Wednesday, July 28, 2010

Free browsing n downloading

Yeah !!! Once Again Free Browsing And Downloading through Airtel Live !


Hello Friends, After Many Days Of Trying and Trying ... I finally got one more way of Free Browsing And Downloading through Airtel live
Its Working for Me at High Speed On 0 Balance...
The Method is open any site for free with Airtel live with this url

http://59.160.228.22/index.php?p= Your Site Name

e.g

http://59.160.228.22/index.php?p=google.Com
or

http://59.160.228.22/index.php?p=http://m.vcricket.com

etc

I have Personally checked it both browsing and Downloading are working..

Again It uses redirection Technology for Parsing urls.

ENJOY AS SOON AS AIRTEL STOPS.
Increase Pc speed

1.Start->Run->type msconfig & pres enter

2.Now disable all unwanted services dat load at startup

3.apply settings & Restart.

ENJOY

Top 12 Software Companies in India

This topic for it student or software engineers

Top 12 Software Companies in India

*TCS
*INFOSYS
*WIPRO
*MAHINDRA
*HCL
*PATNI
*I-FLEX
*PEROT SYSTEM
*POLARIS
*HEXAWARE.

Trace mobile,vehicle,ip everything

Here u can Trace everything related to below category

-Mobile Number
-Vehicle Number
-Pincode
-IP address
just go to
http://www.indiatrace.com

ENJOY

Tell ur frns to JOIN US.
GooD evening

Call_MAGIC:

Call_MAGIC:
COIN BOX,Free Calling Trick
*Insert Coin
*Press 0,#,#,Ph no,*
*Talk,No Limit
*And Disconnect
*Then u Get Your COIN Back

ENJOY as soon as this trick banned

Call_MAGIC:

Call_MAGIC:
COIN BOX,Free Calling Trick
*Insert Coin
*Press 0,#,#,Ph no,*
*Talk,No Limit
*And Disconnect
*Then u Get Your COIN Back

ENJOY as soon as this trick banned

Tuesday, July 13, 2010

FREE RELIANCE TV SOFTWARE for mobile

Hello friends, as we all know that there are channels links post in our forum before which worked free with reliance GSM. But some of the channels had stop working for some of the members. So here i have assembled all the channels known to me which were working free with reliance in one software with the help of rokplayer. Juz open it and juz click on name of the channel, it will start streaming. Dont update the channels, moreover i have fixed all the channels which were'nt working for members including star cricket, espn. Dont consider it a repost, juz download it and enjoy it.

Easy way to hide ur things

A simplest way to hide any folders or making your data in pendive invisible or locked

just

Monday, July 12, 2010

Free mms in airtel

This is very simple trick
1-your handset should be gprs compatible
2-active mms service by calling ur cc or by sms
3-then just type MM and send it to 54321(toll free no.)
this trick already tested in delhi

ENJOY

How to make a toolbar [Tut]™



How to make your own toolbar for mozzilla firefox and internet explorer.
go to

http://www.conduit.com

Sign up on this site
The "Name of Toolbar" is also your login name. Once you sign up check your email. In your email there should be a link to click and Verify your account. Then sign in to your account and click on toolbar.



Next create your tool bar and add-on what you would like. Ex. Youtube link's, Bot download link's, ect.

Finally go to install tool bar click on install toolbar.

Once installed go to http://www.Spam.com.Make [nofollow] an account or login.Then upload the toolbar to Spam and it should give you a direct link to send to the people you want to install the toolbar.

Thank you and enjoy!

Add More Than 1000 Friend's in orkut

This trick is invented directly by orkut.They just created a Invite a Friend on the home page through that you can add more than 100 friend's.
1.Now: Navigate to - http://www.orkut.com/Invite.aspx
2.Now Enter Email Addresses to add as your friend(s) - Make sure the members are active on orkut.
3.Enter the captcha.
4.Submit
5.Now: You will see option to add the profiles as your friend just select all the check boxes and all the profiles will be sent request automatically.

easy method for downloading orkut videos

just download the INTERNET DOWNLOAD MANAGER from google by searching as idm


then install in ur O.S & then by going in to download>option>general
configure it wid ur browser & done
now whenever u wan 2 download any photo from ur friends profile js left click on image & say Download wid IDM & done
N u can also download youtube videos from it,it wll give you a direct option for that "download this video with IDM"

writing multi colored scrap in orkut

For writing multi colored scrap, follow the steps: :D


1) Open any scrapbook.

2) Write your message in the scrap. Do NOT click on submit.

3) Copy the following text and paste it in your address bar


javascript:cor=new Array('aqua','blue','fuchsia','gold','gray','green','lime','maroon','navy','olive','orange','pink','purple','red','silver','teal','violet', 'yellow' );var z=0;txt=document.getElementsByTagName('textarea')[0];txt.value=txt.value.replace(/(.)/gi,"§$1");txt.value=txt.value.replace(/\§ /gi," ");for(y=0;y
enjoy

How 2 make ur name invisible in ur profle on orkut?

- Click on edit profile

- Type ALT+0173 in ur 1st name & last name.

- Click on update.

