftp://ftp.hp.com/pub/softlib/software2 ftp://ftp.hp.com/pub/softlib/software3 ...10 IBM...

Firefox Tricks & Tweaks

The about:config page contains most (if not, all) of Firefox configuration options. It is so far the most effective, and the most powerful way to tweak and enhance your Firefox performance. Here are some of the popular tweaks. Accessing your about:config page In your Firefox, type about:config in the address bar. You will be shown a warning page. Click the “I’ll be careful, I promise!” button to proceed. On the main page, you will see a long list of configuration entries. Enter the name of the key you want to update in the “Filter” field....

Hack Youtube To Watch the Best Quality Videos

Whenever you connect to my youtube channel (http://www.youtube.com/), if you see some videos can not watch with high quality, you can use this TIPS ... Step1: Click to video that you want to see, the link will display on Address bar. E.x: http://www.youtube.com/user/wildminer?blend=6&ob=4 Step2: Add &fmt=6 to the end of that string. That address like: http://www.youtube.com/user/wildminer?blend=6&ob=4&fmt=6 Enjoy it ! The higher quality video !!! Step3: Add &fmt=18 to the end of that string, you'll have the best quality...

Be Careful Before You ‘Like’ This on Facebook

Warning: If you receive news feed carrying any of the following links ‘Liked’ by any of your Facebook friends, don’t click on the link to check it out. It’s a clickjacking worm attack spreading through the ‘Like’ option and has affected hundreds of thousands of users. These messages include: “LOL This girl gets OWNED after a POLICE OFFICER reads her STATUS MESSAGE,” “This man takes a picture of himself EVERYDAY for 8 YEARS!!,” “The Prom Dress That Got This Girl Suspended From School” and “This Girl Has An Interesting Way Of Eating A Banana...

Speed up your PC

You may recognize that your system gets slower and slower when playing and working a lot with your pc. That's cause your RAM is full of remaining progress pieces you do not need any more. So create a new text file on your desktop and call it .. "RAMcleaner" or something... Type “FreeMem=Space(64000000)” in this file and save it as “RAMcleaner.vbs” [ You may choose the "All Files" option when you save it ] Run the file and your RAM will be cleaned, Of course you can edit the code in the file for a greater "cleaning-progress". FreeMem=Space(128000000) Just...

Hack Admin Password From User Mode

Hack Admin Password From User Mode Disclaimer: Use this article for eductational purpose ONLY. Follow these steps: 1. Open command prompt (Start->Run->cmd), 2. Enter the following command, then press ENTER 3. Enter the followin command, then press ENTER: compmgmt.msc This should open the computer management console. 4. Go to local users & groups->users. Right click on any user and select "set password". If you get a "access denied" do the following: start>run>cmd then use following commands 1) net user test /add (this command...

How To Create A Hidden User Account

This tweak allows an account that is normally displayed on the Welcome screen to be hidden from view. To log on using the account it's necessary to use the Log On To Windows dialog box similar to the one in Windows 2000. #[Start] [Run] [Regedit] #Registry Key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\Winlogon\SpecialAccounts\UserList #Modify/Create the Value Data Type(s) and Value Name(s) as detailed below . #Data Type: REG_DWORD [Dword Value] // Value Name: Type Name of Account to be Hidden #Setting for Value data:...

How to lock your computer

Creating a desktop shortcut for locking your computerIf you use your computer in an area where others may have access to it, and there are things on your system you would rather have kept confidential, locking your desktop when you leave the computer is an essential task. Here's a recipe for a desktop shortcut that will lock your computer in two easy clicks: Right click on an empty area of the desktop and choose 'new' then 'shortcut.' The create shortcut wizard will open; in the first text box, type '%windir%\System32\rundll32.exe user32.dll,LockWorkStation'...

Address Resolution Protocol (ARP) Attacks

-: Address Resolution Protocol (ARP) Attacks :- What Does ARP Mean? Address Resolution Protocol (ARP) is a stateless protocol, was designed to map Internet Protocol addresses (IP) to their associated Media Access Control (MAC) addresses. This being said, by mapping a 32 bit IP address to an associated 48 bit MAC address via attached Ethernet devices, a communication between local nodes can be made. On a majority of operating systems, such as Linux, FreeBSD, and other UNIX based operating systems, and even including Windows, the "arp" program...

Bypassing Windows-XP Firewall

There is a technique using which we can bypass windows-xp service pack-2 firewall.This techniques is nothing but the vulnerability found in windows-xp sp2 firewall. This is explained here in detail with exploit code. Windows XP Firewall Bypassing (Registry Based) :- Microsoft Windows XP SP2 comes bundled with a Firewall. Direct access to Firewall's registry keys allow local attackers to bypass the Firewall blocking list and allow malicious program to connect the network. * Microsoft Windows XP SP2 Windows XP SP2 Firewall has list of allowed...

