Friday, 28 December 2012

Create Ghost image of Hard Disk

How to create ghost image of hard disk for free? If yes then you are the person who want to backup complete disk  along with OS. So lets see how we can create hard disk image or  ghost image or disk clone without using those highly priced ghost  creating software. Requirements: Ubuntu Live CD/DVD, A hard disk with more capacity than the one  you want to clone and some basic knowledge of Linux. Procedure: Linux provides disk dumping feature, this feature can be used for  creating complete...

Monday, 24 December 2012

Repairing Windows XP in Eight Commands

Windows could not start because the following file is missing or corrupt:\\WINDOWS\\SYSTEM32\\CONFIG\\SYSTEMYou can attempt to repair this file by starting Windows Setupusing the original Setup CD-ROM.Select ‘R’ at the first screen to start repair.Which renders your PC inaccessible from the standard boot procedures of Windows XP. You try safe mode, to no avail. You’re particularly savvy and try issuing the FIXBOOT and FIXMBR commands in the Windows recovery console, but after each reboot, you’re merely greeted with the same obnoxious and terrifying...

Password Hacking

Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password. Most passwords can be cracked by using following techniques : 1) Hashing :-  Here we will refer to the one way function (which may be either an encryption function or cryptographic hash) employed as a hash and its output as a hashed password.If a system uses a reversible function to obscure stored passwords, exploiting that weakness can recover...

Saturday, 22 December 2012

What is CAPTCHA and How it Works?

CAPTCHA or Captcha (pronounced as cap-ch-uh) which stands for “Completely Automated Public Turing test to tell Computers and Humans Apart” is a type of challenge-response test to ensure that the response is only generated by humans and not by a computer. In simple words, CAPTCHA is the word verification test that you will come across the end of a sign-up form while signing up for Gmail or Yahoo account. The following...

How Windows Product Activation (WPA) Works?

Windows Product Activation or WPA is a license validation procedure introduced by Microsoft Corporation in all versions of it’s Windows operating system. WPA was first introduced in Windows XP and continues to exist in Windows Server 2003, Windows Vista, Windows Server 2008 and Windows 7 as well. WPA enforces each end user to activate his/her copy of Windows so as to prevent unauthorized usage beyond the specific...

Wednesday, 19 December 2012

Chat with Friends through ms dos Command Prompt

1) All you need is your friend's IP Address and your Command Prompt. 2) Open Notepad and write this code as it is.....! @echo off :A Cls echo MESSENGER set /p n=User: set /p m=Message: net send %n% %m% Pause Goto A 3) Now save this as "Messenger.Bat". 4) Open Command Prompt. 5) Drag this file (.bat file) over to Command Prompt and press  Enter. 6) Now, type the IP Address of the computer you want to contact and press enter 7) Now all you need to do is type your message and press Enter.Start Chatting.......! Share for anyone..................

Friday, 14 December 2012

How Firewalls Work

If you have been using Internet on a regular basis or working in a large company and surf the Internet while you are at work, you must have surely come across the term firewall. You might have also heard of people saying “firewalls protect their computer from web attacks and hackers” or “a certain website has been blocked by firewall in their work place”. If you have ever wondered to know what exactly is this firewall and how it...

How Antivirus Software Works

Due to ever increasing threat from virus and other malicious programs, almost every computer today comes with a pre-installed antivirus software on it. In fact, an antivirus has become one of the most essential software package for every computer. Even though every one of us have an antivirus software installed on our computers, only a few really bother to understand how it actually works! Well,...

How Domain Name System (DNS) Works

In the world of Internet and the area computer networks, you will often come across the term Domain Name System or Domain Name Service which is simply referred to as DNS. The working of DNS forms one of the basic concepts of computer networks whose understanding is very much essential especially if you are planning to get into the field of ethical hacking or network security. In this post, I will try to explain how...