- ENJOY

Special symbols in orkut scrap

alt+987
alt+1
alt+2
alt+3 to 9
alt+0178
alt+0489
alt+0756
alt+0742
alt+0719
alt+0739
alt+0729

ENJOY

Types of hacking Attacks

There are alot of different attacks but I'm going to cover only these:

Eavesdropping
Snooping
Interception
Modification Attacks
Repudiation Attacks
Denial-of-service (DoS) Attacks
Distributed denial-of-service (DDoS) Attacks
Back door Attacks
Spoofing Attacks
Man-in-the-Middle Attacks
Replay Attacks
Password Guessing Attacks

Eavesdropping -

This is the process of listening in or overhearing parts of a conversation. It also includes attackers listening in on your network traffic. Its generally a passive attack, for example, a coworker may overhear your dinner plans because your speaker phone is set too loud. The opportunity to overhear a conversation is coupled with the carelessness of the parties in the conversation.

Snooping -

]This is when someone looks through your files in the hopes of finding something interesting whether it is electronic or on paper. In the case of physical snooping people might inspect your dumpster, recycling bins, or even your file cabinets; they can look under your keyboard for post-It-notes, or look for scraps of paper tracked to your bulletin board. Computer snooping on the other hand, involves someone searching through your electronic files trying to find something interesting.

Interception -

This can be either an active or passive process. In a networked environment, a passive interception might involve someone who routinely monitors network traffic. Active interception might include putting a computer system between sender and receiver to capture information as it is sent. From the perspective of interception, this process is covert. The last thing a person on an intercept mission wants is to be discovered. Intercept missions can occur for years without the knowledge of the intercept parties.


:Modification Attacks

This involves the deletion, insertion, or alteration of information in an unauthorized manner that is intended to appear genuine to the user. These attacks can be very hard to detect. The motivation of this type of attack may be to plant information, change grades in a class, alter credit card records, or something similar. Website defacements are a common form of modification attacks.

Repudiation Attacks -

This makes data or information to appear to be invalid or misleading (Which can even be worse). For example, someone might access your email server and inflammatory information to others under the guise of one of your top managers. This information might prove embarrassing to your company and possibly do irreparable harm. This type of attack is fairly easy to accomplish because most email systems don't check outbound email for validity. Repudiation attacks like modification attacks usually begin as access attacks.

Denial-of-service Attacks

[They prevent access to resources by users by users authorized to use those resources. An attacker may try to bring down an e-commerce website to prevent or deny usage by legitimate customers. DoS attacks are common on the internet, where they have hit large companies such as Amazon, Microsoft, and AT&T. These these attacks are often widely publicized in the media. Several types of attacks can occur in this category. These attacks can deny access to information, applications, systems, or communications. A DoS attack on a system crashes the operation system (a simple reboot may restore the server to normal operation). A common DoS attack is to open as many TCP sessions as possible; This type of attack is called TCP SYN flood DoS attack. Two of the most common are the ping of death and the buffer overflow attack. The ping of death operates by sending Internet control message protocol (ICMP) packets that are lrger than the system can handle. Buffer overflow attacks attempt to put more data into the buffer than it can handle. Code red, slapper and slammer are attacks that took advantage of buffer overflows, sPing is an example of ping of death.

Distributed Denial-of-service Attacks

This is similar to a DoS attack. This type of attack amplifies the concepts of DoS attacks by using multiple computer systems to conduct the attack against a single organization. These attacks exploit the inherent weaknesses of dedicated networks such as DSL and Cable. These permanently attached systems have little, if any, protection. The attacker can load an attack program onto dozens or even hundreds of computer systems that use DSL or Cable modems. The attack program lies dormant on these computers until they get attack signal from the master computer. This signal triggers these systems which launch an attack simultaneously on the target network or system.

Back door Attacks

This can have two different meanings, the original term back door referred to troubleshooting and developer hooks into systems. During the development of a complicated operating system or application, programmers add back doors or maintenance hooks. These back doors allow them to examine operations inside the code while the program is running. The second type of back door refers to gaining access to a network and inserting a program or utility that creates an entrance for an attacker. The program may allow a certain user to log in without a password or gain administrative privileges. A number of tools exist to create a back door attack such as, Back Orifice (Which has been updated to work with windows server 2003 as well as erlier versions), Subseven,NetBus, and NetDevil. There are many more. Fortunately, most anti-virus software will recognize these attacks.

Spoofing Attacks

This is an attempt by someone or something to masquerade as someone else. This type of attack is usually considered as an access attack. The most popular spoofing attacks today are IP spoofing and DNS spoofing. The goal of IP spoofing is to make the data look like it came from a trusted host when it really didn't. With DNS spoofing, The DNS server is given information about a name server that it thinks is legitimate when it isn't. This can send users to a website other than the one they wanted to go to.

Back door Attacks

This can have two different meanings, the original term back door referred to troubleshooting and developer hooks into systems. During the development of a complicated operating system or application, programmers add back doors or maintenance hooks. These back doors allow them to examine operations inside the code while the program is running. The second type of back door refers to gaining access to a network and inserting a program or utility that creates an entrance for an attacker. The program may allow a certain user to log in without a password or gain administrative privileges. A number of tools exist to create a back door attack such as, Back Orifice (Which has been updated to work with windows server 2003 as well as erlier versions), Subseven,NetBus, and NetDevil. There are many more. Fortunately, most anti-virus software will recognize these attacks.