ClickJacking attacks

Definition :- "Clickjacking is a malicious technique of tricking web users into revealing confidential information or taking control of their computer while clicking on seemingly innocuous web pages." - Wikipedia Introduction :- A vulnerability across a variety of browsers and platforms, a clickjacking takes the form of embedded code or script that can execute without the user's knowledge, such as clicking on a button that appears to perform another function. The long list of vulnerabilities involves browsers, Web sites and plug-ins like...

COMPLETE DETAILS ABOUT The TROJON HORSE

What is a Trojan ? "A Trojan Horse, or Trojan, is a term used to describe malware that appears, to the user, to perform a desirable function but, in fact, facilitates unauthorized access to the user's computer system". - Wikipedia "A Trojan horse is an apparently useful program containing hidden functions that can exploit the privileges of the user [running the program], with a resulting security threat.". - CERT Advisory Types of Trojan :- The different types of Trojan Horses are as follows- 1) Remote Access Trojans :- Abbreviated...

Create An Ftp Server On Your PC

Process-1: First of all u have to get an static IP-Address. Need a a static ip-address for ur FTP Server.Necessity for getting this static ip-address is ur not suppose to use ur own IP-Address.The main reason is u dont want to show ur IP-Address to everyone , there are many other reasons too but leave them aside.. 1) Goto no-ip & create urself a free account. 2) Now ur account been created & ll receive ur account password via mail to ur email address. 3) After getting ur password login to ur account of no-ip.com 4.After getting...

Create Your Own Instant Messenger Bot

-: Creating IM Bot :- This quick tutorial will show you how to develop your own functional IM bot that works with Google Talk, Yahoo! Messenger, Windows Live and all other popular instant messaging clients. To get started, all you need to know are some very basic programming skills (any language would do) and web space to host your “bot”. For this example, I have created a dummy bot called “insecure” that listens to your IM messages. To see this live, add insecure@bot.im to your GTalk buddy list and start chatting. f you like to write...

Dangerous Google Searching Trick - How To Find Almost Everything Using Google

Using this Dangerous Searching Technique You will be able to find everything like music,movies,cracks,full softwares,games,keygens.... In short everything... So To Know More read on... DANGEROUS SEARCHING TECHNIQUES In this Technique I will Show you How To Find files Using Various Hosts such as rapidshare, megaupload, hotfile etc.... You can choose your favourite host that you want... So Let's Say You want to Download a Game say "Need for speed" (or anyother thing of your choice)... STEPWISE DESCRIPTION: 1. Go to the Site www.google.com 2....

Some Ethical Hacking eBooks

-: Hacking Exposed-5 :- One of the international best-selling. The book walks through how to use the more powerful and popular hacker software, including L0phtCrack. This new edition has been updated extensively, largely with the results of "honeypot" exercises (in which attacks on sacrificial machines are monitored) and Windows 2000 public security trials. There's a lot of new stuff on e-mail worms, distributed denial-of-service (DDoS) attacks, and attacks that involve routing protocols. Hacking Exposed wastes no time in explaining...

Folder Lock Without Any Software

Folder Lock With Password Without Any Software- Paste the code given below in notepad and 'Save' it as batch file (with extension '.bat'). Any name will do. Then you see a batch file. Double click on this batch file to create a folder locker. New folder named 'Locker' would be formed at the same location. Now bring all the files you want to hide in the 'Locker' folder. Double click on the batch file to lock the folder namely 'Locker'. If you want to unlock your files,double click the batch file again and you would be prompted for password. Enter...

How to Hack a MySpace Account

MySpace is one of the most widely used Social Networking website by many teenagers and adults acropss the globe. I have seen many cheaters create secret Myspace accounts in order to exchange messages with another person and have secret relationships. So, it’s no wonder many people want to know how to hack a Myspace account. In this post I’ll give you the real and working ways to hack a Myspace. THINGS YOU SHOULD KNOW BEFORE PROCEEDING With my experience of about 6 years in the field of Hacking and IT security, I can tell you that there...

Increase Virtual RAM - To Make Your System Faster 100 percent works

Follow the steps given below :- 1) Hold down the 'Windows' Key and Press the 'Pause/Break' button at the top right of your keyboard. Another way is Right-Clicking 'My Computer' and then Select 'Properties'. 2) Click on the 'Advanced' tab. 3) Under 'Performance', click 'Settings'. 4) Then click the 'Advanced' tab on the button that pops up. 5) Under 'Virtual Memory' at the bottom, click 'Change'. 6) Click the 'Custom Size' button. 7) For the initial size (depending on your HD space), type in anywhere from 1000-1500 (although I use 4000),...