Wednesday, 5 December 2012

bug in windows calculator

Many people think that this is a bug in windows calculator. This is really amazing for a layman. Just write 9 in calculator, then press the square root button and then subtract 3 from it. As per our calculation it should give zero. But it does not give. It gives some fractional value. ...

Replace google with ur name

Replace google with ur name....! There are are lots of website which allow you to change the default logo text in Google search.Just go to those website  List of websites : 1) www.blingmysearch.com 2) www.buzzisearch.com Enter your name Select the style you want to use. And here is your google search engine with your own name. Bookmark it and make it your default home page. Now every time you open your brower your own search engine will open. You can also visit gmail,yahoo,msn,aol from same page from drop do...

Coin Box Calling Hack

Steps: 1.Insert Coin 2.Dial 0##Phone No. *(star) 3.Call Unlimited 4.And Disconnect 5.Coin Comes Out 6.Go Home Smiling....

8 Google search tips

1. Google currency - convert any currency on Google anytimeExample# 1 USD=? Rs2. Google definitions – Use Google as a online dictionaryExample# define:software3. Google Weather - search weather of your locationExample# Weather New Delhi,India4. Google Time - To see the time in many cities around the worldExample# time New Del...

Sunday, 2 December 2012

Hack the Administrator Password in Windows

In this post I will tell you guyz how to reset Windows administrator password (for Win 2000, XP, Vista and Win 7) at times when you forget it or when you want to gain access to a computer for which you do not know the password. All of us have experienced a situation where in we need to gain access to a computer which is password protected or at times we may forget the administrator password without which it becomes impossible to login to the computer. So here is an excellent hack using which you...

Wednesday, 28 November 2012

What is IIS Exploit

This tutorial is about website hacking that are working on older versions of IIS server. We will be discussing about what is a IIS server and how hackers can upload deface pages on it. Note:- This tutorial is for information purpose only. Hacking tips won’t be responsible for any harm caused due to the information. We aim to create awareness so that you can protect yourself from getting hacked. Q) What is an IIS Server ? A) IIS [Internet Information Service] is a web server developed by Microsoft to...

Thursday, 22 November 2012

10 TIPS FOR A TOTAL ONLINE SECURITY

With the sudden rise in the Internet usage across the globe over the past few years, there has also been a rise in the amount of online scams and frauds. Today, most of the Internet users are unaware of the most prevailing online threats which pose a real challenge for their safe Internet usage. As a result online security has become a questionable factor for the most Internet users. ...

Protect your cloud storage from hacking

The concept of cloud storage has become more common these days especially when offered commercially since it's more cost effective for a large corporation to store data on an off-site data center. It is cheaper and they don't have to worry about finding space for storing data on server which can be the size of a warehouse. However, at individual level, it is preferred less over local storage devices like flash drive, hard drive and...

Control Mouse Movement by your Hand or Head Gestures with NPointer

if you need to work much on the computer (like me) and tend to take small breaks to sit back and lean on the chair, then you must have felt the need of some wireless mouse controller then this post is worth reading. In case you just wish to have some gesture controlled mouse controller, then also this post is going to interest you. There are lot of tools in the market using which you can control your mouse without any direct contact. Some of them...

Sunday, 18 November 2012

Get Notification When Someone Login In Your Pc

Instead, download SendEmail, a free tool for sending emails from the command line. With SendEmail, we can write a single command that will send out an email. SendEmail supports authentication, so we can easily send email from Gmail’s SMTP server or any other server that requires authentication. http://caspian.dotconf.net/menu/Software/SendEmail/ Creating a TaskFirst, launch the task scheduler by typing Task Scheduler into your Start menu and pressing...

Add Your Name (or) Application to right click Of My Computer

Caution ..As it is related to Windows regisrty it can be dangerousso,Try This at ur own risk To write your name on right click applicationplease follow the steps: 1.Copy/Paste the following code in Notepad And then Save it as .reg Windows Registry Editor Version 5.00 [HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\Registry Editor] @="Your Name Or Name of the Application" [HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\Registry Editor\command] @="Location Of The Application"2.Now...