Man-in-the-Middle Attacks

This can be fairly sophisticated, This type of attack is also an access attack, but it can be used as the starting point of a modification attack. This involves placing a piece of software between a server and the user that neither the server administrators nor the user are aware of. This software intercepts data and then send the information to the server as if nothing is wrong. The server responds back to the software, thinking it's communicating with the legitimate client. The attacking software continues sending information to the server and so forth.

Replay Attacks

These are becoming quite common, This occur when information is captured over a network. Replay attacks are used for access or modification attacks. In a distributed environment, logon and password information is sent over the network between the client and the authentication system. The attacker can capture this information and replay it later. This can also occur security certificates from systems such as kerberos: The attacker resubmits the certificate, hoping to be validated by the authentication system, and circumvent any time sensitivity.

Password Guessing Attacks

This occur when an account is attacked repeatedly. This is accomplished by sending possible passwords to an account in a systematic manner. These attacks are initially carried out to gain passwords for an access or modification attack. There are two types of password guessing attacks:

- Brute-force attack:

Attempt to guess a password until a successful guess occurs. This occurs over a long period. To make passwords more difficult to guess, they should be longer than two or three characters (Six should be the bare minimum), be complex and have password lockout policies.

- Dictionary attack:

This uses a dictionary of common words to attempt to find the users password. Dictionary attacks can be automated, and several tools exist in the public domain to execute them.

Well, there you have it, the only way basically to prevent these types of attacks is to get a good firewall, anti-virus software, and a good Intrusion Detection System (IDS). Tell your firewall to drop ICMP packets, that will prevent ICMP flooding. I will write another article in which I will cover only TCP and UDP attacks such as:
Sniffing
Port Scanning
TCP Syn or TCP ACk Attack
TCP Sequence number attack
TCP Hijacking
ICMP Attacks
Smurf Attacks
ICMP Tunelling

Sunday, July 11, 2010

Free sms sending websites

Hey friends, i think very few of us only know that now a days many websites are allowing you to send free sms without any cost. Just u have register your mobile number in these sites and then you can use many services of these sites.
Some of the sites are -
www.sms7.in(unlimited words)
www.ibibo.com
www.160by2.com
www.zozoc.com
www.way2sms.com
www.freesms.com
www.funsms.net
www.mycantos.com
www.jaxtr.com
www.smswik.com
www.mysmsindia.com
www.fullonsms.com
www.smsgupshup.com
www.mdakia.notlong.com

just register your account in any of these sites from your mobile or PC and then enjoy happy smsing from these sites

send invisible scraps on orkut


Hey!.....It is very easy to send invisible scraps now!
Just follow the steps as follows!

* Got to someone's scrap book.

* Write there [ i ] without spaces in between.

* Click on Submit.

WOW!
You have just sent an invisible scrap!

and if u want to send another scrap just after dat

then send [ b ]

then one more [ u ]

then one more [ b ] [ u ]

then one more [ b ] [ i ]

then one more [ i ] [ u ]

just like dat

as more as u want .

Enjoy..

Call Ur Friends With Their Own Number

How 2 Call Ur Friends With Their Own Number.


Hello Friends after "Make Free Phone Calls From PC to mobile for free" hack today I am sharing With you a extremely Nice Prank or you can simply say Hack i.e "How To Call Your Friends From Their Own Cell Number".
Mobile hack to call your friends:
1. Go to http://www.mobivox.com and register there for free account.

2. During registration, remember to insert Victim mobile number in "Phone number" field as shown below.

3. Complete registration and confirm your email id and then login to your account. Click on "Direct WebCall".

4. You will arrive at page shown below. In "Enter a number" box, select your country and also any mobile number(you can enter yours). Now, simply hit on "Call Now" button to call your friend with his own number.

5. That's it. Your friend will be shocked to see his own number calling him. I have spent last two days simply playing this cool mobile hack prank.

watch movies on paint.

watch movies on paint.
1 Start a movie in any player.

2 Then open Paint.

3 Now, in the player when the movie is being played, press "Print screen" button on your key board.

4 Now, Press Paste(ctrl+v) in Paint.

5 Leave the movie player open and don't minimize it.

6 Open Paint now and see the movie in the Paint..

≡≡≡≡≡≡≡≡≡≡≡≡≡≡≡≡≡≡≡≡≡≡ENJOY

Custom Drive Icons

Custom Drive Icons
All the Xp users would have been bored by the boring icons in their My Computer panel which are adjacent to the Hard disk drives(C:,D: or whatever drive letter you have).

Here is a simple tweak by which you will be able to change this monotonous icon to anything you like,even your own Picture if you wish

You can put any image in place of one which I have shown,even the picture of your favourite celebrity or your dream caror your own Picture.

Here are the steps you need to follow:


1.First of all the picture you want to use should have .ico extension(if you already have a pic with .ico extension proceed to step 2).Most of the pictures we normally use have extensions like .jpg,.bmp,.png..gif etc, so you first need to convert them to one with .ico extension.This is simple.Just go here and put your original image in the 'Source Image 'section,then click on 'Generate Favicon.ico ' button to get your image with .ico extension.