Input Validation Attacks

Input Validation Attacks are where an attacker intentionally sends unusual input in the hopes of confusing the application.The most common input validation attacks are as follows- 1) Buffer Overflow :- Buffer overflow attacks are enabled due to sloppy programming or mismanagement of memory by the application developers. Buffer overflow may be classified into stack overflows, format string overflows, heap overflows and integer overflows. It may possible that an overflow may exist in language’s (php, java, etc.) built-in functions. To execute...

Latest Airtel Hack

Now a days Airtel gives New option to the Subscriber to access Mobile Office daily @ Rs.25.00/- per day. But this is too Costly.Only 24 hours and the cost is Rs.25.00 Oh GOD!! But I got a Trick that’s help me to Activate my Mobile Office whole 30 days only for 25.00/. Its really good. Just follow the Trick- 1) Your account balance should be above 25.00 for the first time. 2) Activate your mobile office by dialing *444*1#. You will Activate your Mobile Office in the Morning. 3) You got an Activation msg. Your account should deducted by Rs. 25.00/- 4)...

NetBIOS Hacking

NetBIOS stands for "Network Basic Input Output System". It was originally developed by IBM and Sytek as an Application Programming Interface (API) for client software to access LAN resources. By default it runs on port 139. NetBIOS gives the various information of the computers on a network, which includes computer name, username, domain, group, and many others.....! The NBTSTAT Command :- NBTSTAT is the command for manually interact with NetBIOS Over TCP/IP. All the attributes (switches) used with nbtstat command and their usage can be viewed. At...

Network Hacking

Network Hacking is generally means gathering information about domain by using tools like Telnet, NslookUp, Ping, Tracert, Netstat, etc.It also includes OS Fingerprinting, Port Scaning and Port Surfing using various tools. Ping :- Ping is part of ICMP (Internet Control Message Protocol) which is used to troubleshoot TCP/IP networks. So, Ping is basically a command that allows you to check whether the host is alive or not. To ping a particular host the syntax is (at command prompt)-- c:/>ping hostname.com example:- c:/>ping www.google.com Various...

Network Hacking (Port Scanning)

Port Scanning :- Port scanning is carried out to determine a list of open ports on the remote host that have certain services or daemons running. In port scanning, the attacker connects to various TCP and UDP ports and tries to determine which ports are in listening mode. 1) TCP Ports Scanning :- Almost all port scans are based on the client sending a packet containing a particular flag to the target port of the remote system to determine whether the port is open. Following table lists the type of flags a TCP packet header can contain. Flag...

Password Hacking

Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password.Most passwords can be cracked by using following techniques : 1) Hashing :- Here we will refer to the one way function (which may be either an encryption function or cryptographic hash) employed as a hash and its output as a hashed password. If a system uses a reversible function to obscure stored passwords, exploiting that weakness can recover...

Rapidshare Hack,No waiting for 15 mins

-: Rapidshare Hack :- There are two hacks to beat Rapidshare download limits and waiting time. 1) Rapidshare Hack (For Firefox Users) :- The hot new Firefox plug-in takes browser customization to a whole new level by letting users filter site content or change page behaviors. The glory of open-source software is that it allows anyone with the inclination and the scripting knowledge to get under the hood and hot-rod their computing environment. But most of the time, that advantage is available only to people with the programming skills to...

Reveal Passwords Using Javascript

Want to Reveal the Passwords Hidden Behind Asterisk (****) ? Follow the steps given below- 1) Open the Login Page of any website. (eg. http://mail.yahoo.com) 2) Type your 'Username' and 'Password'. 3) Copy and paste the javascript code given below into your browser's address bar and press 'Enter'. javascript: alert(document.getElementById('Passwd').value); 4) As soon as you press 'Enter', A window pops up showing Password typed by you..! Note :- This trick may not be working with firef...

Shutdown Command Via Command Prompt

The 'Shutdown' Command Becomes More Flexible and Automated when used from the Command Prompt. To Run the 'Shutdown' command from the command prompt, go to 'Start > Run', type 'cmd', and press 'Enter'. In the black box (the command prompt) type 'Shutdown' and the Switches you want to use with the 'Shutdown' command. You have to use at least one switch for the shutdown command to work. The Switches :- The 'Shutdown' command has a few options called Switches. You can always see them by typing 'shutdown -?' in the command prompt if you forget...