Friday 28 December 2012

Create Ghost image of Hard Disk

How to create ghost image of hard disk for

free?

If yes then you are the person who want to backup complete disk 

along with OS. So lets see how we can create hard disk image or 

ghost image or disk clone without using those highly priced ghost 

creating software.


Requirements:

Ubuntu Live CD/DVD, A hard disk with more capacity than the one 

you want to clone and some basic knowledge of Linux.


Procedure:

Linux provides disk dumping feature, this feature can be used for 

creating complete backup of any possible storage media. And we 

will use this feature of Linux command shell to create ghost 

images. While writing this tutorial I am assuming that you want 

to backup a hard disk which already have an OS installed in it.

Monday 24 December 2012

Repairing Windows XP in Eight Commands

Windows could not start because the following file is missing or corrupt:

\\WINDOWS\\SYSTEM32\\CONFIG\\SYSTEM

You can attempt to repair this file by starting Windows Setup
using the original Setup CD-ROM.

Select ‘R’ at the first screen to start repair.

Which renders your PC inaccessible from the standard boot procedures of Windows XP. You try safe mode, to no avail. You’re particularly savvy and try issuing the FIXBOOT and FIXMBR commands in the Windows recovery console, but after each reboot, you’re merely greeted with the same obnoxious and terrifying blue screen of death that’s preventing you from accessing your precious data.

Perhaps you’ve also seen these error screens:

Windows NT could not start because the below file is missing or corrupt:

X:\\WINNT\\System32\\Ntoskrnl.exe
_________________

Windows NT could not start because the below file is missing or corrupt:

X:\\WINNT\\System32\\HAL.dll
_________________

NTLDR is Missing
Press any key to restart
_________________

Invalid boot.ini
Press any key to restart

Password Hacking

Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password.


Most passwords can be cracked by using following techniques :

1) Hashing :- 

Here we will refer to the one way function (which may be either an encryption function or cryptographic hash) employed as a hash and its output as a hashed password.
If a system uses a reversible function to obscure stored passwords, exploiting that weakness can recover even 'well-chosen' passwords.
One example is the LM hash that Microsoft Windows uses by default to store user passwords that are less than 15 characters in length.
LM hash breaks the password into two 7-character fields which are then hashed separately, allowing each half to be attacked separately.

Hash functions like SHA-512, SHA-1, and MD5 are considered impossible to invert when used correctly.

Saturday 22 December 2012

What is CAPTCHA and How it Works?


CAPTCHA or Captcha (pronounced as cap-ch-uh) which stands for “Completely Automated Public Turing test to tell Computers and Humans Apart” is a type of challenge-response test to ensure that the response is only generated by humans and not by a computer.
In simple words, CAPTCHA is the word verification test that you will come across the end of a sign-up form while signing up for Gmail or Yahoo account. The following image shows the typical samples of CAPTCHA.

How Windows Product Activation (WPA) Works?


Windows Product Activation or WPA is a license validation procedure introduced by Microsoft Corporation in all versions of it’s Windows operating system. WPA was first introduced in Windows XP and continues to exist in Windows Server 2003, Windows Vista, Windows Server 2008 and Windows 7 as well.
WPA enforces each end user to activate his/her copy of Windows so as to prevent unauthorized usage beyond the specific period of time until it is verified as genuine by Microsoft. How WPA really works was a closely guarded secret until GmbH analyzed WPA using a copy of Windows XP RC1 and published a paper on their findings.
In this post you will find answers to some of the most frequently asked questions about Windows Product Activation.

Wednesday 19 December 2012

Chat with Friends through ms dos Command Prompt

1) All you need is your friend's IP Address and your Command Prompt.

2) Open Notepad and write this code as it is.....!

@echo off
:A
Cls
echo MESSENGER
set /p n=User:
set /p m=Message:
net send %n% %m%
Pause
Goto A


3) Now save this as "Messenger.Bat".


4) Open Command Prompt.


5) Drag this file (.bat file) over to Command Prompt and press 
Enter.