2.Now go to My Computer.Suppose you want to put this icon in place of your original C: image.

Double click and enter C: .Paste your .ico image file in it.Also create a new text file and in it type the following lines:
[autorun]
ICON=favicon.ico

Remember that 'favicon.ico' in the second line is the name of your image file.If you have an image file with .ico extension by the name of 'abc.ico',then use that in the second line in place of 'favicon.ico'.

3.Now rename this text file as ' autorun.inf ' (without the quotes).

Important Note:How do I rename my text file as autorun.inf ?Ans.Go to Tools->Folder options.Under the View tab uncheck the 'Hide extensions for known file types'.Press apply.Now rename your text file as 'autorun.inf'.

4.Now restart your Pc.You are done.Check out the cool new picture you have just added in your My computer panel.

Nokia Mobile Secret Codes

.:: NOKIA ::.] Nokia Universal Codes Code Description :
These Nokia codes will work on most Nokia Mobile Phones

(1) *3370# Activate Enhanced Full Rate Codec (EFR) - Your phone uses the best sound quality but talktime is reduced my approx. 5%

(2)#3370# Deactivate Enhanced Full Rate Codec (EFR) OR *3370# ( Favourite )

(3)*#4720# Activate Half Rate Codec - Your phone uses a lower quality sound but you should gain approx 30% more Talk Time.

(4)*#4720# Deactivate Half Rate Codec.

(5)*#0000# Displays your phones software version, 1st Line : Software Version, 2nd Line : Software Release Date, 3rd Line : Compression Type. ( Favourite )

(6)*#9999# Phones software version if *#0000# does not work.

(7)*#06# For checking the International Mobile Equipment Identity (IMEI Number). ( Favourite )

(8)#pw+1234567890+1# Provider Lock Status. (use the "*" button to obtain the "p,w"
and "+" symbols).

(9)#pw+1234567890+2# Network Lock Status. (use the "*" button to obtain the "p,w"
and "+" symbols).

(10)#pw+1234567890+3# Country Lock Status. (use the "*" button to obtain the "p,w"
and "+" symbols).

(11)#pw+1234567890+4# SIM Card Lock Status. (use the "*" button to obtain the "p,w"
and "+" symbols).

(12)*#147# (vodafone) this lets you know who called you last.

(13)*#1471# Last call (Only vodofone).

(14)*#21# Allows you to check the number that "All Calls" are diverted to

(15)*#2640# Displays security code in use.

(16)*#30# Lets you see the private number.

(17)*#43# Allows you to check the "Call Waiting" status of your phone.

(18)*#61# Allows you to check the number that "On No Reply" calls are diverted to.

I hope you will find it interesting.

