Wednesday, 28 November 2012

What is IIS Exploit


This tutorial is about website hacking that are working on older versions of IIS server. We will be discussing about what is a IIS server and how hackers can upload deface pages on it.
Note:- This tutorial is for information purpose only. Hacking tips won’t be responsible for any harm caused due to the information. We aim to create awareness so that you can protect yourself from getting hacked.

Q) What is an IIS Server ?
A) IIS [Internet Information Service] is a web server developed by Microsoft to use with Mircosoft Operating systems.

Thursday, 22 November 2012

10 TIPS FOR A TOTAL ONLINE SECURITY

With the sudden rise in the Internet usage across the globe over the past few years, there has also been a rise in the amount of online scams and frauds. Today, most of the Internet users are unaware of the most prevailing online threats which pose a real challenge for their safe Internet usage. As a result online security has become a questionable factor for the most Internet users.


Protect your cloud storage from hacking



The concept of cloud storage has become more common these days especially when offered commercially since it's more cost effective for a large corporation to store data on an off-site data center. It is cheaper and they don't have to worry about finding space for storing data on server which can be the size of a warehouse. However, at individual level, it is preferred less over local storage devices like flash drive, hard drive and disk drive.

Control Mouse Movement by your Hand or Head Gestures with NPointer


if you need to work much on the computer (like me) and tend to take small breaks to sit back and lean on the chair, then you must have felt the need of some wireless mouse controller then this post is worth reading. In case you just wish to have some gesture controlled mouse controller, then also this post is going to interest you.

There are lot of tools in the market using which you can control your mouse without any direct contact. Some of them use the webcam to recognize your movements and convert the signals into mouse movements. One good tool that does the same and does well is called the NPointer.




Sunday, 18 November 2012

Get Notification When Someone Login In Your Pc

Instead, download SendEmail, a free tool for sending emails from the command line. With SendEmail, we can write a single command that will send out an email. SendEmail supports authentication, so we can easily send email from Gmail’s SMTP server or any other server that requires authentication.

http://caspian.dotconf.net/menu/Software/SendEmail/

Creating a Task
First, launch the task scheduler by typing Task Scheduler into your Start menu and pressing Enter.



Add Your Name (or) Application to right click Of My Computer

Caution ..
As it is related to Windows regisrty it can be dangerous
so,Try This at ur own risk 


To write your name on right click application
please follow the steps:


1.Copy/Paste the following code in Notepad And then Save it as .reg 

Windows Registry Editor Version 5.00 
[HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\Registry Editor] 
@="Your Name Or Name of the Application" 
[HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\Registry Editor\command] 
@="Location Of The Application"

2.
Now edit it and then Type your name In 

Eg:

[HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\Registry Editor] 
@="Rajesh" 

3. If u want to get any application, once you click Your name or name of application
Then , Type the location Of the application Which u want to open In: 

[HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\Registry Editor\command] 
@="Location Of The Application"

For eg.C:\Program Files\Yahoo!\Messenger\messenger.exe
Thats It finally save it And then Run it .


------------------------------------------------------------
To add Application Control Panel
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\Control Panel\command]
@="rundll32.exe shell32.dll,Control_RunDLL"

To add Application Add/Remove 
[HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\Add/Remove\command]
@="control appwiz.cpl"

To add Application Reboot
[HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\[Reboot]\command]
@="shutdown -r -f -t 5"

To add Application Shutdown
[HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\[Shutdown]\command]
@="shutdown -s -f -t 5"

Your mouse may actually be a RAT in disguise

Security researchers have discovered a Trojan that attaches its malicious code to routines normally used only to control the inputs from mouse clicks.

The tactic is designed to smuggle malicious code past automated threat analysis systems. During such procedures there's no user input and certainly no mouse moving and clicking. The malicious code is designed to remain inactive unless the mouse itself is in use, giving a fair chance that the RAT (remote access Trojan) will remain undetected.


The growing volume of malware means automated threat analysis systems are increasingly important. Only the more unusual analysis work gets passed on to human analysts. Even if the mouse-attached RAT gets caught out at this stage it still gains extra longevity. The development means that anti-virus firms will probably need to include a virtual mouse clicker and nudger in their automated analysis routines.

The sneaky mouse-hogging malware was detected by security researchers at Symantec. The security giant has also come across strains of malware that use "sleep mode" to evade dynamic analysis systems.