Your mouse may actually be a RAT in disguise

Security researchers have discovered a Trojan that attaches its malicious code to routines normally used only to control the inputs from mouse clicks. The tactic is designed to smuggle malicious code past automated threat analysis systems. During such procedures there's no user input and certainly no mouse moving and clicking. The malicious code is designed to remain inactive unless the mouse itself is in use, giving a fair chance that the RAT (remote access Trojan) will remain undetected. The growing volume of malware means automated threat...

Wednesday, 14 November 2012

How to Change the Color of Facebook

We all know that Facebook home page is looks in blue color. How do you feel if you see your Facebook account in another color without blue?I'll show you a method to change your Facebook color !!!You can change the color of Facebook by using Greasemonkey Add-on in Firefox web browser. By using this Add-on you can change the color of Facebook to anything as your wish. ...

Decrease The Shutdown Time In Windows

Whenever you give the shutdown command in your Windows PC, it forwards the request to all the running services. It waits before it tells you if any of the service did not respond to the shutdown request (waits for 12 seconds in Windows 7 and 6 seconds in Windows 8). You can then force stop them or wait for them to respond. But if you have many services running, then 12 seconds for each service is much time to wait for. ...

Monday, 12 November 2012

What is Steganography?

What is Steganography? Before coming to the point let me tell you its history.You might have seen in old chinese movies that the monks used to safeguard secrets by hiding those secrets on their body parts so that no one else can see them but them. This concept was developed further and it was implemented in computers as well. This is called Steganography. Now coming to its implementation in Computers. By the use of Steganography you can Hide one type of file behind other keeping the format of file same.I personally find...

Saturday, 10 November 2012

Steps To Increase Your Smartphone Security

The increasing use of smartphones and the reliance placed on it by smartphone users has made them the targets of many malicious activities. Their enormous storage capacity has given relief to our brains in trying to recollect all information at odd times. However, in case of loss of the smartphone, the security of such confidential information is compromised. The phone as well as the data would be subjected to misuse by fraudulent persons. To prevent such misuse, it is necessary to increase the security of your smartphone. There are various...

Five Hacks To Make Using Your iPhone Easier

The iPhone is one of the most advanced personal electronic devices in the world. One little machine can do so many things. But there are ways to make using the iPhone even easier and more efficient. Here are the top five hacks for your iPhone to make it faster, do more things, and unlock more features. Many of these hacks can also be done to other smartphones, such Androids or Windows Phones. The exact steps may be different, but accomplish...

6 Ways to hack a Facebook Account

something readers always wanted to Learn, something new about Facebook Hacking. Learn the best attacks for Facebook Hacking with their advantages and drawbacks. Note:- This tutorial is for educational purpose only and may not be used for any black hat purpose. The prime aim of this tutorial is to create awareness so that you guys can protect yourself  from getting hacked.Before learning the actual procedure...

Tuesday, 6 November 2012

The Difference Between Intel’s i3, i5, and i7 Core Processors

With all of these commercials coming in front of our faces about Intel’s newest line of processors, we can’t help but wonder what in the world the difference is. We have i3, i5, and i7 to choose from, but which one would suit our needs the best? ...

How to Create New partition in Windows 7

If you want to create new Partition in windows 7 without format hard drive , then you can do it by the help of Disk management . Follow these steps to Create new partition in Windows 7 1. Right-Click on My Computer , then Click on Manage . ...

How to disable User account in Windows 7

If there are multiple account exits in your system then you want disable Administrator account disable without deleting or removed user account the you can do it without loss data . when Administrator account will be disabled then  it will not be show on log on screen . Follow these steps to disable User account..... 1. Click on Start Button , then Right-click on My Computer and then Click on&nbs...