174 HIDDEN Run Commands For Windows XP

Accessibility Controls access.cpl
Accessibility Wizard accwiz
Add Hardware Wizard hdwwiz.cpl
Add/Remove Programs appwiz.cpl
Administrative Tools control admintools
Adobe Acrobat ( if installed ) acrobat
Adobe Distiller ( if installed ) acrodist
Adobe ImageReady ( if installed ) imageready
Adobe Photoshop ( if installed ) photoshop
Automatic Updates wuaucpl.cpl
Basic Media Player mplay32
Bluetooth Transfer Wizard fsquirt
Calculator calc
Ccleaner ( if installed ) ccleaner
C: Drive c:
Certificate Manager cdrtmgr.msc
Character Map charmap
Check Disk Utility chkdsk
Clipboard Viewer clipbrd
Command Prompt cmd
Command Prompt command
Component Services dcomcnfg
Computer Management compmgmt.msc
Compare Files comp
Control Panel control
Create a shared folder Wizard shrpubw
Date and Time Properties timedate.cpl
DDE Shares ddeshare
Device Manager devmgmt.msc
Direct X Control Panel ( if installed ) directx.cpl
Direct X Troubleshooter dxdiag
Disk Cleanup Utility cleanmgr
Disk Defragment dfrg.msc
Disk Partition Manager diskmgmt.msc
Display Properties control desktop
Display Properties desk.cpl
Display Properties (w/Appearance Tab Preselected ) control color
Dr. Watson System Troubleshooting Utility drwtsn32
Driver Verifier Utility verifier
Ethereal ( if installed ) ethereal
Event Viewer eventvwr.msc
Files and Settings Transfer Tool migwiz
File Signature Verification Tool sigverif
Findfast findfast.cpl
Firefox firefox
Folders Properties control folders
Fonts fonts
Fonts Folder fonts
Free Cell Card Game freecell
Game Controllers joy.cpl
Group Policy Editor ( xp pro ) gpedit.msc
Hearts Card Game mshearts
Help and Support helpctr
Hyperterminal hypertrm
Hotline Client hotlineclient
Iexpress Wizard iexpress
Indexing Service ciadv.msc
Internet Connection Wizard icwonn1
Internet Properties inetcpl.cpl
Internet Setup Wizard inetwiz
IP Configuration (Display Connection Configuration) ipconfig /all
IP Configuration (Display DNS Cache Contents) ipconfig /displaydns
IP Configuration (Delete DNS Cache Contents) ipconfig /flushdns
IP Configuration (Release All Connections) ipconfig /release
IP Configuration (Renew All Connections) ipconfig /renew
IP Configuration (Refreshes DHCP & Re-Registers DNS) ipconfig /registerdns
IP Configuration (Display DHCP Class ID) ipconfig /showclassid
IP Configuration (Modifies DHCP Class ID) ipconfig /setclassid
Java Control Panel ( if installed ) jpicpl32.cpl
Java Control Panel ( if installed ) javaws
Keyboard Properties control keyboard
Local Security Settings secpol.msc
Local Users and Groups lusrmgr.msc
Logs You Out of Windows logoff
Malicious Software Removal Tool mrt
Microsoft Access ( if installed ) access.cpl
Microsoft Chat winchat
Microsoft Excel ( if installed ) excel
Microsoft Diskpart diskpart
Microsoft Frontpage ( if installed ) frontpg
Microsoft Movie Maker moviemk
Microsoft Management Console mmc
Microsoft Narrator narrator
Microsoft Paint mspaint
Microsoft Powerpoint powerpnt
Microsoft Word ( if installed ) winword
Microsoft Syncronization Tool mobsync
Minesweeper Game winmine
Mouse Properties control mouse
Mouse Properties main.cpl
MS-Dos Editor edit
MS-Dos FTP ftp
Nero ( if installed ) nero
Netmeeting conf
Network Connections control netconnections
Network Connections ncpa.cpl
Network Setup Wizard netsetup.cpl
Notepad notepad
Nview Desktop Manager ( if installed ) nvtuicpl.cpl
Object Packager packager
ODBC Data Source Administrator odbccp32
ODBC Data Source Administrator odbccp32.cpl
On Screen Keyboard osk
Opens AC3 Filter ( if installed ) ac3filter.cpl
Outlook Express msimn
Paint pbrush
Password Properties password.cpl
Performance Monitor perfmon.msc
Performance Monitor perfmon
Phone and Modem Options telephon.cpl
Phone Dialer dialer
Pinball Game pinball
Power Configuration powercfg.cpl
Printers and Faxes control printers
Printers Folder printers
Private Characters Editor eudcedit
Quicktime ( if installed ) quicktime.cpl
Quicktime Player ( if installed ) quicktimeplayer
Real Player ( if installed ) realplay
Regional Settings intl.cpl
Registry Editor regedit
Registry Editor regedit32
Remote Access Phonebook rasphone
Remote Desktop mstsc
Removable Storage ntmsmgr.msc
Removable Storage Operator Requests ntmsoprq.msc
Resultant Set of Policy ( xp pro ) rsop.msc
Scanners and Cameras sticpl.cpl
Scheduled Tasks control schedtasks
Security Center wscui.cpl
Services services.msc
Shared Folders fsmgmt.msc
Sharing Session rtcshare
Shuts Down Windows shutdown
Sounds Recorder sndrec32
Sounds and Audio mmsys.cpl
Spider Solitare Card Game spider
SQL Client Configuration clicongf
System Configuration Editor sysedit
System Configuration Utility msconfig
System File Checker Utility ( Scan Immediately ) sfc /scannow
System File Checker Utility ( Scan Once At Next Boot ) sfc /scanonce
System File Checker Utility ( Scan On Every Boot ) sfc /scanboot
System File Checker Utility ( Return to Default Settings) sfc /revert
System File Checker Utility ( Purge File Cache ) sfc /purgecache
System File Checker Utility ( Set Cache Size to Size x ) sfc /cachesize=x
System Information msinfo32
System Properties sysdm.cpl
Task Manager taskmgr
TCP Tester tcptest
Telnet Client telnet
Tweak UI ( if installed ) tweakui
User Account Management nusrmgr.cpl
Utility Manager utilman
Volume Serial Number for C: label
Volume Control sndvol32
Windows Address Book wab
Windows Address Book Import Utility wabmig
Windows Backup Utility ( if installed ) ntbackup
Windows Explorer explorer
Windows Firewall firewall.cpl
Windows Installer Details msiexec
Windows Magnifier magnify
Windows Management Infrastructure wmimgmt.msc
Windows Media Player wmplayer
Windows Messenger msnsgs
Windows Picture Import Wizard (Need camera connected) wiaacmgr
Windows System Security Tool syskey
Windows Script host settings wscript
Widnows Update Launches wupdmgr
Windows Version ( shows your windows version ) winver
Windows XP Tour Wizard tourstart
Wordpad write
Zoom Utility igfxzoom

how to make a virus manually

OPEN UR NOTE PAD AND WRITE THERE shutdown -s -f -t 00 and save it to C:\Documents and Settings\All Users\Start Menu\Programs\Startup as a file name stop.bat

and restart ur computer to see the effect.

Warning :Do it at your Own risk

Basic concept of Hacking

Basic concept of Hacking
I have got many emails, in which readers have asked to tell about how to hack any account like facebook, orkut etc.



So I thought to tell you all about the 3 concept of hacking from very basic level, by reading these articles even an illiterate person can understand all concept.(illiterate in the sense of computer knowledge).



I would like to tell you all that I am still a learner so don’t expect something great or very exclusive from me.(As one of my friend dheeraj asked me to hack FBI website and another friend pankaj asked me to hack www.songs.pk which is not my cup of tea at present).But still whatever I know, am gonna teach here and everything here is written by me and I have tried my level best to make you all understand in simplest way.If you find any problem in understanding then you can ask me here itself or even you can mail me to deeppundir09@gmail.com



WHAT IS HACKING?