A detailed write-up of both (unnamed) threats can be found in a blog post here

Wednesday, 14 November 2012

How to Change the Color of Facebook

We all know that Facebook home page is looks in blue color. How do you feel if you see your Facebook account in another color without blue?
I'll show you a method to change your Facebook color !!!
You can change the color of Facebook by using Greasemonkey Add-on in Firefox web browser. By using this Add-on you can change the color of Facebook to anything as your wish.




Decrease The Shutdown Time In Windows

Whenever you give the shutdown command in your Windows PC, it forwards the request to all the running services. It waits before it tells you if any of the service did not respond to the shutdown request (waits for 12 seconds in Windows 7 and 6 seconds in Windows 8). You can then force stop them or wait for them to respond. But if you have many services running, then 12 seconds for each service is much time to wait for.

Monday, 12 November 2012

What is Steganography?


What is Steganography?

Before coming to the point let me tell you its history.
You might have seen in old chinese movies that the monks used to safeguard secrets by hiding those secrets on their body parts so that no one else can see them but them.
This concept was developed further and it was implemented in computers as well.
This is called Steganography.
Now coming to its implementation in Computers.
By the use of Steganography you can Hide one type of file behind other keeping the format of file same.
I personally find it very useful because it helps me hide my important information easily.

So do you want to try Steganography on your machine ?

Lets get started.
NOTE:- The files and folder names I am going to use are just for reference. You may use different if you want to. But for beginning I would suggest to follow along. Later on you can try it with different file names.

Setup:-

1) Create a new folder named test in any drive (say C: Drive)
2) In  the test folderCreate a text file in it named – hi.txt
3) Copy any default windows picture from my pictures say – desert.jpg in the test folder

Now the game begins.

Type anything you want to in the  Text file and make its font big so that its easily readable
1) Open command prompt
2) Open the test folder.
      You may use the following commands to do that
    2.1)   C:
    2.2)   cd test
3) Now use the following command
      COPY /B desert.jpg+hi.txt new.jpg
       ie… the syntax is
      Copy /B name of file in which you want to embedded the content+ name of file which you want to embedded name of new file
And that’s it. You are done.

Open the test folder and you will see a new image named new.jpg.

When you preview it you will see the normal image but now right click it and open the image with notepad. At the end of the file you can see the text that you wrote in the document.
Well this was just the beginning.
Now the more interesting use of it.

If you want to bind rar files to images. You can do that as well.
(You may put anything you want in the rar file)..
I am sure this was something new for most of you out here..;-)

Or you may also follow our Facebook Fanpage by click over here


Saturday, 10 November 2012

Steps To Increase Your Smartphone Security


The increasing use of smartphones and the reliance placed on it by smartphone users has made them the targets of many malicious activities. Their enormous storage capacity has given relief to our brains in trying to recollect all information at odd times. However, in case of loss of the smartphone, the security of such confidential information is compromised. The phone as well as the data would be subjected to misuse by fraudulent persons. To prevent such misuse, it is necessary to increase the security of your smartphone. There are various ways by which you can step up your smartphone security.

1. Set a Non Decodable Password: 

Five Hacks To Make Using Your iPhone Easier


The iPhone is one of the most advanced personal electronic devices in the world. One little machine can do so many things. But there are ways to make using the iPhone even easier and more efficient. Here are the top five hacks for your iPhone to make it faster, do more things, and unlock more features.

Many of these hacks can also be done to other smartphones, such Androids or Windows Phones. The exact steps may be different, but accomplish the same thing.


6 Ways to hack a Facebook Account

something readers always wanted to Learn, something new about Facebook Hacking. Learn the best attacks for Facebook Hacking with their advantages and drawbacks.


Note:- This tutorial is for educational purpose only and may not be used for any black hat purpose. The prime aim of this tutorial is to create awareness so that you guys can protect yourself  from getting hacked.
Before learning the actual procedure you should know about different types of attacks, their drawbacks and prevention against these attacks .





Tuesday, 6 November 2012

The Difference Between Intel’s i3, i5, and i7 Core Processors

With all of these commercials coming in front of our faces about Intel’s newest line of processors, we can’t help but wonder what in the world the difference is. We have i3, i5, and i7 to choose from, but which one would suit our needs the best?




How to Create New partition in Windows 7


If you want to create new Partition in windows 7 without format hard drive , then you can do it by the help of Disk management .

Follow these steps to Create new partition in Windows 7


1. Right-Click on My Computer , then Click on Manage .


How to disable User account in Windows 7


If there are multiple account exits in your system then you want disable Administrator account disable without deleting or removed user account the you can do it without loss data . when Administrator account will be disabled then  it will not be show on log on screen .


Follow these steps to disable User account.....


1. Click on Start Button , then Right-click on My Computer and then Click on Manage .