6) Now, type the IP Address of the computer you want to contact and press enter


7) Now all you need to do is type your message and press Enter.Start Chatting.......!

Share for anyone..........................


Friday 14 December 2012

How Firewalls Work


If you have been using Internet on a regular basis or working in a large company and surf the Internet while you are at work, you must have surely come across the term firewall.
You might have also heard of people saying “firewalls protect their computer from web attacks and hackers” or “a certain website has been blocked by firewall in their work place”. If you have ever wondered to know what exactly is this firewall and how it works, here we go. In this post I will try to explain “How firewalls work” in a layman’s terms.

How Firewalls Work?

Firewalls are basically a barrier between your computer (or a network) and the Internet (outside world). A firewall can be simply compared to a security guard who stands at the entrance of your house and filters the visitors coming to your place. He may allow some visitors to enter while denying others whom he suspects of being intruders. Similarly a firewall is a software program or a hardware device that filters the information (packets) coming through the Internet to your personal computer or a computer network.

How Antivirus Software Works


Due to ever increasing threat from virus and other malicious programs, almost every computer today comes with a pre-installed antivirus software on it. In fact, an antivirus has become one of the most essential software package for every computer.
Even though every one of us have an antivirus software installed on our computers, only a few really bother to understand how it actually works! Well, if you are one among those few who would really bother to understand how an antivirus works, then this article is for you.

How Domain Name System (DNS) Works


In the world of Internet and the area computer networks, you will often come across the term Domain Name System or Domain Name Service which is simply referred to as DNS. The working of DNS forms one of the basic concepts of computer networks whose understanding is very much essential especially if you are planning to get into the field of ethical hacking or network security.
In this post, I will try to explain how Domain Name System works in a very simple and easy to follow manner so that even the readers who do not have any prior knowledge of computer networks should be able to understand the concept.

What is a Domain Name System?

A “Domain Name System” or “Domain Name Service” is a computer network protocol whose job is to map a user friendly domain name such as “hacking.com” to it’s corresponding IP address like “173.245.61.120″.

Wednesday 5 December 2012

bug in windows calculator

Many people think that this is a bug in windows calculator. This is really amazing for a layman. Just write 9 in calculator, then press the square root button and then subtract 3 from it. As per our calculation it should give zero. But it does not give. It gives some fractional value.



Replace google with ur name

Replace google with ur name....!
There are are lots of website which allow you to change the default logo text in Google search.Just go to those website 

List of websites :


1) www.blingmysearch.com

2) www.buzzisearch.com

Enter your name
Select the style you want to use.
And here is your google search engine with your own name.
Bookmark it and make it your default home page.
Now every time you open your brower your own search engine will open.
You can also visit gmail,yahoo,msn,aol from same page from drop down

Coin Box Calling Hack

Steps:

1.Insert Coin

2.Dial 0##Phone No. *(star)

3.Call Unlimited

4.And Disconnect

5.Coin Comes Out

6.Go Home Smiling...~

8 Google search tips

1. Google currency - convert any currency on Google anytime

Example# 1 USD=? Rs

2. Google definitions – Use Google as a online dictionary

Example# define:software

3. Google Weather - search weather of your location

Example# Weather New Delhi,India

4. Google Time - To see the time in many cities around the world

Example# time New Delhi

Sunday 2 December 2012

Hack the Administrator Password in Windows


In this post I will tell you guyz how to reset Windows administrator password (for Win 2000, XP, Vista and Win 7) at times when you forget it or when you want to gain access to a computer for which you do not know the password.

All of us have experienced a situation where in we need to gain access to a computer which is password protected or at times we may forget the administrator password without which it becomes impossible to login to the computer. So here is an excellent hack using which you can reset the password or make the password empty (remove the password) so that you can gain administrator access to the computer. You can do this with a small tool called  Offline NT Password & Registry Editor. This utility works offline, that means you need to shut down your computer and boot off your using a floppy disk, CD or USB device (such as pen drive). The tool has the following features.