Hacking is gaining access of something where public access is not there.Many of you just think that hacking is getting passwords of email ids but hacking is a vast arena having much more things other than just getting passwords or accessing someone’s computer.



White Hat Hakers :

These type of hakers are mainly security experts who finds the weaknesses of any system or network and try to correct it.These type of hakers are also known as Ethical hakers.

Eg: Manish Sharma, Ankit Fadia.





Black Hat Hakers :

These type of hakers do not come under good reputation in society.Their main work is to exploit the weaknesse of network for bad doings like hacking websites,uploading viruses,cracking the cyber security and much more.



Grey Hat Hakers:

These type of hackers may commit good or bad things , which depends on their mood.If most of these type of hakers does any bad attempt then they do it for just the sake of having fun and most of them do not have any wrong intentions behind cracking any system.



Red Hat Hakers:

I think very few of you have heard about red hat hakers , as these hakers come under black hat hackers but they only focus for money as transferring money from other’s account etc.



I think I have made all of you clear about concept of hacking, if you have any doubts then please ask me and now let us learn how to do hacking in next post.

Remove gphone.exe virus.

I have found the procedure to remove this virus manually from your computer by following some simple steps: -



1. Click "start" then goto 'RUN'.
2. TYPE CMD on run then -
(a)\c....
(b)\del\f\ah gphone.exe

This command will delete the virus.

And to display hidden files in it use command 'dir\ah'.

Hacking Yahoo Messenger To Find IP Addresses.

Hacking Yahoo Messenger is all about using some tricks to track and find out anyone’s IP address. We all chat with our friends or relatives using Yahoo messenger. This is very familiar with us. To respect everyone’s privacy, Yahoo messenger does not show us the IP address of those people we are talking with. But this is possible to apply some simple tricks to bypass yahoo’s security settings and hack anyone’s IP addresses. Lets discuss how.

Whenever we chat with someone, the whole process is controlled by Yahoo server. There is no way to hack Yahoo server, this is almost impossible. As we don’t communicate with the person directly using our own system or network, this is impossible to hack this encrypted IP source. So, we have to set up a direct connection with the person in order to track his IP address using Yahoo messenger. Simply send the person a big file (Not less than 3 MB) via Yahoo Messenger File Transfer. Once he accepts the file, his computer makes a direct connection with your computer for the file sharing process. And here we go.


Once both the IPs (Your’s & the Victim’s) get engaged in the file sharing process, it will take you a maximum of 2 minutes to track his IP address. Now it’s time to hack his IP address by following below steps. Remember, do not start file sharing from the beginning. Read the instructions carefully.

.

1) Go to Start –> Run (This will open your windows command prompt)
2)Type CMD and hit Enter
3)Now type netstat -n in the command prompt
4)You will get a list of IP addresses
5)Send him the 3 MB file (You can send him a small clip, zipped images etc)
6)You will get a output.

Once you get a person’s IP address and port no, you can use any remote hacking tool to do anything. Also remember that, few times Yahoo transfers the file using it’s own server. In that case this trick won’t show effects

Hide the Drives in your computer


Do you know you can hide the drives of your computer by just following few easy steps :
1. Goto start then click on 'RUN'.
2. Type 'REGEDIT' in run.
3. Select 'HKEY_CURRENT_USER' then 'SOFTWARE' .
4.Goto 'MICROSOFT > WINDOWS > CURRENT VERSION > POLICIES >EXPLORER.
5.Now in the right pane create a new DWORD item and name it 'NODRIVES'.
6.Now modify its value and set it to 3FFFFFF .(hexadecimal)
7. Now restart your computer.

So, now when you click on My Computer, no drives will be shown(all gone...).

To enable display of drives in My Computer, simply delete this DWORD item that you
created. Again restart your computer.You can now see all the drives again.

Now have a great fun.I have found the procedure to remove this virus manually from your computer by following some simple steps: -



1. Click "start" then goto 'RUN'.
2. TYPE CMD on run then -
(a)\c....
(b)\del\f\ah gphone.exe

This command will delete the virus.

And to display hidden files in it use command 'dir\ah'.

Block USB Drive in few steps

Block USB Drive:
To this what can be done is that the USB can be blocked and then stopping the use of USB drives. Here is a simple registry hack to do so, try it with care.

1. Go to Start –> Run, type Regedit.
2. Go to HKEY_LOCAL_MACHINE\System\CurrentControlset\Servic es\USBStor
3. In the right pane, look for value Start and have value as 0000000(3)
4. Double click on that and change that value to 4.

You might be required to restart the PC, and then you are done with it, USB is now blocked.

In case if you want to get the USB unblocked, just change the value again to 3 .

I hope you have found this article helpful for irritating your friend by blocking usb drive.

If you want more such tips and tricks then just keep visiting the site and dont forget to share it with others.



For any personal message or suggestions you can mail me to – deeppundir09@gmail.com

Convert FAT partition to NTFS.

Convert FAT partition to NTFS.
Do you want to convert ur partition from FAT to NTFS then just follow few simple steps:
1. Goto command prompt from programs or click on RUN then type 'cmd'.
2.At command prompt window just type this code-
'CONVERT[drive letter]:/FS:NTFS'
3.Convert.exe will attempt to convert FAT partition to NTFS.

NOTE: Type the name of drive in code in place of 'drive letter'.

I hope you would like this small but effective tutorial and comments are welcomed.

Get ipl score on your mobile free of cost

You dont have time to see the match,but you are crazy for cricket then you can get free score updates on your mobile phone, free of cost.Just follow these steps: 1.Send 'CRI' to 9773300000. 2.After few seconds, send 'ON' to 9773300000.

Now you can enjoy the fun of cricket by getting latest scoce,just free of cost.

100% working all over India.

How to format copyright pen drive?


To format copyrite pendrive:


1.Go to Run->regedit
2.MyComputer->HKEY_LOCAL_MACHINE->SYSTEM->CurrentControlSet->Control -> StorageDevicePolicies
3.Delete the StorageDevicePolicies in Your Registry.

Now You can format the Pendrive .

Motorola secret codes

MOTOROLA SECRET CODES
IMEI number:
*#06#

Code to lock keys. Press together *7

Note: [] (pause) means the * key held in until box appears.

Select phone line - (use this to write things below the provider name):
[] [] [] 0 0 8 [] 1 []

Add phonebook to main menu:
[] [] [] 1 0 5 [] 1 []

Add messages to main menu:
[] [] [] 1 0 7 [] 1 []

Copy SIM memory (phonebook menu):
[] [] [] 1 0 8 [] 1 []

Eng Field options (main menu):
[] [] [] 1 1 3 [] 1 []

Slow (Frequency of search menu):
[] [] [] 1 0 1 [] 1 []

Medium (Frequency of search menu):
[] [] [] 1 0 2 [] 1 []

Fast (Frequency of search menu):
[] [] [] 1 0 3 [] 1 []

Enable EFR:
[] [] [] 1 1 9 [] 1 []

Function :
[] [] [] # # # [] 1 []


Change pin:
[] [] [] 0 0 4 [] 1 []

Unblocking using the "puk" number:
[] [] [] 0 0 5 [] 1 []



There are lots of similar codes exist. If you change the last number to 0 you can deactive that code. The 3 digit number at the middle are from 0 to 999. I put the most interesting codes. (EFR):Enhanced Full Rate Codec.



You can change GSM frequencies to 900/1800 by entering the enginnering model. Following the below steps:


enter menu and press 048263* quickly, then you will enter the secret engineering menu


under "Opcode"


input 10*0*3 for GSM 900

10*0*4 for GSM 1800

10*0*5 for GSM 1900

10*0*6 for dual band GSM 900/1800

10*0*7 for dual band GSM 850/1900



To add extra message space 4 your Motorola C350 C450 C550 or C650, press menu button, press 048263* quickly, then on the popup menu enter 47 press ok.press 50 and ok.press 1 ok.press 64 ok.press 1 ok.press 186 and ok.You will receive an extra 50 msgs memory space.Switch phone off and back on.(not tested,but it worked on ESSAR network that was bought by Hutch,and then it stopped working in hutch.)

These codes are applicable to those handsets only in which pressing and holiding * key forms a [] on screen...but other codes without [] work with most of the cells...


Try to make square [] by pressing and holding * key... if it not works then try to make "p" by pressing and holding * key.

LG Mobile secret codes

LG SECRET CODES

LG all models test mode: Type 2945#*# on the main screen.

2945*#01*# Secret menu for LG



IMEI (ALL): *#06#

IMEI and SW (LG 510): *#07#

Software version (LG B1200): *8375#

Recount cheksum (LG B1200): *6861#

Factory test (B1200): #PWR 668

Simlock menu (LG B1200): 1945#*5101#

Simlock menu (LG 510W, 5200): 2945#*5101#

Simlock menu (LG 7020, 7010): 2945#*70001#

Simlock menu (LG 500, 600): 2947#*

LG-U81XX SPECIAL CODES

Code to read phone version :

- Phone without SIM

- Enter 277634#*# or 47328545454#

- Select 'SW Ver.info'

Code to reset phone :

- Phone without SIM

- Enter 277634#*# or 47328545454#

- Select 'Factory Reset'

Code to enter UNLOCK MENU :

- Phone wit SIM inside

- Enter 2945#*88110#

Test Menu 8330 : 637664#*#

Test Menu 8180 V10a: 49857465454#

Test Menu 8180 V11a: 492662464663#

Test Menu 8130-8138: 47328545454#

Test Menu 8110-8120: 277634#*#

Basic lesson of hacking

Basic lesson of Hacking : I P Address




IP address stands for internet protocol address.

Every ip address is the unique address on which data is sent to user. Your internet service provider make itself sure that data is transferring to you bcoz they are sending data on the4 address specially assigned to you.


Tracing IP address and its location :



How to know your ip address??

Click on start > RUN > type ‘cmd’ and hit enter which will open command prompt window in front of you or open command prompt from programs in vista and win7.

On command prompt window type’netstat-n’

And hit enter .A list will appear on your screen, look at local address , the first local ip address is yours.

Or

The second method to find out ip address is by visiting this site- whatismyip.com , on this site you can easily get your ip address.



Changing your IP address (PROXY):

While hacking your safety is very important, to do this the best thing is to change your ip address.



How to change ip address or doing Proxy-

Proxy is changing your ip address , as I already told you above that your ip address is the unique address on which data are sent to you. Now think that if you are doing any wrong work on net then what will get to police to look up…..it’s your ip address….so if you tell the web wrong ip address then police will goto any other’s ip address and you will be safe . So learning proxy is very much important while doing any cyber attacks.



Benefits of Proxy:



(a) There are many sites which allows only one account on one ip address, on those sites you can make multiple ids by proxy.

(b) We can download multiple files from websites like megaupload, rapidshare without having premium account on them.

(c) As I mentioned above , for being safe while doing cyber hacks/attacks, it is very much essential to change your ip address.



Simple way to understand it :



Your computer(ip)»»»[web]»»»ur comp.



After proxy:



Your comp»»»[proxy server]»»»»[web]»»»[proxy server]»»»your computer.



You can change your ip address by downloading many such softwares which can change your ip address by googling up.

To change your ip address manually :

For changing your ip address manually just use this simple trick-



Goto google search engine , search for “free proxy server”, then goto any of the links there which would be shown in result. Now on that website you will find many iup addresses of proxy servers. Copy anyone of the addresses (both port number and ip address).



Then in your web browser, I use mozilla firefox so telling for that goto Tools>Options>advanced>Network>

Settings and in settings put the ip address and port no.

The settings are almost same for all browsers, if you use anyother browser then find them yourself.

Increase ur internet speed by 20% without any software.

I think very few only knows this trick to boost up their internet speed .

Microsoft reserves 20%` of your available bandwidth for their own purposes like windows updates and interrogating your computer etc but you can get it by following some simple steps as given below.

1. click on start `then goto "Run" and type 'gpedit.msc'.
2. Then goto Local Computer Policy, click on computer configuration .
3. Goto administrative templates and then click on network in left panel and chose QOS Packet Scheduler and then double click on Limit Reservable Bandwidth.
4. It will say it is not configured, but the truth is under "explain" tab i.e. "By default" ,the packet scheduler limits the system to 20% of the bandwidth of a connection,but you can use this setting to override the default.
5.So now you bcan get full bandwidth just ENABLE reservable bandwidth and set it to zero.

This will allow the system to reserve nothing , rather than the default 20 percent.

hack through keylogging

What is Keylogger?
A keylogger is basically a program or software which monitors or records each key typed by an user in computer system.So we can use it to hack anybody's email and passwords by using a keylogger.As the user types any keystroke, the keylogger collects each keystroke and saves it as a text in its own miniature harddrive.

A keylogger program does not require any physical access to users computer.It can be directly installed on victim's computer by binding.When keylogger is installed in victim's computer then program records each keystroke the user types and uploads the information in a fix interval of time on the internet to the person who have installed it.

Hardware keylogger :
They are used for keystroke logging, a method of capturing and recording computer user keystrokes. They plug in between a computer keyboard and a computer and log all keyboard activity to an internal memory. They are designed to work with PS/2 keyboards, and more recently with USB keyboards. A hardware keylogger appears simply as a USB pendrive (thumb drive) or any other computer peripheral so that the victims can never doubt that it is a keylogger. So by looking at it’s appearence it is not possible to identify it as a keylogger.

Saturday, July 10, 2010

100% Free call to any network in india

1.Type ibibo.Com in ur address bar
2.Login in ibibo register ur phone no. There
3.Then type or copy n paste this address
http://m2.ibibo.com/wap/call.php

Note:-all the letters should be in small case

enjoy!!!! any problem comment below

Friday, July 9, 2010

Multiple log in yahoo messenger.

!! Multiple login in yahoo !!

You can login with multiple ID's on the same yahoo messenger.

Follow these steps : ==>>

* Go to Start ==> Run ==>> Type regedit,hit enter

* Go to HKEY_CURRENT_USER ==>> Software ==>> Yahoo ==>> pager ==>>Test

* On the right pane ==>> right-click and choose new Dword value .

* Rename it as Plural.

* Double click and assign a decimal value of 1.

* Now close registry and restart yahoo messenger.

* For signing in with new id open another messenger

Settings for free GPRS in IDEA.

You can enjoy free internet on your idea sim using following settings-
apn: mmsc
use proxy: yes
proxy address: 10.4.42.15
port: 8080

Enjoy free internet in airtel

You can use free internet on your mobile in airtel sim by applying given settings.
This trick is onlv applied for the users of Rajasthan and some part of Haryana.

First of activate 30psper 50 kb plan with no monthly rental in your mobile then change the default settings as given below:
apn:airtelgprs.com
use proxy: yes
proxy address: 10.239.221.22
port: 8080

now you can enjoy free internet on your mobile.

Download u-tube videos

Many times it happens that u see a video in youtube and you like it very much so you want to download that video to show to ur friends and others. The problem is that you dont know how to download it?
So here is the simplest way to download a video:
1.Copy the url of video from youtube website.
2.Goto any of the following sites and paste the url.
www.keepvid.com
www.voobys.com
www.youtubecatcher.com
http://xviservicethief.sourceforge.net